"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:12:20 +00:00
parent 4b0aad357e
commit af89c5b094
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 4086 additions and 4032 deletions

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "5075",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5075"
"name": "28831",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28831"
},
{
"name": "27664",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/27664"
},
{
"name" : "28831",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28831"
"name": "5075",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5075"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0613"
},
{
"name" : "1019451",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019451"
},
{
"name": "29041",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29041"
},
{
"name": "1019451",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019451"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS08-002_e/index-e.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS08-002_e/index-e.html"
},
{
"name" : "27900",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27900"
},
{
"name": "ADV-2008-0617",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0617"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS08-002_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS08-002_e/index-e.html"
},
{
"name": "29028",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29028"
},
{
"name": "27900",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27900"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "GLSA-200804-29",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200804-29.xml"
},
{
"name": "FEDORA-2008-2981",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00171.html"
},
{
"name": "comix-temporary-directories-dos(41854)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41854"
},
{
"name": "FEDORA-2008-2993",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00183.html"
},
{
"name" : "GLSA-200804-29",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200804-29.xml"
},
{
"name": "29956",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29956"
},
{
"name" : "comix-temporary-directories-dos(41854)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41854"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-20080701-2/",
"refsource" : "CONFIRM",
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-20080701-2/"
"name": "phpmyadmin-typo3-unspecified-xss(43508)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43508"
},
{
"name": "30039",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30039"
},
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-20080701-2/",
"refsource": "CONFIRM",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-20080701-2/"
},
{
"name": "30884",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30884"
},
{
"name" : "phpmyadmin-typo3-unspecified-xss(43508)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43508"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "ffmpeg-demuxer-dos(44210)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44210"
},
{
"name": "[oss-security] 20080713 CVE requests: crashers by zzuf",
"refsource": "MLIST",
@ -62,16 +67,6 @@
"refsource": "MISC",
"url": "https://roundup.mplayerhq.hu/roundup/ffmpeg/issue530"
},
{
"name" : "http://bugzilla.gnome.org/show_bug.cgi?id=542643",
"refsource" : "CONFIRM",
"url" : "http://bugzilla.gnome.org/show_bug.cgi?id=542643"
},
{
"name" : "MDVSA-2009:297",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:297"
},
{
"name": "31234",
"refsource": "BID",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/31899"
},
{
"name" : "ffmpeg-demuxer-dos(44210)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44210"
"name": "http://bugzilla.gnome.org/show_bug.cgi?id=542643",
"refsource": "CONFIRM",
"url": "http://bugzilla.gnome.org/show_bug.cgi?id=542643"
},
{
"name": "MDVSA-2009:297",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:297"
}
]
}

View File

@ -58,14 +58,9 @@
"url": "https://www.exploit-db.com/exploits/6092"
},
{
"name" : "30272",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30272"
},
{
"name" : "31134",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31134"
"name": "videoshareenterprise-album-sql-injection(43861)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43861"
},
{
"name": "4075",
@ -73,9 +68,14 @@
"url": "http://securityreason.com/securityalert/4075"
},
{
"name" : "videoshareenterprise-album-sql-injection(43861)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43861"
"name": "31134",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31134"
},
{
"name": "30272",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30272"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-3427",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=619467",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=619467"
},
{
"name" : "30676",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30676"
"name": "freeway-searchlinks-xss(44427)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44427"
},
{
"name": "31475",
@ -68,9 +63,14 @@
"url": "http://secunia.com/advisories/31475"
},
{
"name" : "freeway-searchlinks-xss(44427)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44427"
"name": "30676",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30676"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=619467",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=619467"
}
]
}

