mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
acaf7f5c31
commit
ac51c8d8f9
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2008-0182",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.liferay.com/browse/LEP-4739",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.liferay.com/browse/LEP-4739"
|
||||
},
|
||||
{
|
||||
"name": "VU#767825",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "28742",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28742"
|
||||
},
|
||||
{
|
||||
"name": "http://support.liferay.com/browse/LEP-4739",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.liferay.com/browse/LEP-4739"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "manageengine-checks-security-bypass(39915)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39915"
|
||||
},
|
||||
{
|
||||
"name": "27443",
|
||||
"refsource": "BID",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "28332",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28332"
|
||||
},
|
||||
{
|
||||
"name" : "manageengine-checks-security-bypass(39915)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39915"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "3639",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3639"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0393",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0393"
|
||||
},
|
||||
{
|
||||
"name": "20080201 Titan FTP Server Remote Heap Overflow (USER/PASS)",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -62,25 +72,15 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5036"
|
||||
},
|
||||
{
|
||||
"name" : "27568",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27568"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0393",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0393"
|
||||
},
|
||||
{
|
||||
"name": "28760",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28760"
|
||||
},
|
||||
{
|
||||
"name" : "3639",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3639"
|
||||
"name": "27568",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27568"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "27729",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27729"
|
||||
},
|
||||
{
|
||||
"name": "28881",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28881"
|
||||
},
|
||||
{
|
||||
"name": "27729",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27729"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,104 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080212 Cacti 0.8.7a Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/488018/100/0/threaded"
|
||||
"name": "FEDORA-2008-1737",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00593.html"
|
||||
},
|
||||
{
|
||||
"name" : "20080212 cacti -- Multiple security vulnerabilities have been discovered",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/488013/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.cacti.net/release_notes_0_8_7b.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.cacti.net/release_notes_0_8_7b.php"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=432758",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=432758"
|
||||
"name": "cacti-datainput-xss(50575)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50575"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.cacti.net/view.php?id=1245",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.cacti.net/view.php?id=1245"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1569",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2008/dsa-1569"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-1699",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00570.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-1737",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00593.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200803-18",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200803-18.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2008:052",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:052"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2008:005",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "27749",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27749"
|
||||
},
|
||||
{
|
||||
"name" : "34991",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/34991"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0540",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0540"
|
||||
},
|
||||
{
|
||||
"name" : "1019414",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1019414"
|
||||
},
|
||||
{
|
||||
"name" : "28872",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28872"
|
||||
},
|
||||
{
|
||||
"name" : "28976",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28976"
|
||||
},
|
||||
{
|
||||
"name": "29242",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29242"
|
||||
},
|
||||
{
|
||||
"name" : "29274",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29274"
|
||||
},
|
||||
{
|
||||
"name" : "30045",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30045"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=432758",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432758"
|
||||
},
|
||||
{
|
||||
"name": "3657",
|
||||
@ -158,9 +83,84 @@
|
||||
"url": "http://securityreason.com/securityalert/3657"
|
||||
},
|
||||
{
|
||||
"name" : "cacti-datainput-xss(50575)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50575"
|
||||
"name": "SUSE-SR:2008:005",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200803-18",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200803-18.xml"
|
||||
},
|
||||
{
|
||||
"name": "28872",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28872"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:052",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:052"
|
||||
},
|
||||
{
|
||||
"name": "http://www.cacti.net/release_notes_0_8_7b.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.cacti.net/release_notes_0_8_7b.php"
|
||||
},
|
||||
{
|
||||
"name": "30045",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30045"
