mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
4b0aad357e
commit
af89c5b094
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "5075",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/5075"
|
||||
"name": "28831",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28831"
|
||||
},
|
||||
{
|
||||
"name": "27664",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/27664"
|
||||
},
|
||||
{
|
||||
"name" : "28831",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28831"
|
||||
"name": "5075",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5075"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0613"
|
||||
},
|
||||
{
|
||||
"name" : "1019451",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1019451"
|
||||
},
|
||||
{
|
||||
"name": "29041",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29041"
|
||||
},
|
||||
{
|
||||
"name": "1019451",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019451"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS08-002_e/index-e.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS08-002_e/index-e.html"
|
||||
},
|
||||
{
|
||||
"name" : "27900",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27900"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0617",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0617"
|
||||
},
|
||||
{
|
||||
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS08-002_e/index-e.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS08-002_e/index-e.html"
|
||||
},
|
||||
{
|
||||
"name": "29028",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29028"
|
||||
},
|
||||
{
|
||||
"name": "27900",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27900"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "GLSA-200804-29",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200804-29.xml"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-2981",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00171.html"
|
||||
},
|
||||
{
|
||||
"name": "comix-temporary-directories-dos(41854)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41854"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-2993",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00183.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200804-29",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200804-29.xml"
|
||||
},
|
||||
{
|
||||
"name": "29956",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29956"
|
||||
},
|
||||
{
|
||||
"name" : "comix-temporary-directories-dos(41854)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41854"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-20080701-2/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-20080701-2/"
|
||||
"name": "phpmyadmin-typo3-unspecified-xss(43508)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43508"
|
||||
},
|
||||
{
|
||||
"name": "30039",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30039"
|
||||
},
|
||||
{
|
||||
"name": "http://typo3.org/teams/security/security-bulletins/typo3-20080701-2/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://typo3.org/teams/security/security-bulletins/typo3-20080701-2/"
|
||||
},
|
||||
{
|
||||
"name": "30884",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30884"
|
||||
},
|
||||
{
|
||||
"name" : "phpmyadmin-typo3-unspecified-xss(43508)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43508"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ffmpeg-demuxer-dos(44210)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44210"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20080713 CVE requests: crashers by zzuf",
|
||||
"refsource": "MLIST",
|
||||
@ -62,16 +67,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://roundup.mplayerhq.hu/roundup/ffmpeg/issue530"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugzilla.gnome.org/show_bug.cgi?id=542643",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugzilla.gnome.org/show_bug.cgi?id=542643"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2009:297",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:297"
|
||||
},
|
||||
{
|
||||
"name": "31234",
|
||||
"refsource": "BID",
|
||||
@ -83,9 +78,14 @@
|
||||
"url": "http://secunia.com/advisories/31899"
|
||||
},
|
||||
{
|
||||
"name" : "ffmpeg-demuxer-dos(44210)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44210"
|
||||
"name": "http://bugzilla.gnome.org/show_bug.cgi?id=542643",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugzilla.gnome.org/show_bug.cgi?id=542643"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2009:297",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:297"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,14 +58,9 @@
|
||||
"url": "https://www.exploit-db.com/exploits/6092"
|
||||
},
|
||||
{
|
||||
"name" : "30272",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30272"
|
||||
},
|
||||
{
|
||||
"name" : "31134",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31134"
|
||||
"name": "videoshareenterprise-album-sql-injection(43861)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43861"
|
||||
},
|
||||
{
|
||||
"name": "4075",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://securityreason.com/securityalert/4075"
|
||||
},
|
||||
{
|
||||
"name" : "videoshareenterprise-album-sql-injection(43861)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43861"
|
||||
"name": "31134",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31134"
|
||||
},
|
||||
{
|
||||
"name": "30272",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30272"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2008-3427",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=619467",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=619467"
|
||||
},
|
||||
{
|
||||
"name" : "30676",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30676"
|
||||
"name": "freeway-searchlinks-xss(44427)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44427"
|
||||
},
|
||||
{
|
||||
"name": "31475",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://secunia.com/advisories/31475"
|
||||
},
|
||||
{
|
||||
"name" : "freeway-searchlinks-xss(44427)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44427"
|
||||
"name": "30676",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30676"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=619467",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=619467"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6480",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6480"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/0809-exploits/x10media-rfi.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/0809-exploits/x10media-rfi.txt"
|
||||
},
|
||||
{
|
||||
"name": "31225",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31225"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2608",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2608"
|
||||
},
|
||||
{
|
||||
"name" : "31920",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31920"
|
||||
"name": "http://packetstormsecurity.org/0809-exploits/x10media-rfi.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0809-exploits/x10media-rfi.txt"
|
||||
},
|
||||
{
|
||||
"name": "4294",
|
||||
@ -86,6 +71,21 @@
|
||||
"name": "x10-webroot-file-include(45224)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45224"
|
||||
},
|
||||
{
|
||||
"name": "31920",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31920"
|
||||
},
|
||||
{
|
||||
"name": "6480",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6480"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2608",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2608"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3338",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3338"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2008-12-15",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA08-350A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-350A.html"
|
||||
},
|
||||
{
|
||||
"name" : "32839",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/32839"
|
||||
"name": "ADV-2008-3444",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3444"
|
||||
},
|
||||
{
|
||||
