"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:06:41 +00:00
parent d91920d65e
commit a985a4df36
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3352 additions and 3352 deletions

View File

@ -58,9 +58,9 @@
"url": "http://marc.info/?l=bugtraq&m=108852915403293&w=2"
},
{
"name" : "20040629 DoS in popclient 3.0b6",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/023147.html"
"name": "10625",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10625"
},
{
"name": "http://www.grok.org.uk/advisories/popclient.html",
@ -73,9 +73,9 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16538"
},
{
"name" : "10625",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/10625"
"name": "20040629 DoS in popclient 3.0b6",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/023147.html"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110295777306493&w=2"
},
{
"name" : "http://www.man.poznan.pl/~security/gg-adv.txt",
"refsource" : "MISC",
"url" : "http://www.man.poznan.pl/~security/gg-adv.txt"
},
{
"name": "gadu-gadu-dcc-ctcp-obtain-files(18461)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18461"
},
{
"name": "http://www.man.poznan.pl/~security/gg-adv.txt",
"refsource": "MISC",
"url": "http://www.man.poznan.pl/~security/gg-adv.txt"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20040403 Remote Exploit for Aborior's Encore Web Forum",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=108100973820868&w=2"
"name": "10040",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10040"
},
{
"name": "20060620 display.cgi",
@ -63,29 +63,29 @@
"url": "http://www.securityfocus.com/archive/1/437813/100/0/threaded"
},
{
"name" : "20060621 Re: display.cgi",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/437978/100/0/threaded"
},
{
"name" : "10040",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/10040"
"name": "encore-display-command-execution(15725)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15725"
},
{
"name": "16831",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/16831"
},
{
"name": "20060621 Re: display.cgi",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/437978/100/0/threaded"
},
{
"name": "20040403 Remote Exploit for Aborior's Encore Web Forum",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108100973820868&w=2"
},
{
"name": "1009652",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1009652"
},
{
"name" : "encore-display-command-execution(15725)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15725"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20040505 [waraxe-2004-SA#027 - Once again - critical vulnerabilities in PhpNuke 6.x - 7.2]",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=108378804809891&w=2"
},
{
"name": "http://www.waraxe.us/index.php?modname=sa&id=27",
"refsource": "MISC",
"url": "http://www.waraxe.us/index.php?modname=sa&id=27"
},
{
"name": "20040505 [waraxe-2004-SA#027 - Once again - critical vulnerabilities in PhpNuke 6.x - 7.2]",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108378804809891&w=2"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://ftp.icdevgroup.org/interchange/5.6/ANNOUNCEMENT-5.6.0.txt",
"refsource" : "CONFIRM",
"url" : "http://ftp.icdevgroup.org/interchange/5.6/ANNOUNCEMENT-5.6.0.txt"
"name": "interchange-unspec-dos(42801)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42801"
},
{
"name": "http://ftp.icdevgroup.org/pub/interchange/5.5/ANNOUNCEMENT-5.5.2.txt",
@ -63,14 +63,9 @@
"url": "http://ftp.icdevgroup.org/pub/interchange/5.5/ANNOUNCEMENT-5.5.2.txt"
},
{
"name" : "29334",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29334"
},
{
"name" : "28987",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28987"
"name": "http://ftp.icdevgroup.org/interchange/5.6/ANNOUNCEMENT-5.6.0.txt",
"refsource": "CONFIRM",
"url": "http://ftp.icdevgroup.org/interchange/5.6/ANNOUNCEMENT-5.6.0.txt"
},
{
"name": "30346",
@ -78,14 +73,9 @@
"url": "http://secunia.com/advisories/30346"
},
{
"name" : "ADV-2008-1621",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1621/references"
},
{
"name" : "interchange-unspec-dos(42801)",
"name": "interchange-unspecified-dos(42120)",
"refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42801"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42120"
},
{
"name": "interchange-http-post-dos(42580)",
@ -93,9 +83,19 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42580"
},
{
"name" : "interchange-unspecified-dos(42120)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42120"
"name": "ADV-2008-1621",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1621/references"
},
{
"name": "28987",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28987"
},
{
"name": "29334",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29334"
}
]
}