|
||||
},
|
||||
{
|
||||
"name": "29274",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29274"
|
||||
},
|
||||
{
|
||||
"name": "20080212 cacti -- Multiple security vulnerabilities have been discovered",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/488013/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0540",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0540"
|
||||
},
|
||||
{
|
||||
"name": "27749",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27749"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1569",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1569"
|
||||
},
|
||||
{
|
||||
"name": "28976",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28976"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-1699",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00570.html"
|
||||
},
|
||||
{
|
||||
"name": "1019414",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019414"
|
||||
},
|
||||
{
|
||||
"name": "20080212 Cacti 0.8.7a Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/488018/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "34991",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/34991"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,45 +52,65 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20080708 Re: CVE id request: Clamav",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/07/08/5"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20080715 Re: CVE id request: Clamav",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/07/15/1"
|
||||
},
|
||||
{
|
||||
"name" : "http://lurker.clamav.net/message/20080707.155612.ad411b00.en.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://lurker.clamav.net/message/20080707.155612.ad411b00.en.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=/branches/0.93/libclamav/petite.c&rev=3920",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=/branches/0.93/libclamav/petite.c&rev=3920"
|
||||
},
|
||||
{
|
||||
"name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1000#c4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1000#c4"
|
||||
},
|
||||
{
|
||||
"name": "31437",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31437"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2008-09-15",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-6338",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00606.html"
|
||||
"name": "[oss-security] 20080715 Re: CVE id request: Clamav",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/07/15/1"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-6422",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00617.html"
|
||||
"name": "TA08-260A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
|
||||
},
|
||||
{
|
||||
"name": "clamav-petitec-dos(44200)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44200"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2008:015",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2584",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2584"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=/branches/0.93/libclamav/petite.c&rev=3920",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=/branches/0.93/libclamav/petite.c&rev=3920"
|
||||
},
|
||||
{
|
||||
"name": "31882",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31882"
|
||||
},
|
||||
{
|
||||
"name": "31091",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31091"
|
||||
},
|
||||
{
|
||||
"name": "http://lurker.clamav.net/message/20080707.155612.ad411b00.en.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://lurker.clamav.net/message/20080707.155612.ad411b00.en.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200808-07",
|
||||
@ -103,39 +123,19 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:166"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2008:015",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html"
|
||||
"name": "FEDORA-2008-6422",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00617.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA08-260A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
|
||||
"name": "FEDORA-2008-6338",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00606.html"
|
||||
},
|
||||
{
|
||||
"name" : "31091",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31091"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2584",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2584"
|
||||
},
|
||||
{
|
||||
"name" : "31437",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31437"
|
||||
},
|
||||
{
|
||||
"name" : "31882",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31882"
|
||||
},
|
||||
{
|
||||
"name" : "clamav-petitec-dos(44200)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44200"
|
||||
"name": "[oss-security] 20080708 Re: CVE id request: Clamav",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/07/08/5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080826 ZoneMinder Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/495745/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "30843",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "zoneminder-zmhtmlviewevent-sql-injection(44726)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44726"
|
||||
},
|
||||
{
|
||||
"name": "20080826 ZoneMinder Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/495745/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,70 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20080909 CVE request: MySQL empty bit-string literal server crash",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/09/09/4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20080909 Re: CVE request: MySQL empty bit-string literal server crash",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/09/09/7"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.mysql.com/bug.php?id=35658",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.mysql.com/bug.php?id=35658"
|
||||
},
|
||||
{
|
||||
