"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 06:29:47 +00:00
parent acaf7f5c31
commit ac51c8d8f9
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
63 changed files with 4334 additions and 4336 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2008-0182",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.liferay.com/browse/LEP-4739",
"refsource" : "CONFIRM",
"url" : "http://support.liferay.com/browse/LEP-4739"
},
{
"name": "VU#767825",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "28742",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28742"
},
{
"name": "http://support.liferay.com/browse/LEP-4739",
"refsource": "CONFIRM",
"url": "http://support.liferay.com/browse/LEP-4739"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "manageengine-checks-security-bypass(39915)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39915"
},
{
"name": "27443",
"refsource": "BID",
@ -61,11 +66,6 @@
"name": "28332",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28332"
},
{
"name" : "manageengine-checks-security-bypass(39915)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39915"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "3639",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3639"
},
{
"name": "ADV-2008-0393",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0393"
},
{
"name": "20080201 Titan FTP Server Remote Heap Overflow (USER/PASS)",
"refsource": "BUGTRAQ",
@ -62,25 +72,15 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5036"
},
{
"name" : "27568",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27568"
},
{
"name" : "ADV-2008-0393",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0393"
},
{
"name": "28760",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28760"
},
{
"name" : "3639",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3639"
"name": "27568",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27568"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "27729",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27729"
},
{
"name": "28881",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28881"
},
{
"name": "27729",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27729"
}
]
}

View File

@ -53,104 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20080212 Cacti 0.8.7a Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488018/100/0/threaded"
"name": "FEDORA-2008-1737",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00593.html"
},
{
"name" : "20080212 cacti -- Multiple security vulnerabilities have been discovered",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488013/100/0/threaded"
},
{
"name" : "http://www.cacti.net/release_notes_0_8_7b.php",
"refsource" : "CONFIRM",
"url" : "http://www.cacti.net/release_notes_0_8_7b.php"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=432758",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=432758"
"name": "cacti-datainput-xss(50575)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50575"
},
{
"name": "http://bugs.cacti.net/view.php?id=1245",
"refsource": "CONFIRM",
"url": "http://bugs.cacti.net/view.php?id=1245"
},
{
"name" : "DSA-1569",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1569"
},
{
"name" : "FEDORA-2008-1699",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00570.html"
},
{
"name" : "FEDORA-2008-1737",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00593.html"
},
{
"name" : "GLSA-200803-18",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200803-18.xml"
},
{
"name" : "MDVSA-2008:052",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:052"
},
{
"name" : "SUSE-SR:2008:005",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
},
{
"name" : "27749",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27749"
},
{
"name" : "34991",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/34991"
},
{
"name" : "ADV-2008-0540",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0540"
},
{
"name" : "1019414",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019414"
},
{
"name" : "28872",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28872"
},
{
"name" : "28976",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28976"
},
{
"name": "29242",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29242"
},
{
"name" : "29274",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29274"
},
{
"name" : "30045",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30045"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=432758",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432758"
},
{
"name": "3657",
@ -158,9 +83,84 @@
"url": "http://securityreason.com/securityalert/3657"
},
{
"name" : "cacti-datainput-xss(50575)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50575"
"name": "SUSE-SR:2008:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
},
{
"name": "GLSA-200803-18",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200803-18.xml"
},
{
"name": "28872",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28872"
},
{
"name": "MDVSA-2008:052",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:052"
},
{
"name": "http://www.cacti.net/release_notes_0_8_7b.php",
"refsource": "CONFIRM",
"url": "http://www.cacti.net/release_notes_0_8_7b.php"
},
{
"name": "30045",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30045"
},
{
"name": "29274",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29274"
},
{
"name": "20080212 cacti -- Multiple security vulnerabilities have been discovered",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488013/100/0/threaded"
},
{
"name": "ADV-2008-0540",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0540"
},
{
"name": "27749",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27749"
},
{
"name": "DSA-1569",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1569"
},
{
"name": "28976",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28976"
},
{
"name": "FEDORA-2008-1699",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00570.html"
},
{
"name": "1019414",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019414"
},
{
"name": "20080212 Cacti 0.8.7a Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488018/100/0/threaded"
},
{
"name": "34991",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34991"
}
]
}