View File

@ -52,30 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "6480",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6480"
},
{
"name" : "http://packetstormsecurity.org/0809-exploits/x10media-rfi.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/0809-exploits/x10media-rfi.txt"
},
{
"name": "31225",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31225"
},
{
"name" : "ADV-2008-2608",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2608"
},
{
"name" : "31920",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31920"
"name": "http://packetstormsecurity.org/0809-exploits/x10media-rfi.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0809-exploits/x10media-rfi.txt"
},
{
"name": "4294",
@ -86,6 +71,21 @@
"name": "x10-webroot-file-include(45224)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45224"
},
{
"name": "31920",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31920"
},
{
"name": "6480",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6480"
},
{
"name": "ADV-2008-2608",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2608"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT3338",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3338"
},
{
"name" : "APPLE-SA-2008-12-15",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"
},
{
"name" : "TA08-350A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-350A.html"
},
{
"name" : "32839",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32839"
"name": "ADV-2008-3444",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3444"
},
{
"name": "32872",
@ -78,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/32872"
},
{
"name" : "ADV-2008-3444",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3444"
"name": "TA08-350A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html"
},
{
"name": "1021410",
@ -91,6 +76,21 @@
"name": "33179",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33179"
},
{
"name": "32839",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32839"
},
{
"name": "http://support.apple.com/kb/HT3338",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3338"
},
{
"name": "APPLE-SA-2008-12-15",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-4306",
"STATE": "PUBLIC"
},
@ -52,110 +52,110 @@
},
"references": {
"reference_data": [
{
"name" : "20081117 rPSA-2008-0321-1 enscript",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/498385/100/0/threaded"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0321",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0321"
},
{
"name" : "https://issues.rpath.com/browse/RPL-2887",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-2887"
},
{
"name" : "DSA-1670",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1670"
},
{
"name" : "FEDORA-2008-9351",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00014.html"
},
{
"name" : "FEDORA-2008-9372",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00040.html"
},
{
"name" : "GLSA-200812-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200812-02.xml"
},
{
"name" : "MDVSA-2008:243",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:243"
},
{
"name" : "RHSA-2008:1016",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-1016.html"
},
{
"name" : "RHSA-2008:1021",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2008-1021.html"
},
{
"name" : "SUSE-SR:2008:024",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html"
},
{
"name" : "USN-660-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-660-1"
},
{
"name" : "49569",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/49569"
},
{
"name": "oval:org.mitre.oval:def:10718",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10718"
},
{
"name" : "32530",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32530"
},
{
"name" : "33109",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33109"
},
{
"name" : "32970",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32970"
},
{
"name": "32521",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32521"
},
{
"name" : "32753",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32753"
"name": "49569",
"refsource": "OSVDB",
"url": "http://osvdb.org/49569"
},
{
"name": "SUSE-SR:2008:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html"
},
{
"name": "FEDORA-2008-9372",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00040.html"
},
{
"name": "FEDORA-2008-9351",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00014.html"
},
{
"name": "RHSA-2008:1016",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-1016.html"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm"
},
{
"name": "USN-660-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-660-1"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0321",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0321"
},
{
"name": "GLSA-200812-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200812-02.xml"
},
{
"name": "20081117 rPSA-2008-0321-1 enscript",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/498385/100/0/threaded"
},
{
"name": "https://issues.rpath.com/browse/RPL-2887",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2887"
},
{
"name": "32854",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32854"
},
{
"name": "MDVSA-2008:243",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:243"
},
{
"name": "32970",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32970"
},
{
"name": "32530",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32530"
},
{
"name": "DSA-1670",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1670"
},
{
"name": "32753",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32753"
},
{
"name": "33109",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33109"
},
{
"name": "RHSA-2008:1021",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2008-1021.html"
}
]
}