"name" : "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.gentoo.org/237166",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.gentoo.org/237166"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1783",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2009/dsa-1783"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2009:094",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2009:1067",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2009:1289",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2008:025",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-671-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-671-1"
|
||||
"name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-1397-1",
|
||||
@ -123,24 +73,24 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-1397-1"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10521",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521"
|
||||
"name": "RHSA-2009:1067",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
|
||||
},
|
||||
{
|
||||
"name" : "34907",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/34907"
|
||||
"name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html"
|
||||
},
|
||||
{
|
||||
"name" : "32769",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32769"
|
||||
"name": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html"
|
||||
},
|
||||
{
|
||||
"name" : "36566",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/36566"
|
||||
"name": "[oss-security] 20080909 Re: CVE request: MySQL empty bit-string literal server crash",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/09/09/7"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2554",
|
||||
@ -148,14 +98,34 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2554"
|
||||
},
|
||||
{
|
||||
"name" : "1020858",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020858"
|
||||
"name": "USN-671-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-671-1"
|
||||
},
|
||||
{
|
||||
"name" : "31769",
|
||||
"name": "https://bugs.gentoo.org/237166",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.gentoo.org/237166"
|
||||
},
|
||||
{
|
||||
"name": "mysql-bitstring-dos(45042)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1783",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2009/dsa-1783"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2009:1289",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
|
||||
},
|
||||
{
|
||||
"name": "32769",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31769"
|
||||
"url": "http://secunia.com/advisories/32769"
|
||||
},
|
||||
{
|
||||
"name": "32759",
|
||||
@ -163,9 +133,39 @@
|
||||
"url": "http://secunia.com/advisories/32759"
|
||||
},
|
||||
{
|
||||
"name" : "mysql-bitstring-dos(45042)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042"
|
||||
"name": "34907",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34907"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20080909 CVE request: MySQL empty bit-string literal server crash",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/09/09/4"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2008:025",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "36566",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36566"
|
||||
},
|
||||
{
|
||||
"name": "31769",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31769"
|
||||
},
|
||||
{
|
||||
"name": "1020858",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020858"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10521",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080916 [ECHO_ADV_101$2008] Attachmax Dolphin <= 2.1.0 Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/496427/100/0/threaded"
|
||||
"name": "http://e-rdc.org/v1/news.php?readmore=108",
|
||||
"refsource": "MISC",
|
||||
"url": "http://e-rdc.org/v1/news.php?readmore=108"
|
||||
},
|
||||
{
|
||||
"name": "31794",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31794"
|
||||
},
|
||||
{
|
||||
"name": "6468",
|
||||
@ -63,9 +68,9 @@
|
||||
"url": "https://www.exploit-db.com/exploits/6468"
|
||||
},
|
||||
{
|
||||
"name" : "http://e-rdc.org/v1/news.php?readmore=108",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://e-rdc.org/v1/news.php?readmore=108"
|
||||
"name": "20080916 [ECHO_ADV_101$2008] Attachmax Dolphin <= 2.1.0 Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/496427/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "31207",
|
||||
@ -77,11 +82,6 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/48270"
|
||||
},
|
||||
{
|
||||
"name" : "31794",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31794"
|
||||
},
|
||||
{
|
||||
"name": "4307",
|
||||
"refsource": "SREASON",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "imagebrowser-index-directory-traversal(45490)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45490"
|
||||
},
|
||||
{
|
||||
"name": "6618",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "4464",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4464"
|
||||
},
|
||||
{
|
||||
"name" : "imagebrowser-index-directory-traversal(45490)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45490"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/497970"
|
||||
},
|
||||
{
|
||||
"name" : "31993",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31993"
|
||||
},
|
||||
{
|
||||
"name": "32272",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32272"
|
||||
},
|
||||
{
|
||||
"name" : "4550",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4550"
|
||||
"name": "31993",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31993"
|
||||
},
|
||||
{
|
||||
"name": "typo-commentauthor-commenturl-xss(46204)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46204"
|
||||
},
|
||||
{
|
||||
"name": "4550",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4550"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/497970"
|
||||
},
|
||||
{
|
||||
"name" : "31993",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31993"
|
||||
},
|
||||
{
|
||||
"name": "32272",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32272"
|
||||
},
|
||||
{
|
||||