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "20080713 Simple DNS Plus 5.0/4.1 < remote Denial of Service exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/494304/100/0/threaded"
"name": "simplednsplus-unspecified-dos(43767)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43767"
},
{
"name": "6059",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6059"
},
{
"name": "4011",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4011"
},
{
"name": "http://www.blackhat.org.il/index.php/simple-dns-plus-5041-remote-denial-of-service-exploit/",
"refsource": "MISC",
"url": "http://www.blackhat.org.il/index.php/simple-dns-plus-5041-remote-denial-of-service-exploit/"
},
{
"name" : "http://www.simpledns.com/kb.aspx?kbid=1246",
"refsource" : "MISC",
"url" : "http://www.simpledns.com/kb.aspx?kbid=1246"
},
{
"name": "30207",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30207"
},
{
"name" : "4011",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4011"
"name": "http://www.simpledns.com/kb.aspx?kbid=1246",
"refsource": "MISC",
"url": "http://www.simpledns.com/kb.aspx?kbid=1246"
},
{
"name" : "simplednsplus-unspecified-dos(43767)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43767"
"name": "20080713 Simple DNS Plus 5.0/4.1 < remote Denial of Service exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494304/100/0/threaded"
}
]
}

View File

@ -53,20 +53,15 @@
"references": {
"reference_data": [
{
"name" : "20080818 [DSECRG-08-036] Multiple Security Vulnerabilities in Freeway eCommerce 1.4.1.171",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495549/100/0/threaded"
"name": "31475",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31475"
},
{
"name": "http://www.openfreeway.org/download/change-log.html",
"refsource": "CONFIRM",
"url": "http://www.openfreeway.org/download/change-log.html"
},
{
"name" : "31475",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31475"
},
{
"name": "4181",
"refsource": "SREASON",
@ -76,6 +71,11 @@
"name": "freeway-createordernew-file-include(45036)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45036"
},
{
"name": "20080818 [DSECRG-08-036] Multiple Security Vulnerabilities in Freeway eCommerce 1.4.1.171",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495549/100/0/threaded"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "http://www.justsystems.com/jp/info/pd8002.html",
"refsource" : "CONFIRM",
"url" : "http://www.justsystems.com/jp/info/pd8002.html"
"name": "ADV-2008-2447",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2447"
},
{
"name": "30828",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30828"
},
{
"name" : "ADV-2008-2447",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2447"
},
{
"name" : "1020748",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020748"
},
{
"name": "31603",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31603"
},
{
"name": "http://www.justsystems.com/jp/info/pd8002.html",
"refsource": "CONFIRM",
"url": "http://www.justsystems.com/jp/info/pd8002.html"
},
{
"name": "ichitaro-jtd-code-execution(44681)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44681"
},
{
"name": "1020748",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020748"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-4033",
"STATE": "PUBLIC"
},
@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "HPSBST02386",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=122703006921213&w=2"
},
{
"name": "SSRT080164",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=122703006921213&w=2"
},
{
"name" : "MS08-069",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-069"
},
{
"name" : "TA08-316A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-316A.html"
},
{
"name" : "32204",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32204"
},
{
"name": "oval:org.mitre.oval:def:5847",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5847"
},
{
"name": "TA08-316A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-316A.html"
},
{
"name": "HPSBST02386",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=122703006921213&w=2"
},
{
"name": "ADV-2008-3111",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3111"
},
{
"name": "MS08-069",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-069"
},
{
"name": "1021164",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021164"
},
{
"name": "32204",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32204"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "socialengine-profilecomments-sql-injection(46770)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46770"
},
{
"name": "20081120 Social Engine 2.7 CRLF Injection + SQL injection",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "32382",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32382"
},
{
"name" : "socialengine-profilecomments-sql-injection(46770)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46770"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "6920",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6920"
},
{
"name": "32038",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32038"
},
{
"name" : "32526",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32526"
},
{
"name": "eztopsites-topsite-sql-injection(46274)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46274"
},
{
"name": "6920",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6920"
},
{
"name": "32526",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32526"
}
]
}