View File

@ -52,26 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20081011 CA BrightStor ARCServe BackUp Message Engine Remote Command Injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/497281/100/0/threaded"
},
{
"name" : "20081009 CA ARCserve Backup Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/497218"
},
{
"name" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143",
"refsource" : "CONFIRM",
"url" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143"
},
{
"name": "31684",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31684"
},
{
"name": "ca-arcservebackup-message-command-execution(45774)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45774"
},
{
"name": "ADV-2008-2777",
"refsource": "VUPEN",
@ -82,20 +72,30 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021032"
},
{
"name": "20081011 CA BrightStor ARCServe BackUp Message Engine Remote Command Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497281/100/0/threaded"
},
{
"name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143",
"refsource": "CONFIRM",
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143"
},
{
"name": "32220",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32220"
},
{
"name": "20081009 CA ARCserve Backup Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497218"
},
{
"name": "4412",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4412"
},
{
"name" : "ca-arcservebackup-message-command-execution(45774)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45774"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20080916 Failed assertion in the Unreal engine",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/496399/100/0/threaded"
"name": "31205",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31205"
},
{
"name": "20080916 Failed assertion in the Unreal engine",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0321.html"
},
{
"name" : "31205",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31205"
},
{
"name": "48293",
"refsource": "OSVDB",
"url": "http://osvdb.org/48293"
},
{
"name": "20080916 Failed assertion in the Unreal engine",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/496399/100/0/threaded"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-2464",
"STATE": "PUBLIC"
},
@ -53,129 +53,59 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
},
{
"name" : "HPSBUX02922",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "SSRT101305",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "HPSBUX02907",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
"name": "RHSA-2013:1060",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
},
{
"name": "HPSBUX02908",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137545592101387&w=2"
},
{
"name" : "RHSA-2013:0963",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
},
{
"name" : "RHSA-2013:1081",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
},
{
"name" : "RHSA-2013:1060",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
},
{
"name" : "RHSA-2013:1455",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name" : "RHSA-2013:1456",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name" : "RHSA-2013:1059",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
},
{
"name": "RHSA-2014:0414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "SUSE-SU-2013:1305",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
},
{
"name" : "SUSE-SU-2013:1293",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
},
{
"name" : "SUSE-SU-2013:1255",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
},
{
"name" : "SUSE-SU-2013:1256",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
},
{
"name" : "SUSE-SU-2013:1257",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
},
{
"name" : "SUSE-SU-2013:1263",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
},
{
"name" : "SUSE-SU-2013:1264",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"
},
{
"name" : "TA13-169A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-169A"
},
{
"name" : "60631",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/60631"
},
{
"name" : "oval:org.mitre.oval:def:16389",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16389"
},
{
"name": "oval:org.mitre.oval:def:19227",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19227"
},
{
"name" : "oval:org.mitre.oval:def:19390",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19390"
"name": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
},
{
"name": "SUSE-SU-2013:1264",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"
},
{
"name": "SUSE-SU-2013:1257",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
},
{
"name": "HPSBUX02907",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
},
{
"name": "SUSE-SU-2013:1256",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
},
{
"name": "54154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54154"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "oval:org.mitre.oval:def:19708",
@ -183,9 +113,79 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19708"
},
{
"name" : "54154",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54154"
"name": "SSRT101305",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "60631",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/60631"
},
{
"name": "HPSBUX02922",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "SUSE-SU-2013:1263",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
},
{
"name": "RHSA-2013:1059",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
},
{
"name": "oval:org.mitre.oval:def:16389",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16389"
},
{
"name": "SUSE-SU-2013:1293",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
},
{
"name": "RHSA-2013:1081",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
},
{
"name": "TA13-169A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-169A"
},
{
"name": "oval:org.mitre.oval:def:19390",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19390"
},
{
"name": "RHSA-2013:0963",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
},
{
"name": "SUSE-SU-2013:1255",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
},
{
"name": "RHSA-2013:1456",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
},
{
"name": "SUSE-SU-2013:1305",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-2730",
"STATE": "PUBLIC"
},
@ -58,20 +58,15 @@
"url": "http://www.adobe.com/support/security/bulletins/apsb13-15.html"
},
{
"name" : "GLSA-201308-03",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201308-03.xml"
"name": "SUSE-SU-2013:0809",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html"
},
{
"name": "RHSA-2013:0826",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0826.html"
},
{
"name" : "SUSE-SU-2013:0809",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html"
},
{
"name": "59923",
"refsource": "BID",
@ -81,6 +76,11 @@
"name": "oval:org.mitre.oval:def:16631",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16631"
},
{
"name": "GLSA-201308-03",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201308-03.xml"
}
]
}