View File

@ -52,45 +52,65 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20080708 Re: CVE id request: Clamav",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/07/08/5"
},
{
"name" : "[oss-security] 20080715 Re: CVE id request: Clamav",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/07/15/1"
},
{
"name" : "http://lurker.clamav.net/message/20080707.155612.ad411b00.en.html",
"refsource" : "CONFIRM",
"url" : "http://lurker.clamav.net/message/20080707.155612.ad411b00.en.html"
},
{
"name" : "http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=/branches/0.93/libclamav/petite.c&rev=3920",
"refsource" : "CONFIRM",
"url" : "http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=/branches/0.93/libclamav/petite.c&rev=3920"
},
{
"name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1000#c4",
"refsource": "CONFIRM",
"url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1000#c4"
},
{
"name": "31437",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31437"
},
{
"name": "APPLE-SA-2008-09-15",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
},
{
"name" : "FEDORA-2008-6338",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00606.html"
"name": "[oss-security] 20080715 Re: CVE id request: Clamav",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/07/15/1"
},
{
"name" : "FEDORA-2008-6422",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00617.html"
"name": "TA08-260A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
},
{
"name": "clamav-petitec-dos(44200)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44200"
},
{
"name": "SUSE-SR:2008:015",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html"
},
{
"name": "ADV-2008-2584",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2584"
},
{
"name": "http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=/branches/0.93/libclamav/petite.c&rev=3920",
"refsource": "CONFIRM",
"url": "http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=/branches/0.93/libclamav/petite.c&rev=3920"
},
{
"name": "31882",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31882"
},
{
"name": "31091",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31091"
},
{
"name": "http://lurker.clamav.net/message/20080707.155612.ad411b00.en.html",
"refsource": "CONFIRM",
"url": "http://lurker.clamav.net/message/20080707.155612.ad411b00.en.html"
},
{
"name": "GLSA-200808-07",
@ -103,39 +123,19 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:166"
},
{
"name" : "SUSE-SR:2008:015",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html"
"name": "FEDORA-2008-6422",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00617.html"
},
{
"name" : "TA08-260A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
"name": "FEDORA-2008-6338",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00606.html"
},
{
"name" : "31091",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31091"
},
{
"name" : "ADV-2008-2584",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2584"
},
{
"name" : "31437",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31437"
},
{
"name" : "31882",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31882"
},
{
"name" : "clamav-petitec-dos(44200)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44200"
"name": "[oss-security] 20080708 Re: CVE id request: Clamav",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/07/08/5"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20080826 ZoneMinder Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495745/100/0/threaded"
},
{
"name": "30843",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "zoneminder-zmhtmlviewevent-sql-injection(44726)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44726"
},
{
"name": "20080826 ZoneMinder Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495745/100/0/threaded"
}
]
}