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "20080303 Heap overflow in Borland VisiBroker Smart Agent 08.00.00.C1.03",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2008-03/0018.html"
},
{
"name": "http://aluigi.altervista.org/adv/visibroken-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/visibroken-adv.txt"
},
{
"name" : "28084",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28084"
"name": "20080303 Heap overflow in Borland VisiBroker Smart Agent 08.00.00.C1.03",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-03/0018.html"
},
{
"name": "visibroker-smartagent-dos(40983)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40983"
},
{
"name": "43058",
@ -83,9 +83,9 @@
"url": "http://www.vupen.com/english/advisories/2008/0748/references"
},
{
"name" : "visibroker-smartagent-dos(40983)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/40983"
"name": "28084",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28084"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html"
},
{
"name" : "HPSBMA02133",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
},
{
"name" : "SSRT061201",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
},
{
"name" : "TA08-017A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
"name": "1019218",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019218"
},
{
"name": "27229",
@ -78,24 +63,9 @@
"url": "http://www.securityfocus.com/bid/27229"
},
{
"name" : "40294",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/40294"
},
{
"name" : "1019218",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019218"
},
{
"name" : "28518",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28518"
},
{
"name" : "28556",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28556"
"name": "TA08-017A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
},
{
"name": "ADV-2008-0150",
@ -106,6 +76,36 @@
"name": "ADV-2008-0180",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0180"
},
{
"name": "SSRT061201",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html"
},
{
"name": "HPSBMA02133",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
},
{
"name": "28556",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28556"
},
{
"name": "28518",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28518"
},
{
"name": "40294",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/40294"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2013-2871",
"STATE": "PUBLIC"
},
@ -53,49 +53,49 @@
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=243818",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=243818"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=243991",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=243991"
"name": "APPLE-SA-2014-04-22-2",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-04/0136.html"
},
{
"name": "https://support.apple.com/kb/HT6537",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6537"
},
{
"name" : "APPLE-SA-2014-04-01-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html"
},
{
"name" : "APPLE-SA-2014-04-22-2",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-04/0136.html"
},
{
"name": "APPLE-SA-2014-04-22-3",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-04/0135.html"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=243991",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=243991"
},
{
"name": "oval:org.mitre.oval:def:17275",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17275"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=243818",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=243818"
},
{
"name": "DSA-2724",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2724"
},
{
"name" : "oval:org.mitre.oval:def:17275",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17275"
"name": "APPLE-SA-2014-04-01-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6355",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -67,15 +67,15 @@
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb17-24.html"
},
{
"name" : "100179",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/100179"
},
{
"name": "1039098",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039098"
},
{
"name": "100179",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100179"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/opf/openproject/commit/0fdd7578909d2ec50abc275fc4962e99566437ee",
"refsource" : "CONFIRM",
"url" : "https://github.com/opf/openproject/commit/0fdd7578909d2ec50abc275fc4962e99566437ee"
},
{
"name": "https://www.openproject.org/openproject-6-1-6-released-security-fix/",
"refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "https://www.openproject.org/openproject-7-0-3-released/",
"refsource": "CONFIRM",
"url": "https://www.openproject.org/openproject-7-0-3-released/"
},
{
"name": "https://github.com/opf/openproject/commit/0fdd7578909d2ec50abc275fc4962e99566437ee",
"refsource": "CONFIRM",
"url": "https://github.com/opf/openproject/commit/0fdd7578909d2ec50abc275fc4962e99566437ee"
}
]
}