"name" : "4550",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4550"
|
||||
"name": "31993",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31993"
|
||||
},
|
||||
{
|
||||
"name": "typo-searchpublishedat-sql-injection(46205)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46205"
|
||||
},
|
||||
{
|
||||
"name": "4550",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4550"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,11 +62,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31987"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2956",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2956"
|
||||
},
|
||||
{
|
||||
"name": "4560",
|
||||
"refsource": "SREASON",
|
||||
@ -76,6 +71,11 @@
|
||||
"name": "djvu-msoffice-activex-bo(46214)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46214"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2956",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2956"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-2151",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "RHSA-2013:0925",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0925.html"
|
||||
},
|
||||
{
|
||||
"name": "60473",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/60473"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0925",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0925.html"
|
||||
},
|
||||
{
|
||||
"name": "enterprise-cve20132151-priv-esc(84868)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-2251",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,21 +52,36 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
|
||||
},
|
||||
{
|
||||
"name": "apache-archiva-ognl-command-exec(90392)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392"
|
||||
},
|
||||
{
|
||||
"name": "20131013 Apache Software Foundation A Subsite Remote command execution",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2013/Oct/96"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20140114 Re: CVE Request: Apache Archiva Remote Command Execution 0day",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2014/q1/89"
|
||||
},
|
||||
{
|
||||
"name": "http://cxsecurity.com/issue/WLB-2014010087",
|
||||
"refsource": "MISC",
|
||||
"url": "http://cxsecurity.com/issue/WLB-2014010087"
|
||||
},
|
||||
{
|
||||
"name": "20131023 Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2"
|
||||
},
|
||||
{
|
||||
"name": "http://struts.apache.org/release/2.3.x/docs/s2-016.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -77,55 +92,40 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://archiva.apache.org/security.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html"
|
||||
},
|
||||
{
|
||||
"name" : "20131023 Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2"
|
||||
},
|
||||
{
|
||||
"name" : "64758",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/64758"
|
||||
},
|
||||
{
|
||||
"name" : "61189",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/61189"
|
||||
},
|
||||
{
|
||||
"name": "98445",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/98445"
|
||||
},
|
||||
{
|
||||
"name" : "1029184",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1029184"
|
||||
},
|
||||
{
|
||||
"name": "1032916",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032916"
|
||||
},
|
||||
{
|
||||
"name" : "apache-archiva-ognl-command-exec(90392)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392"
|
||||
"name": "61189",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/61189"
|
||||
},
|
||||
{
|
||||
"name": "1029184",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029184"
|
||||
},
|
||||
{
|
||||
"name": "64758",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/64758"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140114 Re: CVE Request: Apache Archiva Remote Command Execution 0day",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q1/89"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-2354",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=e398990eb87785e20e065cd3f14d1dbb69df4392",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=e398990eb87785e20e065cd3f14d1dbb69df4392"
|
||||
},
|
||||
{
|
||||
"name": "USN-1790-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1790-1"
|
||||
},
|
||||
{
|
||||
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=e398990eb87785e20e065cd3f14d1dbb69df4392",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=e398990eb87785e20e065cd3f14d1dbb69df4392"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://kb.juniper.net/KB27375",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kb.juniper.net/KB27375"
|
||||
},
|
||||
{
|
||||
"name": "1028529",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1028529"
|
||||
},
|
||||
{
|
||||
"name" : "53359",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/53359"
|
||||
"name": "https://kb.juniper.net/KB27375",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.juniper.net/KB27375"
|
||||
},
|
||||
{
|
||||
"name": "juniper-smartpass-cve20133498-xss(84110)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84110"
|
||||
},
|
||||
{
|
||||
"name": "53359",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/53359"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-3794",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,9 +58,9 @@
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
"name": "openSUSE-SU-2013:1335",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1390",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:1335",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html"
|
||||
"name": "95333",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/95333"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1410",
|
||||
@ -82,15 +82,15 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
},
|
||||
{
|
||||
"name": "61222",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/61222"
|
||||
},
|
||||
{
|
||||
"name" : "95333",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/95333"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-3865",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:18813",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18813"