View File

@ -52,70 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20080909 CVE request: MySQL empty bit-string literal server crash",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/09/09/4"
},
{
"name" : "[oss-security] 20080909 Re: CVE request: MySQL empty bit-string literal server crash",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/09/09/7"
},
{
"name": "http://bugs.mysql.com/bug.php?id=35658",
"refsource": "CONFIRM",
"url": "http://bugs.mysql.com/bug.php?id=35658"
},
{
"name" : "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html",
"refsource" : "CONFIRM",
"url" : "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html"
},
{
"name" : "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html",
"refsource" : "CONFIRM",
"url" : "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html"
},
{
"name" : "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html",
"refsource" : "CONFIRM",
"url" : "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html"
},
{
"name" : "https://bugs.gentoo.org/237166",
"refsource" : "CONFIRM",
"url" : "https://bugs.gentoo.org/237166"
},
{
"name" : "DSA-1783",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1783"
},
{
"name": "MDVSA-2009:094",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
},
{
"name" : "RHSA-2009:1067",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
},
{
"name" : "RHSA-2009:1289",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
},
{
"name" : "SUSE-SR:2008:025",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
},
{
"name" : "USN-671-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-671-1"
"name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html"
},
{
"name": "USN-1397-1",
@ -123,24 +73,24 @@
"url": "http://www.ubuntu.com/usn/USN-1397-1"
},
{
"name" : "oval:org.mitre.oval:def:10521",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521"
"name": "RHSA-2009:1067",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
},
{
"name" : "34907",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34907"
"name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html"
},
{
"name" : "32769",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32769"
"name": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html"
},
{
"name" : "36566",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36566"
"name": "[oss-security] 20080909 Re: CVE request: MySQL empty bit-string literal server crash",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/09/09/7"
},
{
"name": "ADV-2008-2554",
@ -148,14 +98,34 @@
"url": "http://www.vupen.com/english/advisories/2008/2554"
},
{
"name" : "1020858",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020858"
"name": "USN-671-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-671-1"
},
{
"name" : "31769",
"name": "https://bugs.gentoo.org/237166",
"refsource": "CONFIRM",
"url": "https://bugs.gentoo.org/237166"
},
{
"name": "mysql-bitstring-dos(45042)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042"
},
{
"name": "DSA-1783",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1783"
},
{
"name": "RHSA-2009:1289",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
},
{
"name": "32769",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/31769"
"url": "http://secunia.com/advisories/32769"
},
{
"name": "32759",
@ -163,9 +133,39 @@
"url": "http://secunia.com/advisories/32759"
},
{
"name" : "mysql-bitstring-dos(45042)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042"
"name": "34907",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34907"
},
{
"name": "[oss-security] 20080909 CVE request: MySQL empty bit-string literal server crash",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/09/09/4"
},
{
"name": "SUSE-SR:2008:025",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
},
{
"name": "36566",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36566"
},
{
"name": "31769",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31769"
},
{
"name": "1020858",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020858"
},
{
"name": "oval:org.mitre.oval:def:10521",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20080916 [ECHO_ADV_101$2008] Attachmax Dolphin <= 2.1.0 Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/496427/100/0/threaded"
"name": "http://e-rdc.org/v1/news.php?readmore=108",
"refsource": "MISC",
"url": "http://e-rdc.org/v1/news.php?readmore=108"
},
{
"name": "31794",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31794"
},
{
"name": "6468",
@ -63,9 +68,9 @@
"url": "https://www.exploit-db.com/exploits/6468"
},
{
"name" : "http://e-rdc.org/v1/news.php?readmore=108",
"refsource" : "MISC",
"url" : "http://e-rdc.org/v1/news.php?readmore=108"
"name": "20080916 [ECHO_ADV_101$2008] Attachmax Dolphin <= 2.1.0 Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/496427/100/0/threaded"
},
{
"name": "31207",
@ -77,11 +82,6 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/48270"
},
{
"name" : "31794",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31794"
},
{
"name": "4307",
"refsource": "SREASON",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "imagebrowser-index-directory-traversal(45490)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45490"
},
{
"name": "6618",
"refsource": "EXPLOIT-DB",
@ -66,11 +71,6 @@
"name": "4464",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4464"
},
{
"name" : "imagebrowser-index-directory-traversal(45490)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45490"
}
]
}

View File

@ -57,25 +57,25 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497970"
},
{
"name" : "31993",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31993"
},
{
"name": "32272",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32272"
},
{
"name" : "4550",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4550"
"name": "31993",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31993"
},
{
"name": "typo-commentauthor-commenturl-xss(46204)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46204"
},
{
"name": "4550",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4550"
}
]
}

View File

@ -57,25 +57,25 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497970"
},
{
"name" : "31993",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31993"
},
{
"name": "32272",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32272"
},
{
"name" : "4550",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4550"
"name": "31993",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31993"
},
{
"name": "typo-searchpublishedat-sql-injection(46205)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46205"
},
{
"name": "4550",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4550"
}
]
}