View File

@ -53,16 +53,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11874",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11874"
},
{
"name": "101750",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101750"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11874",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11874"
},
{
"name": "1039801",
"refsource": "SECTRACK",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20181018 [SECURITY] [DLA 1549-1] xen security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html"
},
{
"name" : "http://xenbits.xen.org/xsa/advisory-234.html",
"refsource" : "CONFIRM",
"url" : "http://xenbits.xen.org/xsa/advisory-234.html"
"name": "1039351",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039351"
},
{
"name": "https://support.citrix.com/article/CTX227185",
@ -78,9 +73,14 @@
"url": "http://www.securityfocus.com/bid/100819"
},
{
"name" : "1039351",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039351"
"name": "[debian-lts-announce] 20181018 [SECURITY] [DLA 1549-1] xen security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html"
},
{
"name": "http://xenbits.xen.org/xsa/advisory-234.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-234.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=21990",
"refsource" : "CONFIRM",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=21990"
},
{
"name": "GLSA-201801-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201801-01"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=21990",
"refsource": "CONFIRM",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=21990"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20180430 [SECURITY] [DLA 1368-1] libvorbis security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00033.html"
},
{
"name" : "https://gitlab.xiph.org/xiph/vorbis/issues/2328",
"refsource" : "MISC",
"url" : "https://gitlab.xiph.org/xiph/vorbis/issues/2328"
"name": "USN-3569-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3569-1/"
},
{
"name": "DSA-4113",
@ -68,9 +63,14 @@
"url": "https://www.debian.org/security/2018/dsa-4113"
},
{
"name" : "USN-3569-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3569-1/"
"name": "https://gitlab.xiph.org/xiph/vorbis/issues/2328",
"refsource": "MISC",
"url": "https://gitlab.xiph.org/xiph/vorbis/issues/2328"
},
{
"name": "[debian-lts-announce] 20180430 [SECURITY] [DLA 1368-1] libvorbis security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00033.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-15076",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-15560",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/541655/100/0/threaded"
},
{
"name": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt",
"refsource": "MISC",
"url": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt"
},
{
"name": "20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/541655/100/0/threaded"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "99118",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99118"
},
{
"name": "GLSA-201801-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201801-01"
},
{
"name": "42198",
"refsource": "EXPLOIT-DB",
@ -61,16 +71,6 @@
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=21587",
"refsource": "CONFIRM",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=21587"
},
{
"name" : "GLSA-201801-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201801-01"
},
{
"name" : "99118",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99118"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-05-18T21:46:02.311629",
"DATE_REQUESTED": "2018-02-02T00:00:00",
"ID": "CVE-2018-1000037",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "MuPDF",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1.12.0"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Artifex Software, Inc."
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-617"
"value": "n/a"
}
]
}
@ -56,34 +56,9 @@
"references": {
"reference_data": [
{
"name" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5490",
"refsource" : "MISC",
"url" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5490"
},
{
"name" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5501",
"refsource" : "MISC",
"url" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5501"
},
{
"name" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5503",
"refsource" : "MISC",
"url" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5503"
},
{
"name" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5511",
"refsource" : "MISC",
"url" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5511"
},
{
"name" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5564",
"refsource" : "MISC",
"url" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5564"
},
{
"name" : "http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=71ceebcf56e682504da22c4035b39a2d451e8ffd;hp=7f82c01523505052615492f8e220f4348ba46995",
"refsource" : "CONFIRM",
"url" : "http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=71ceebcf56e682504da22c4035b39a2d451e8ffd;hp=7f82c01523505052615492f8e220f4348ba46995"
"name": "GLSA-201811-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-15"
},
{
"name": "http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=8a3257b01faa899dd9b5e35c6bb3403cd709c371;hp=de39f005f12a1afc6973c1f5cec362d6545f70cb",
@ -91,9 +66,9 @@
"url": "http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=8a3257b01faa899dd9b5e35c6bb3403cd709c371;hp=de39f005f12a1afc6973c1f5cec362d6545f70cb"
},
{
"name" : "http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a;hp=f51836b9732c38d945b87fda0770009a77ba680c",
"refsource" : "CONFIRM",
"url" : "http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a;hp=f51836b9732c38d945b87fda0770009a77ba680c"
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5511",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5511"
},
{
"name": "DSA-4334",
@ -101,9 +76,34 @@
"url": "https://www.debian.org/security/2018/dsa-4334"
},
{
"name" : "GLSA-201811-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201811-15"
"name": "http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a;hp=f51836b9732c38d945b87fda0770009a77ba680c",
"refsource": "CONFIRM",
"url": "http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a;hp=f51836b9732c38d945b87fda0770009a77ba680c"
},
{
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5503",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5503"
},
{
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5501",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5501"
},
{
"name": "http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=71ceebcf56e682504da22c4035b39a2d451e8ffd;hp=7f82c01523505052615492f8e220f4348ba46995",
"refsource": "CONFIRM",
"url": "http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=71ceebcf56e682504da22c4035b39a2d451e8ffd;hp=7f82c01523505052615492f8e220f4348ba46995"
},
{
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5490",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5490"
},
{
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5564",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5564"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-1000171",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-07-08T15:52:41.207877",
"DATE_REQUESTED": "2018-06-19T05:29:58",
"ID": "CVE-2018-1000403",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins AWS CodeDeploy Plugin",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1.19 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins project"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "Insufficiently Protected Credentials"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "psampaio@redhat.com",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-16889",
"STATE": "PUBLIC"
},
@ -62,15 +62,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889"
},
{
"name": "106528",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106528"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889"
}
]
}

View File

@ -58,29 +58,29 @@
"url": "https://www.exploit-db.com/exploits/44526/"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"refsource" : "MISC",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"name" : "GLSA-201804-11",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201804-11"
"name": "103708",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103708"
},
{
"name": "RHSA-2018:1119",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"name" : "103708",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/103708"
},
{
"name": "1040648",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040648"
},
{
"name": "GLSA-201804-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"refsource": "MISC",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
]
}