|
||||
},
|
||||
{
|
||||
"name": "MS13-076",
|
||||
"refsource": "MS",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "TA13-253A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:18813",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18813"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://kb.isc.org/article/AA-00967/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kb.isc.org/article/AA-00967/"
|
||||
"name": "APPLE-SA-2014-10-16-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/kb/HT6536",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://support.apple.com/kb/HT6536"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2014-10-16-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html"
|
||||
"name": "https://kb.isc.org/article/AA-00967/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.isc.org/article/AA-00967/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-3989",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21653287",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21653287"
|
||||
},
|
||||
{
|
||||
"name": "appscan-cve20133989-info-disclosure(84975)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84975"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21653287",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21653287"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2013-6027",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "DSA-2883",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2883"
|
||||
},
|
||||
{
|
||||
"name": "https://src.chromium.org/viewvc/blink?revision=164538&view=revision",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://src.chromium.org/viewvc/blink?revision=164538&view=revision"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0327",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,21 +76,6 @@
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=331060",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=331060"
|
||||
},
|
||||
{
|
||||
"name" : "https://src.chromium.org/viewvc/blink?revision=164538&view=revision",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://src.chromium.org/viewvc/blink?revision=164538&view=revision"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2883",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2883"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0327",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-03/msg00006.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://scn.sap.com/docs/DOC-8218"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sybase.com/detail?id=1099371",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.sybase.com/detail?id=1099371"
|
||||
},
|
||||
{
|
||||
"name" : "https://service.sap.com/sap/support/notes/1893561",
|
||||
"name": "http://scn.sap.com/docs/DOC-8218",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://service.sap.com/sap/support/notes/1893561"
|
||||
"url": "http://scn.sap.com/docs/DOC-8218"
|
||||
},
|
||||
{
|
||||
"name": "55537",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55537"
|
||||
},
|
||||
{
|
||||
"name": "https://service.sap.com/sap/support/notes/1893561",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://service.sap.com/sap/support/notes/1893561"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-7136",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "30358",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/30358/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.planitcomputing.ie/upc-wifi-attack.pdf",
|
||||
"refsource": "MISC",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "cisco-epc2425-cve20137136-unauth-access(90133)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90133"
|
||||
},
|
||||
{
|
||||
"name": "30358",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/30358/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20131227 Re: Two CVE request for gnome-shell/screensaver issues",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/12/27/8"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20131227 Re: Two CVE request for gnome-shell/screensaver issues",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/12/27/6"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20131227 Two CVE request for gnome-shell/screensaver issues",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/12/27/4"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=686740",
|
||||
"name": "https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=686740"
|
||||
"url": "https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1030431",
|
||||
@ -78,9 +63,24 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1030431"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j",
|
||||
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=686740",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j"
|
||||
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=686740"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20131227 Two CVE request for gnome-shell/screensaver issues",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/12/27/4"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20131227 Re: Two CVE request for gnome-shell/screensaver issues",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/12/27/6"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20131227 Re: Two CVE request for gnome-shell/screensaver issues",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/12/27/8"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -54,9 +54,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
"name": "1038941",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038941"
|
||||
},
|
||||
{
|
||||
"name": "99787",
|
||||
@ -64,9 +64,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/99787"
|
||||
},
|
||||
{
|
||||
"name" : "1038941",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038941"
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,11 +53,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