View File

@ -62,11 +62,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31987"
},
{
"name" : "ADV-2008-2956",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2956"
},
{
"name": "4560",
"refsource": "SREASON",
@ -76,6 +71,11 @@
"name": "djvu-msoffice-activex-bo(46214)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46214"
},
{
"name": "ADV-2008-2956",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2956"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2151",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "RHSA-2013:0925",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0925.html"
},
{
"name": "60473",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/60473"
},
{
"name": "RHSA-2013:0925",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0925.html"
},
{
"name": "enterprise-cve20132151-priv-esc(84868)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2251",
"STATE": "PUBLIC"
},
@ -52,21 +52,36 @@
},
"references": {
"reference_data": [
{
"name": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html",
"refsource": "CONFIRM",
"url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "apache-archiva-ognl-command-exec(90392)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392"
},
{
"name": "20131013 Apache Software Foundation A Subsite Remote command execution",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Oct/96"
},
{
"name" : "[oss-security] 20140114 Re: CVE Request: Apache Archiva Remote Command Execution 0day",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q1/89"
},
{
"name": "http://cxsecurity.com/issue/WLB-2014010087",
"refsource": "MISC",
"url": "http://cxsecurity.com/issue/WLB-2014010087"
},
{
"name": "20131023 Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2"
},
{
"name": "http://struts.apache.org/release/2.3.x/docs/s2-016.html",
"refsource": "CONFIRM",
@ -77,55 +92,40 @@
"refsource": "CONFIRM",
"url": "http://archiva.apache.org/security.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html",
"refsource" : "CONFIRM",
"url" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html"
},
{
"name" : "20131023 Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2"
},
{
"name" : "64758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64758"
},
{
"name" : "61189",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/61189"
},
{
"name": "98445",
"refsource": "OSVDB",
"url": "http://osvdb.org/98445"
},
{
"name" : "1029184",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029184"
},
{
"name": "1032916",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032916"
},
{
"name" : "apache-archiva-ognl-command-exec(90392)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392"
"name": "61189",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61189"
},
{
"name": "1029184",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029184"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "[oss-security] 20140114 Re: CVE Request: Apache Archiva Remote Command Execution 0day",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q1/89"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-2354",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=e398990eb87785e20e065cd3f14d1dbb69df4392",
"refsource" : "CONFIRM",
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=e398990eb87785e20e065cd3f14d1dbb69df4392"
},
{
"name": "USN-1790-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1790-1"
},
{
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=e398990eb87785e20e065cd3f14d1dbb69df4392",
"refsource": "CONFIRM",
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=e398990eb87785e20e065cd3f14d1dbb69df4392"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://kb.juniper.net/KB27375",
"refsource" : "CONFIRM",
"url" : "https://kb.juniper.net/KB27375"
},
{
"name": "1028529",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028529"
},
{
"name" : "53359",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/53359"
"name": "https://kb.juniper.net/KB27375",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/KB27375"
},
{
"name": "juniper-smartpass-cve20133498-xss(84110)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84110"
},
{
"name": "53359",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53359"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-3794",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
"name": "openSUSE-SU-2013:1335",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html"
},
{
"name": "SUSE-SU-2013:1390",
@ -68,9 +68,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html"
},
{
"name" : "openSUSE-SU-2013:1335",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html"
"name": "95333",
"refsource": "OSVDB",
"url": "http://osvdb.org/95333"
},
{
"name": "openSUSE-SU-2013:1410",
@ -82,15 +82,15 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name": "61222",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61222"
},
{
"name" : "95333",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/95333"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3865",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:18813",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18813"
},
{
"name": "MS13-076",
"refsource": "MS",
@ -61,11 +66,6 @@
"name": "TA13-253A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A"
},
{
"name" : "oval:org.mitre.oval:def:18813",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18813"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://kb.isc.org/article/AA-00967/",
"refsource" : "CONFIRM",
"url" : "https://kb.isc.org/article/AA-00967/"
"name": "APPLE-SA-2014-10-16-3",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html"
},
{
"name": "https://support.apple.com/kb/HT6536",
@ -63,9 +63,9 @@
"url": "https://support.apple.com/kb/HT6536"
},
{
"name" : "APPLE-SA-2014-10-16-3",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html"
"name": "https://kb.isc.org/article/AA-00967/",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/article/AA-00967/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-3989",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21653287",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21653287"
},
{
"name": "appscan-cve20133989-info-disclosure(84975)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84975"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21653287",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21653287"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-6027",
"STATE": "PUBLIC"
},