"name": "32872",
|
||||
@ -78,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/32872"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-3444",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/3444"
|
||||
"name": "TA08-350A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html"
|
||||
},
|
||||
{
|
||||
"name": "1021410",
|
||||
@ -91,6 +76,21 @@
|
||||
"name": "33179",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33179"
|
||||
},
|
||||
{
|
||||
"name": "32839",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32839"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3338",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3338"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2008-12-15",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2008-4306",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,110 +52,110 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081117 rPSA-2008-0321-1 enscript",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/498385/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm"
|
||||
},
|
||||
{
|
||||
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0321",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0321"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.rpath.com/browse/RPL-2887",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.rpath.com/browse/RPL-2887"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1670",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2008/dsa-1670"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-9351",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-9372",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00040.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200812-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200812-02.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2008:243",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:243"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:1016",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-1016.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:1021",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2008-1021.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2008:024",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-660-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-660-1"
|
||||
},
|
||||
{
|
||||
"name" : "49569",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/49569"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10718",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10718"
|
||||
},
|
||||
{
|
||||
"name" : "32530",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32530"
|
||||
},
|
||||
{
|
||||
"name" : "33109",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33109"
|
||||
},
|
||||
{
|
||||
"name" : "32970",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32970"
|
||||
},
|
||||
{
|
||||
"name": "32521",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32521"
|
||||
},
|
||||
{
|
||||
"name" : "32753",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32753"
|
||||
"name": "49569",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/49569"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2008:024",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-9372",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00040.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-9351",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:1016",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-1016.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm"
|
||||
},
|
||||
{
|
||||
"name": "USN-660-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-660-1"
|
||||
},
|
||||
{
|
||||
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0321",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0321"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200812-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200812-02.xml"
|
||||
},
|
||||
{
|
||||
"name": "20081117 rPSA-2008-0321-1 enscript",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/498385/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-2887",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-2887"
|
||||
},
|
||||
{
|
||||
"name": "32854",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32854"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:243",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:243"
|
||||
},
|
||||
{
|
||||
"name": "32970",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32970"
|
||||
},
|
||||
{
|
||||
"name": "32530",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32530"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1670",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1670"
|
||||
},
|
||||
{
|
||||
"name": "32753",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32753"
|
||||
},
|
||||
{
|
||||
"name": "33109",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33109"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:1021",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2008-1021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081011 CA BrightStor ARCServe BackUp Message Engine Remote Command Injection Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/497281/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20081009 CA ARCserve Backup Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/497218"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143"
|
||||
},
|
||||
{
|
||||
"name": "31684",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31684"
|
||||
},
|
||||
{
|
||||
"name": "ca-arcservebackup-message-command-execution(45774)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45774"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2777",
|
||||
"refsource": "VUPEN",
|
||||
@ -82,20 +72,30 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021032"
|
||||
},
|
||||
{
|
||||
"name": "20081011 CA BrightStor ARCServe BackUp Message Engine Remote Command Injection Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/497281/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143"
|
||||
},
|
||||
{
|
||||
"name": "32220",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32220"
|
||||
},
|
||||
{
|
||||
"name": "20081009 CA ARCserve Backup Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/497218"
|
||||
},
|
||||
{
|
||||
"name": "4412",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4412"
|
||||
},
|
||||
{
|
||||
"name" : "ca-arcservebackup-message-command-execution(45774)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45774"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080916 Failed assertion in the Unreal engine",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/496399/100/0/threaded"
|
||||
"name": "31205",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31205"
|
||||
},
|
||||
{
|
||||
"name": "20080916 Failed assertion in the Unreal engine",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0321.html"
|
||||
},
|
||||
{
|
||||
"name" : "31205",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31205"
|
||||
},
|
||||
{
|
||||
"name": "48293",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/48293"
|
||||
},
|
||||
{
|
||||
"name": "20080916 Failed assertion in the Unreal engine",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/496399/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-2464",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,129 +53,59 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02922",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101305",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02907",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
|
||||