},
|
||||
{
|
||||
"name": "99656",
|
||||
"refsource": "BID",
|
||||
@ -67,6 +62,11 @@
|
||||
"name": "1038941",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038941"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,11 +53,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
},
|
||||
{
|
||||
"name": "99814",
|
||||
"refsource": "BID",
|
||||
@ -67,6 +62,11 @@
|
||||
"name": "1038932",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038932"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01"
|
||||
},
|
||||
{
|
||||
"name": "101510",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101510"
|
||||
},
|
||||
{
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-17072",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/erikd/libsndfile/issues/344",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/erikd/libsndfile/issues/344"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180108 [SECURITY] [DLA 1235-1] opencv security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180722 [SECURITY] [DLA 1438-1] opencv security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180108 [SECURITY] [DLA 1235-1] opencv security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/opencv/opencv/issues/10351",
|
||||
"refsource": "MISC",
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://wpvulndb.com/vulnerabilities/8820",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://wpvulndb.com/vulnerabilities/8820"
|
||||
},
|
||||
{
|
||||
"name" : "https://codex.wordpress.org/Version_4.7.5",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://codex.wordpress.org/Version_4.7.5"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3"
|
||||
"name": "1038520",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038520"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/news/2017/05/wordpress-4-7-5/",
|
||||
@ -83,9 +73,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/98509"
|
||||
},
|
||||
{
|
||||
"name" : "1038520",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038520"
|
||||
"name": "https://wpvulndb.com/vulnerabilities/8820",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpvulndb.com/vulnerabilities/8820"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3"
|
||||
},
|
||||
{
|
||||
"name": "https://codex.wordpress.org/Version_4.7.5",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://codex.wordpress.org/Version_4.7.5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=1042326",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=1042326"
|
||||
},
|
||||
{
|
||||
"name" : "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=5a22de904a0a366ae79f03ff1e13a1232a89e26b",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=5a22de904a0a366ae79f03ff1e13a1232a89e26b"
|
||||
},
|
||||
{
|
||||
"name" : "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=f9494b3f258e01b6af8bd3941ce436bcc00afc56",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=f9494b3f258e01b6af8bd3941ce436bcc00afc56"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -77,6 +62,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
||||
},
|
||||
{
|
||||
"name": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=5a22de904a0a366ae79f03ff1e13a1232a89e26b",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=5a22de904a0a366ae79f03ff1e13a1232a89e26b"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3880",
|
||||
"refsource": "DEBIAN",
|
||||
@ -86,6 +76,16 @@
|
||||
"name": "99046",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99046"
|
||||
},
|
||||
{
|
||||
"name": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=f9494b3f258e01b6af8bd3941ce436bcc00afc56",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=f9494b3f258e01b6af8bd3941ce436bcc00afc56"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1042326",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1042326"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-ise-csrf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-ise-csrf"
|
||||
},
|
||||
{
|
||||
"name": "104950",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104950"
|
||||
},
|
||||
{
|
||||
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-ise-csrf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-ise-csrf"
|
||||
},
|
||||
{
|
||||
"name": "1041408",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-01-22",
|
||||
"ID": "CVE-2018-1000015",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins Pipeline: Nodes and Processes Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.17 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins Pipeline: Nodes and Processes Plugin"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Incorrect Access Control"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,14 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"DATE_ASSIGNED" : "2018-01-22",
|
||||
"ID": "CVE-2018-1000016",
|
||||
"REQUESTER" : "ml@beckweb.net",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-12-19T20:52:45.262092",
|
||||
"DATE_REQUESTED": "2018-12-13T17:03:00",
|
||||
"ID": "CVE-2018-1000875",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "BOINC Server and Website Code",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "0.9-1.0.2"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Berkeley Open Infrastructure for Network Computing"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-302: Authentication Bypass by Assumed-Immutable Data"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,36 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00036.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ef252e7dc214bcbd9a2539216aab9202848602bb",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ef252e7dc214bcbd9a2539216aab9202848602bb"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.ghostscript.com/?p=ghostpdl.git;h=606a22e77e7f081781e99e44644cd0119f559e03",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://git.ghostscript.com/?p=ghostpdl.git;h=606a22e77e7f081781e99e44644cd0119f559e03"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.ghostscript.com/show_bug.cgi?id=700168",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.ghostscript.com/show_bug.cgi?id=700168"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26"