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "DSA-2883",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"name": "https://src.chromium.org/viewvc/blink?revision=164538&view=revision",
"refsource": "CONFIRM",
"url": "https://src.chromium.org/viewvc/blink?revision=164538&view=revision"
},
{
"name": "openSUSE-SU-2014:0327",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00006.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html",
"refsource": "CONFIRM",
@ -61,21 +76,6 @@
"name": "https://code.google.com/p/chromium/issues/detail?id=331060",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=331060"
},
{
"name" : "https://src.chromium.org/viewvc/blink?revision=164538&view=revision",
"refsource" : "CONFIRM",
"url" : "https://src.chromium.org/viewvc/blink?revision=164538&view=revision"
},
{
"name" : "DSA-2883",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2883"
},
{
"name" : "openSUSE-SU-2014:0327",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-03/msg00006.html"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://scn.sap.com/docs/DOC-8218",
"refsource" : "CONFIRM",
"url" : "http://scn.sap.com/docs/DOC-8218"
},
{
"name": "http://www.sybase.com/detail?id=1099371",
"refsource": "CONFIRM",
"url": "http://www.sybase.com/detail?id=1099371"
},
{
"name" : "https://service.sap.com/sap/support/notes/1893561",
"name": "http://scn.sap.com/docs/DOC-8218",
"refsource": "CONFIRM",
"url" : "https://service.sap.com/sap/support/notes/1893561"
"url": "http://scn.sap.com/docs/DOC-8218"
},
{
"name": "55537",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55537"
},
{
"name": "https://service.sap.com/sap/support/notes/1893561",
"refsource": "CONFIRM",
"url": "https://service.sap.com/sap/support/notes/1893561"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-7136",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "30358",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/30358/"
},
{
"name": "http://www.planitcomputing.ie/upc-wifi-attack.pdf",
"refsource": "MISC",
@ -66,6 +61,11 @@
"name": "cisco-epc2425-cve20137136-unauth-access(90133)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90133"
},
{
"name": "30358",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/30358/"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20131227 Re: Two CVE request for gnome-shell/screensaver issues",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/12/27/8"
},
{
"name" : "[oss-security] 20131227 Re: Two CVE request for gnome-shell/screensaver issues",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/12/27/6"
},
{
"name" : "[oss-security] 20131227 Two CVE request for gnome-shell/screensaver issues",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/12/27/4"
},
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=686740",
"name": "https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j",
"refsource": "CONFIRM",
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=686740"
"url": "https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1030431",
@ -78,9 +63,24 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1030431"
},
{
"name" : "https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j",
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=686740",
"refsource": "CONFIRM",
"url" : "https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j"
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=686740"
},
{
"name": "[oss-security] 20131227 Two CVE request for gnome-shell/screensaver issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/12/27/4"
},
{
"name": "[oss-security] 20131227 Re: Two CVE request for gnome-shell/screensaver issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/12/27/6"
},
{
"name": "[oss-security] 20131227 Re: Two CVE request for gnome-shell/screensaver issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/12/27/8"
}
]
}

View File

@ -54,9 +54,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
"name": "1038941",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038941"
},
{
"name": "99787",
@ -64,9 +64,9 @@
"url": "http://www.securityfocus.com/bid/99787"
},
{
"name" : "1038941",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038941"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
}
]
}

View File

@ -53,11 +53,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name": "99656",
"refsource": "BID",
@ -67,6 +62,11 @@
"name": "1038941",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038941"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
}
]
}

View File

@ -53,11 +53,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name": "99814",
"refsource": "BID",
@ -67,6 +62,11 @@
"name": "1038932",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038932"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
}
]
}

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01"
},
{
"name": "101510",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101510"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-17072",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html"
},
{
"name": "https://github.com/erikd/libsndfile/issues/344",
"refsource": "MISC",
"url": "https://github.com/erikd/libsndfile/issues/344"
},
{
"name": "[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20180108 [SECURITY] [DLA 1235-1] opencv security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html"
},
{
"name": "[debian-lts-announce] 20180722 [SECURITY] [DLA 1438-1] opencv security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html"
},
{
"name": "[debian-lts-announce] 20180108 [SECURITY] [DLA 1235-1] opencv security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html"
},
{
"name": "https://github.com/opencv/opencv/issues/10351",
"refsource": "MISC",