View File

@ -52,40 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20130528 [SECURITY][CVE-2013-2765][ModSecurity] Remote Null Pointer Dereference",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-05/0125.html"
},
{
"name": "[mod-security-users] 20130527 Availability of ModSecurity 2.7.4 Stable Release",
"refsource": "MLIST",
"url": "http://sourceforge.net/mailarchive/message.php?msg_id=30900019"
},
{
"name" : "http://www.shookalabs.com/",
"refsource" : "MISC",
"url" : "http://www.shookalabs.com/"
},
{
"name" : "https://github.com/shookalabs/exploits/blob/master/modsecurity_cve_2013_2765_check.py",
"refsource" : "MISC",
"url" : "https://github.com/shookalabs/exploits/blob/master/modsecurity_cve_2013_2765_check.py"
},
{
"name" : "https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba",
"refsource" : "MISC",
"url" : "https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba"
},
{
"name" : "http://www.modsecurity.org/",
"refsource" : "CONFIRM",
"url" : "http://www.modsecurity.org/"
},
{
"name" : "https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES",
"refsource" : "CONFIRM",
"url" : "https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES"
"name": "openSUSE-SU-2013:1342",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=967615",
@ -97,15 +72,40 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html"
},
{
"name": "20130528 [SECURITY][CVE-2013-2765][ModSecurity] Remote Null Pointer Dereference",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0125.html"
},
{
"name": "https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES",
"refsource": "CONFIRM",
"url": "https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES"
},
{
"name": "http://www.shookalabs.com/",
"refsource": "MISC",
"url": "http://www.shookalabs.com/"
},
{
"name": "http://www.modsecurity.org/",
"refsource": "CONFIRM",
"url": "http://www.modsecurity.org/"
},
{
"name": "https://github.com/shookalabs/exploits/blob/master/modsecurity_cve_2013_2765_check.py",
"refsource": "MISC",
"url": "https://github.com/shookalabs/exploits/blob/master/modsecurity_cve_2013_2765_check.py"
},
{
"name": "https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba",
"refsource": "MISC",
"url": "https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba"
},
{
"name": "openSUSE-SU-2013:1336",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html"
},
{
"name" : "openSUSE-SU-2013:1342",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html"
}
]
}

View File

@ -57,25 +57,25 @@
"refsource": "CONFIRM",
"url": "http://cs.cybozu.co.jp/information/20130415up11.php"
},
{
"name" : "http://jvn.jp/en/jp/JVN06251813/374951/index.html",
"refsource" : "CONFIRM",
"url" : "http://jvn.jp/en/jp/JVN06251813/374951/index.html"
},
{
"name": "JVN#06251813",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN06251813/index.html"
},
{
"name" : "JVNDB-2013-000034",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000034"
},
{
"name": "cybozuoffice-cve20133269-csrf(83812)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83812"
},
{
"name": "http://jvn.jp/en/jp/JVN06251813/374951/index.html",
"refsource": "CONFIRM",
"url": "http://jvn.jp/en/jp/JVN06251813/374951/index.html"
},
{
"name": "JVNDB-2013-000034",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000034"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6103",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6571",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "emr-cve20137096-sql-injection(89723)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89723"
},
{
"name": "https://erpscan.io/advisories/erpscan-13-024-sap-emr-unwired-multiple-sql-injections/",
"refsource": "MISC",
@ -62,20 +67,15 @@
"refsource": "CONFIRM",
"url": "http://scn.sap.com/docs/DOC-8218"
},
{
"name" : "https://service.sap.com/sap/support/notes/1864518",
"refsource" : "CONFIRM",
"url" : "https://service.sap.com/sap/support/notes/1864518"
},
{
"name": "64314",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64314"
},
{
"name" : "emr-cve20137096-sql-injection(89723)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/89723"
"name": "https://service.sap.com/sap/support/notes/1864518",
"refsource": "CONFIRM",
"url": "https://service.sap.com/sap/support/notes/1864518"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.fujitsu.com/jp/group/bsc/services/fence/info-2017080101.html",
"refsource" : "MISC",
"url" : "http://www.fujitsu.com/jp/group/bsc/services/fence/info-2017080101.html"
},
{
"name": "JVN#57205588",
"refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN57205588/index.html"
},
{
"name": "http://www.fujitsu.com/jp/group/bsc/services/fence/info-2017080101.html",
"refsource": "MISC",
"url": "http://www.fujitsu.com/jp/group/bsc/services/fence/info-2017080101.html"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/"
},
{
"name" : "https://www.nomotion.net/blog/sharknatto/",
"refsource" : "MISC",
"url" : "https://www.nomotion.net/blog/sharknatto/"
},
{
"name": "100585",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100585"
},
{
"name": "https://www.nomotion.net/blog/sharknatto/",
"refsource": "MISC",
"url": "https://www.nomotion.net/blog/sharknatto/"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "https://www.sec-consult.com/en/blog/advisories/email-verification-bypass-in-sap-e-recruiting/index.html",
"refsource": "MISC",
"url": "https://www.sec-consult.com/en/blog/advisories/email-verification-bypass-in-sap-e-recruiting/index.html"
},
{
"name": "https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://launchpad.support.sap.com/#/notes/2507798",
"refsource": "MISC",
"url": "https://launchpad.support.sap.com/#/notes/2507798"
},
{
"name" : "https://www.sec-consult.com/en/blog/advisories/email-verification-bypass-in-sap-e-recruiting/index.html",
"refsource" : "MISC",
"url" : "https://www.sec-consult.com/en/blog/advisories/email-verification-bypass-in-sap-e-recruiting/index.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-15436",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-17203",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.nasm.us/show_bug.cgi?id=3392433",
"refsource" : "MISC",
"url" : "https://bugzilla.nasm.us/show_bug.cgi?id=3392433"
},
{
"name": "USN-3694-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3694-1/"
},
{
"name": "https://bugzilla.nasm.us/show_bug.cgi?id=3392433",
"refsource": "MISC",
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392433"
}
]
}