|
||||
},
|
||||
{
|
||||
"name" : "https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4346",
|
||||
"refsource": "DEBIAN",
|
||||
@ -97,10 +67,40 @@
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3831-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=700168",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=700168"
|
||||
},
|
||||
{
|
||||
"name": "https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf"
|
||||
},
|
||||
{
|
||||
"name": "106154",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106154"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00036.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26"
|
||||
},
|
||||
{
|
||||
"name": "http://git.ghostscript.com/?p=ghostpdl.git;h=606a22e77e7f081781e99e44644cd0119f559e03",
|
||||
"refsource": "MISC",
|
||||
"url": "http://git.ghostscript.com/?p=ghostpdl.git;h=606a22e77e7f081781e99e44644cd0119f559e03"
|
||||
},
|
||||
{
|
||||
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ef252e7dc214bcbd9a2539216aab9202848602bb",
|
||||
"refsource": "MISC",
|
||||
"url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ef252e7dc214bcbd9a2539216aab9202848602bb"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,61 +52,46 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://bugs.php.net/bug.php?id=77160",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.php.net/bug.php?id=77160"
|
||||
},
|
||||
{
|
||||
"name": "45914",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45914/"
|
||||
},
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/12/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20190301 [SECURITY] [DLA 1700-1] uw-imap security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://antichat.com/threads/463395/#post-4254681",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://antichat.com/threads/463395/#post-4254681"
|
||||
"name": "https://security.netapp.com/advisory/ntap-20181221-0004/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20181221-0004/"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.debian.org/913775",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.debian.org/913775"
|
||||
"name": "1042157",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1042157"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.debian.org/913835",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.debian.org/913835"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.debian.org/913836",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.debian.org/913836"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.php.net/bug.php?id=76428",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.php.net/bug.php?id=76428"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.php.net/bug.php?id=77153",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.php.net/bug.php?id=77153"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.php.net/bug.php?id=77160",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.php.net/bug.php?id=77160"
|
||||
"name": "DSA-4353",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4353"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/913835",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.debian.org/913835"
|
||||
},
|
||||
{
|
||||
"name": "https://www.openwall.com/lists/oss-security/2018/11/22/3",
|
||||
"refsource": "MISC",
|
||||
@ -117,25 +102,40 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://git.php.net/?p=php-src.git;a=commit;h=e5bfea64c81ae34816479bb05d17cdffe45adddb"
|
||||
},
|
||||
{
|
||||
"name" : "https://security.netapp.com/advisory/ntap-20181221-0004/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20181221-0004/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4353",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4353"
|
||||
},
|
||||
{
|
||||
"name": "106018",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106018"
|
||||
},
|
||||
{
|
||||
"name" : "1042157",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1042157"
|
||||
"name": "https://bugs.php.net/bug.php?id=76428",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.php.net/bug.php?id=76428"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/913775",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.debian.org/913775"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/913836",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.debian.org/913836"
|
||||
},
|
||||
{
|
||||
"name": "https://antichat.com/threads/463395/#post-4254681",
|
||||
"refsource": "MISC",
|
||||
"url": "https://antichat.com/threads/463395/#post-4254681"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.php.net/bug.php?id=77153",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.php.net/bug.php?id=77153"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00006.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "45946",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/45946/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/domainmod/domainmod/issues/82",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/domainmod/domainmod/issues/82"
|
||||
},
|
||||
{
|
||||
"name": "45946",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45946/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "secure@dell.com",
|
||||
"ASSIGNER": "security_alert@emc.com",
|
||||
"DATE_PUBLIC": "2018-09-13T04:00:00.000Z",
|
||||
"ID": "CVE-2018-1198",
|
||||
"STATE": "PUBLIC"
|
||||
|
@ -81,15 +81,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22015943"
|
||||
},
|
||||
{
|
||||
"name" : "1041225",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041225"
|
||||
},
|
||||
{
|
||||
"name": "ibm-filenet-cve20181555-xss(142892)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/142892"
|
||||
},
|
||||
{
|
||||
"name": "1041225",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041225"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user