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://wpvulndb.com/vulnerabilities/8820",
"refsource" : "MISC",
"url" : "https://wpvulndb.com/vulnerabilities/8820"
},
{
"name" : "https://codex.wordpress.org/Version_4.7.5",
"refsource" : "CONFIRM",
"url" : "https://codex.wordpress.org/Version_4.7.5"
},
{
"name" : "https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3",
"refsource" : "CONFIRM",
"url" : "https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3"
"name": "1038520",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038520"
},
{
"name": "https://wordpress.org/news/2017/05/wordpress-4-7-5/",
@ -83,9 +73,19 @@
"url": "http://www.securityfocus.com/bid/98509"
},
{
"name" : "1038520",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038520"
"name": "https://wpvulndb.com/vulnerabilities/8820",
"refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/8820"
},
{
"name": "https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3",
"refsource": "CONFIRM",
"url": "https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3"
},
{
"name": "https://codex.wordpress.org/Version_4.7.5",
"refsource": "CONFIRM",
"url": "https://codex.wordpress.org/Version_4.7.5"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=1042326",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=1042326"
},
{
"name" : "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=5a22de904a0a366ae79f03ff1e13a1232a89e26b",
"refsource" : "CONFIRM",
"url" : "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=5a22de904a0a366ae79f03ff1e13a1232a89e26b"
},
{
"name" : "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=f9494b3f258e01b6af8bd3941ce436bcc00afc56",
"refsource" : "CONFIRM",
"url" : "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=f9494b3f258e01b6af8bd3941ce436bcc00afc56"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
@ -77,6 +62,11 @@
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=5a22de904a0a366ae79f03ff1e13a1232a89e26b",
"refsource": "CONFIRM",
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=5a22de904a0a366ae79f03ff1e13a1232a89e26b"
},
{
"name": "DSA-3880",
"refsource": "DEBIAN",
@ -86,6 +76,16 @@
"name": "99046",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99046"
},
{
"name": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=f9494b3f258e01b6af8bd3941ce436bcc00afc56",
"refsource": "CONFIRM",
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=f9494b3f258e01b6af8bd3941ce436bcc00afc56"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1042326",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1042326"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-ise-csrf",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-ise-csrf"
},
{
"name": "104950",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104950"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-ise-csrf",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-ise-csrf"
},
{
"name": "1041408",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-01-22",
"ID": "CVE-2018-1000015",
"REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins Pipeline: Nodes and Processes Plugin",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.17 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins Pipeline: Nodes and Processes Plugin"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Incorrect Access Control"
"value": "n/a"
}
]
}

View File

@ -1,14 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"DATE_ASSIGNED" : "2018-01-22",
"ID": "CVE-2018-1000016",
"REQUESTER" : "ml@beckweb.net",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-12-19T20:52:45.262092",
"DATE_REQUESTED": "2018-12-13T17:03:00",
"ID": "CVE-2018-1000875",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "BOINC Server and Website Code",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "0.9-1.0.2"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Berkeley Open Infrastructure for Network Computing"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-302: Authentication Bypass by Assumed-Immutable Data"
"value": "n/a"
}
]
}

View File

@ -52,36 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00036.html"
},
{
"name" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ef252e7dc214bcbd9a2539216aab9202848602bb",
"refsource" : "MISC",
"url" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ef252e7dc214bcbd9a2539216aab9202848602bb"
},
{
"name" : "http://git.ghostscript.com/?p=ghostpdl.git;h=606a22e77e7f081781e99e44644cd0119f559e03",
"refsource" : "MISC",
"url" : "http://git.ghostscript.com/?p=ghostpdl.git;h=606a22e77e7f081781e99e44644cd0119f559e03"
},
{
"name" : "https://bugs.ghostscript.com/show_bug.cgi?id=700168",
"refsource" : "MISC",
"url" : "https://bugs.ghostscript.com/show_bug.cgi?id=700168"
},
{
"name" : "https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26",
"refsource" : "MISC",
"url" : "https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26"
},
{
"name" : "https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf",
"refsource" : "MISC",
"url" : "https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf"
},
{
"name": "DSA-4346",
"refsource": "DEBIAN",
@ -97,10 +67,40 @@
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3831-1/"
},
{
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=700168",
"refsource": "MISC",
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=700168"
},
{
"name": "https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf",
"refsource": "MISC",
"url": "https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf"
},
{
"name": "106154",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106154"
},
{
"name": "[debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00036.html"
},
{
"name": "https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26",
"refsource": "MISC",
"url": "https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26"
},
{
"name": "http://git.ghostscript.com/?p=ghostpdl.git;h=606a22e77e7f081781e99e44644cd0119f559e03",
"refsource": "MISC",
"url": "http://git.ghostscript.com/?p=ghostpdl.git;h=606a22e77e7f081781e99e44644cd0119f559e03"
},
{
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ef252e7dc214bcbd9a2539216aab9202848602bb",
"refsource": "MISC",
"url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ef252e7dc214bcbd9a2539216aab9202848602bb"
}
]
}