View File

@ -137,16 +137,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://kb.juniper.net/KB25385",
"refsource" : "MISC",
"url" : "https://kb.juniper.net/KB25385"
},
{
"name": "https://kb.juniper.net/JSA10864",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA10864"
},
{
"name": "https://kb.juniper.net/KB25385",
"refsource": "MISC",
"url": "https://kb.juniper.net/KB25385"
},
{
"name": "1041325",
"refsource": "SECTRACK",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ise",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ise"
},
{
"name": "1040717",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040717"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ise",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ise"
}
]
}

View File

@ -68,9 +68,9 @@
"references": {
"reference_data": [
{
"name" : "20181017 Cisco Wireless LAN Controller Software Information Disclosure Vulnerability",
"refsource" : "CISCO",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-id"
"name": "1041928",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041928"
},
{
"name": "105675",
@ -78,9 +78,9 @@
"url": "http://www.securityfocus.com/bid/105675"
},
{
"name" : "1041928",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041928"
"name": "20181017 Cisco Wireless LAN Controller Software Information Disclosure Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-id"
}
]
},

View File

@ -53,16 +53,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0911",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0911"
},
{
"name": "103281",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103281"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0911",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0911"
},
{
"name": "1040513",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-01-22",
"ID": "CVE-2018-1000011",
"REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins FindBugs Plugin",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "4.71 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins FindBugs Plugin"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "XML External Entity Processing"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-02-26",
"ID": "CVE-2018-1000105",
"REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins Gerrit Trigger Plugin",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.27.4 and older"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins project"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-285, CWE-201"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-12-19T20:52:45.260099",
"DATE_REQUESTED": "2018-12-17T16:15:43",
"ID": "CVE-2018-1000873",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "Jackson",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "Before 2.9.8"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Fasterxml"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-20: Improper Input Validation"
"value": "n/a"
}
]
}
@ -55,11 +55,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/FasterXML/jackson-modules-java8/issues/90",
"refsource" : "MISC",
"url" : "https://github.com/FasterXML/jackson-modules-java8/issues/90"
},
{
"name": "https://github.com/FasterXML/jackson-modules-java8/pull/87",
"refsource": "MISC",
@ -69,6 +64,11 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1665601",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665601"
},
{
"name": "https://github.com/FasterXML/jackson-modules-java8/issues/90",
"refsource": "MISC",
"url": "https://github.com/FasterXML/jackson-modules-java8/issues/90"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-17997",
"STATE" : "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,38 @@
"description_data": [
{
"lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "LayerBB 1.1.1 allows XSS via the titles of conversations (PMs)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://packetstormsecurity.com/files/151015/LayerBB-1.1.1-Cross-Site-Scripting.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/151015/LayerBB-1.1.1-Cross-Site-Scripting.html"
},
{
"refsource": "EXPLOIT-DB",
"name": "46079",
"url": "https://www.exploit-db.com/exploits/46079/"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/AndyRixon/LayerBB/commits/master",
"url": "https://github.com/AndyRixon/LayerBB/commits/master"
}
]
}

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-02",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-02"
},
{
"name": "106658",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106658"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-02"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/Dec/20"
},
{
"name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html"
},
{
"name": "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Dec/20"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
},
{
"name": "106162",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106162"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@microfocus.com",
"ASSIGNER": "security@suse.com",
"ID": "CVE-2018-1346",
"STATE": "PUBLIC",
"TITLE": "NetIQ eDirectory Denial of Service"

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-597741.pdf",
"refsource" : "CONFIRM",
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-597741.pdf"
},
{
"name": "103941",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103941"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-597741.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-597741.pdf"
}
]
}