"name": "RHSA-2013:1060",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02908",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=137545592101387&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0963",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1081",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1060",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1455",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1456",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1059",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0414",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:1305",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:1293",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:1255",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:1256",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:1257",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:1263",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:1264",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA13-169A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-169A"
|
||||
},
|
||||
{
|
||||
"name" : "60631",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/60631"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16389",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16389"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:19227",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19227"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:19390",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19390"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1264",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1257",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02907",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1256",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
|
||||
},
|
||||
{
|
||||
"name": "54154",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/54154"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1455",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:19708",
|
||||
@ -183,9 +113,79 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19708"
|
||||
},
|
||||
{
|
||||
"name" : "54154",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/54154"
|
||||
"name": "SSRT101305",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
|
||||
},
|
||||
{
|
||||
"name": "60631",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/60631"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02922",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1263",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1059",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16389",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16389"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1293",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1081",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
|
||||
},
|
||||
{
|
||||
"name": "TA13-169A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-169A"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:19390",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19390"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0963",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1255",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1456",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1305",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2013-2730",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,20 +58,15 @@
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb13-15.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201308-03",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201308-03.xml"
|
||||
"name": "SUSE-SU-2013:0809",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0826",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0826.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0809",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "59923",
|
||||
"refsource": "BID",
|
||||
@ -81,6 +76,11 @@
|
||||
"name": "oval:org.mitre.oval:def:16631",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16631"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201308-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201308-03.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20130528 [SECURITY][CVE-2013-2765][ModSecurity] Remote Null Pointer Dereference",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-05/0125.html"
|
||||
},
|
||||
{
|
||||
"name": "[mod-security-users] 20130527 Availability of ModSecurity 2.7.4 Stable Release",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://sourceforge.net/mailarchive/message.php?msg_id=30900019"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.shookalabs.com/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.shookalabs.com/"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/shookalabs/exploits/blob/master/modsecurity_cve_2013_2765_check.py",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/shookalabs/exploits/blob/master/modsecurity_cve_2013_2765_check.py"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.modsecurity.org/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.modsecurity.org/"
|
||||
},
|
||||
{
|
||||
"name" : "https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES"
|
||||
"name": "openSUSE-SU-2013:1342",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=967615",
|
||||
@ -97,15 +72,40 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html"
|
||||
},
|
||||
{
|
||||
"name": "20130528 [SECURITY][CVE-2013-2765][ModSecurity] Remote Null Pointer Dereference",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0125.html"
|
||||
},
|
||||
{
|
||||
"name": "https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES"
|
||||
},
|
||||
{
|
||||
"name": "http://www.shookalabs.com/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.shookalabs.com/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.modsecurity.org/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.modsecurity.org/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/shookalabs/exploits/blob/master/modsecurity_cve_2013_2765_check.py",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/shookalabs/exploits/blob/master/modsecurity_cve_2013_2765_check.py"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1336",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:1342",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cs.cybozu.co.jp/information/20130415up11.php"
|
||||
},
|
||||
{
|
||||
"name" : "http://jvn.jp/en/jp/JVN06251813/374951/index.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://jvn.jp/en/jp/JVN06251813/374951/index.html"
|
||||
},
|
||||
{
|
||||
"name": "JVN#06251813",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN06251813/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2013-000034",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000034"
|
||||
},
|
||||
{
|
||||
"name": "cybozuoffice-cve20133269-csrf(83812)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83812"
|
||||
},
|
||||
{
|
||||
"name": "http://jvn.jp/en/jp/JVN06251813/374951/index.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://jvn.jp/en/jp/JVN06251813/374951/index.html"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2013-000034",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000034"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6103",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6571",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "emr-cve20137096-sql-injection(89723)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89723"
|
||||
},
|
||||
{
|
||||
"name": "https://erpscan.io/advisories/erpscan-13-024-sap-emr-unwired-multiple-sql-injections/",
|
||||
"refsource": "MISC",
|
||||
@ -62,20 +67,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://scn.sap.com/docs/DOC-8218"
|
||||
},
|
||||
{
|
||||
"name" : "https://service.sap.com/sap/support/notes/1864518",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://service.sap.com/sap/support/notes/1864518"
|
||||
},
|
||||
{
|
||||
"name": "64314",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/64314"
|
||||
},
|
||||
{
|
||||
"name" : "emr-cve20137096-sql-injection(89723)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/89723"
|
||||
"name": "https://service.sap.com/sap/support/notes/1864518",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://service.sap.com/sap/support/notes/1864518"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.fujitsu.com/jp/group/bsc/services/fence/info-2017080101.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.fujitsu.com/jp/group/bsc/services/fence/info-2017080101.html"