View File

@ -52,61 +52,46 @@
},
"references": {
"reference_data": [
{
"name": "https://bugs.php.net/bug.php?id=77160",
"refsource": "MISC",
"url": "https://bugs.php.net/bug.php?id=77160"
},
{
"name": "45914",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45914/"
},
{
"name" : "[debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/12/msg00006.html"
},
{
"name": "[debian-lts-announce] 20190301 [SECURITY] [DLA 1700-1] uw-imap security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00001.html"
},
{
"name" : "https://antichat.com/threads/463395/#post-4254681",
"refsource" : "MISC",
"url" : "https://antichat.com/threads/463395/#post-4254681"
"name": "https://security.netapp.com/advisory/ntap-20181221-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181221-0004/"
},
{
"name" : "https://bugs.debian.org/913775",
"refsource" : "MISC",
"url" : "https://bugs.debian.org/913775"
"name": "1042157",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1042157"
},
{
"name" : "https://bugs.debian.org/913835",
"refsource" : "MISC",
"url" : "https://bugs.debian.org/913835"
},
{
"name" : "https://bugs.debian.org/913836",
"refsource" : "MISC",
"url" : "https://bugs.debian.org/913836"
},
{
"name" : "https://bugs.php.net/bug.php?id=76428",
"refsource" : "MISC",
"url" : "https://bugs.php.net/bug.php?id=76428"
},
{
"name" : "https://bugs.php.net/bug.php?id=77153",
"refsource" : "MISC",
"url" : "https://bugs.php.net/bug.php?id=77153"
},
{
"name" : "https://bugs.php.net/bug.php?id=77160",
"refsource" : "MISC",
"url" : "https://bugs.php.net/bug.php?id=77160"
"name": "DSA-4353",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4353"
},
{
"name": "https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php",
"refsource": "MISC",
"url": "https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php"
},
{
"name": "https://bugs.debian.org/913835",
"refsource": "MISC",
"url": "https://bugs.debian.org/913835"
},
{
"name": "https://www.openwall.com/lists/oss-security/2018/11/22/3",
"refsource": "MISC",
@ -117,25 +102,40 @@
"refsource": "CONFIRM",
"url": "https://git.php.net/?p=php-src.git;a=commit;h=e5bfea64c81ae34816479bb05d17cdffe45adddb"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20181221-0004/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20181221-0004/"
},
{
"name" : "DSA-4353",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4353"
},
{
"name": "106018",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106018"
},
{
"name" : "1042157",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1042157"
"name": "https://bugs.php.net/bug.php?id=76428",
"refsource": "MISC",
"url": "https://bugs.php.net/bug.php?id=76428"
},
{
"name": "https://bugs.debian.org/913775",
"refsource": "MISC",
"url": "https://bugs.debian.org/913775"
},
{
"name": "https://bugs.debian.org/913836",
"refsource": "MISC",
"url": "https://bugs.debian.org/913836"
},
{
"name": "https://antichat.com/threads/463395/#post-4254681",
"refsource": "MISC",
"url": "https://antichat.com/threads/463395/#post-4254681"
},
{
"name": "https://bugs.php.net/bug.php?id=77153",
"refsource": "MISC",
"url": "https://bugs.php.net/bug.php?id=77153"
},
{
"name": "[debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00006.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "45946",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45946/"
},
{
"name": "https://github.com/domainmod/domainmod/issues/82",
"refsource": "MISC",
"url": "https://github.com/domainmod/domainmod/issues/82"
},
{
"name": "45946",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45946/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "secure@dell.com",
"ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2018-09-13T04:00:00.000Z",
"ID": "CVE-2018-1198",
"STATE": "PUBLIC"

View File

@ -81,15 +81,15 @@
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22015943"
},
{
"name" : "1041225",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041225"
},
{
"name": "ibm-filenet-cve20181555-xss(142892)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/142892"
},
{
"name": "1041225",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041225"
}
]
}