|
||||
},
|
||||
{
|
||||
"name": "JVN#57205588",
|
||||
"refsource": "JVN",
|
||||
"url": "https://jvn.jp/en/jp/JVN57205588/index.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.fujitsu.com/jp/group/bsc/services/fence/info-2017080101.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.fujitsu.com/jp/group/bsc/services/fence/info-2017080101.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.nomotion.net/blog/sharknatto/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.nomotion.net/blog/sharknatto/"
|
||||
},
|
||||
{
|
||||
"name": "100585",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/100585"
|
||||
},
|
||||
{
|
||||
"name": "https://www.nomotion.net/blog/sharknatto/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.nomotion.net/blog/sharknatto/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://www.sec-consult.com/en/blog/advisories/email-verification-bypass-in-sap-e-recruiting/index.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.sec-consult.com/en/blog/advisories/email-verification-bypass-in-sap-e-recruiting/index.html"
|
||||
},
|
||||
{
|
||||
"name": "https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2507798",
|
||||
"refsource": "MISC",
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2507798"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.sec-consult.com/en/blog/advisories/email-verification-bypass-in-sap-e-recruiting/index.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.sec-consult.com/en/blog/advisories/email-verification-bypass-in-sap-e-recruiting/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-15436",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-17203",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.nasm.us/show_bug.cgi?id=3392433",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.nasm.us/show_bug.cgi?id=3392433"
|
||||
},
|
||||
{
|
||||
"name": "USN-3694-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3694-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.nasm.us/show_bug.cgi?id=3392433",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392433"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -137,16 +137,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://kb.juniper.net/KB25385",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://kb.juniper.net/KB25385"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.juniper.net/JSA10864",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.juniper.net/JSA10864"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.juniper.net/KB25385",
|
||||
"refsource": "MISC",
|
||||
"url": "https://kb.juniper.net/KB25385"
|
||||
},
|
||||
{
|
||||
"name": "1041325",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ise",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ise"
|
||||
},
|
||||
{
|
||||
"name": "1040717",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040717"
|
||||
},
|
||||
{
|
||||
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ise",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ise"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -68,9 +68,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20181017 Cisco Wireless LAN Controller Software Information Disclosure Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-id"
|
||||
"name": "1041928",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041928"
|
||||
},
|
||||
{
|
||||
"name": "105675",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/105675"
|
||||
},
|
||||
{
|
||||
"name" : "1041928",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041928"
|
||||
"name": "20181017 Cisco Wireless LAN Controller Software Information Disclosure Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-id"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,16 +53,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0911",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0911"
|
||||
},
|
||||
{
|
||||
"name": "103281",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103281"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0911",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0911"
|
||||
},
|
||||
{
|
||||
"name": "1040513",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-01-22",
|
||||
"ID": "CVE-2018-1000011",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins FindBugs Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "4.71 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins FindBugs Plugin"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "XML External Entity Processing"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-02-26",
|
||||
"ID": "CVE-2018-1000105",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins Gerrit Trigger Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.27.4 and older"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins project"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-285, CWE-201"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-12-19T20:52:45.260099",
|
||||
"DATE_REQUESTED": "2018-12-17T16:15:43",
|
||||
"ID": "CVE-2018-1000873",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jackson",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "Before 2.9.8"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Fasterxml"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-20: Improper Input Validation"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -55,11 +55,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/FasterXML/jackson-modules-java8/issues/90",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/FasterXML/jackson-modules-java8/issues/90"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/FasterXML/jackson-modules-java8/pull/87",
|
||||
"refsource": "MISC",
|
||||
@ -69,6 +64,11 @@
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1665601",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665601"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/FasterXML/jackson-modules-java8/issues/90",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/FasterXML/jackson-modules-java8/issues/90"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,30 @@
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2018-17997",
|
||||
"STATE" : "RESERVED"
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
@ -11,7 +34,38 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "LayerBB 1.1.1 allows XSS via the titles of conversations (PMs)."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/151015/LayerBB-1.1.1-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/151015/LayerBB-1.1.1-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"name": "46079",
|
||||
"url": "https://www.exploit-db.com/exploits/46079/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/AndyRixon/LayerBB/commits/master",
|
||||
"url": "https://github.com/AndyRixon/LayerBB/commits/master"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-02",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-02"
|
||||
},
|
||||
{
|
||||
"name": "106658",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106658"
|
||||
},
|
||||
{
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-02",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-02"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2018/Dec/20"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2018/Dec/20"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
|
||||
},
|
||||
{
|
||||
"name": "106162",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106162"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@microfocus.com",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"ID": "CVE-2018-1346",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "NetIQ eDirectory Denial of Service"
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-597741.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-597741.pdf"
|
||||
},
|
||||
{
|
||||
"name": "103941",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103941"
|
||||
},
|
||||
{
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-597741.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-597741.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user