"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:44:30 +00:00
parent cac77b07e7
commit b754477310
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3851 additions and 3851 deletions

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20041125 MSIE flaws: nested array sort() loop Stack overflow exception",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/382257"
},
{
"name" : "20041125 MSIE & FIREFOX flaws: \"detailed\" advisory and comments that you probably don't want to read anyway",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1221.html"
"name": "web-browser-array-dos(18282)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18282"
},
{
"name": "11751",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/11751"
},
{
"name" : "web-browser-array-dos(18282)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18282"
"name": "20041125 MSIE & FIREFOX flaws: \"detailed\" advisory and comments that you probably don't want to read anyway",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1221.html"
},
{
"name": "20041125 MSIE flaws: nested array sort() loop Stack overflow exception",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/382257"
}
]
}

View File

@ -52,26 +52,26 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/77_e.html",
"refsource" : "MISC",
"url" : "http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/77_e.html"
},
{
"name" : "GLSA-200409-15",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200409-15.xml"
},
{
"name": "11122",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11122"
},
{
"name": "http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/77_e.html",
"refsource": "MISC",
"url": "http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/77_e.html"
},
{
"name": "12488",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/12488/"
},
{
"name": "GLSA-200409-15",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200409-15.xml"
},
{
"name": "usermin-web-mail-command-execution(17293)",
"refsource": "XF",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "4898",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4898"
},
{
"name" : "4905",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4905"
"name": "agares-articleblock-sql-injection(39641)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39641"
},
{
"name": "27258",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/27258"
},
{
"name" : "agares-articleblock-sql-injection(39641)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39641"
"name": "4905",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4905"
},
{
"name": "4898",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4898"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-0658",
"STATE": "PUBLIC"
},
@ -53,49 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20080212 rPSA-2008-0059-1 openldap openldap-clients openldap-servers",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488242/100/200/threaded"
},
{
"name" : "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-bdb/modrdn.c.diff?r1=1.197&r2=1.198&f=h",
"refsource" : "CONFIRM",
"url" : "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-bdb/modrdn.c.diff?r1=1.197&r2=1.198&f=h"
},
{
"name" : "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5358",
"refsource" : "CONFIRM",
"url" : "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5358"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059"
},
{
"name" : "http://wiki.rpath.com/Advisories:rPSA-2008-0059",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/Advisories:rPSA-2008-0059"
},
{
"name" : "http://support.apple.com/kb/HT3937",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3937"
},
{
"name" : "APPLE-SA-2009-11-09-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"name" : "DSA-1541",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1541"
},
{
"name" : "GLSA-200803-28",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200803-28.xml"
"name": "SUSE-SR:2008:010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
},
{
"name": "MDVSA-2008:058",
@ -103,59 +63,14 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:058"
},
{
"name" : "RHSA-2008:0110",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0110.html"
},
{
"name" : "SUSE-SR:2008:010",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
},
{
"name" : "USN-584-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-584-1"
},
{
"name" : "27778",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27778"
},
{
"name" : "oval:org.mitre.oval:def:9470",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9470"
},
{
"name" : "ADV-2008-0536",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0536/references"
},
{
"name" : "1019481",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019481"
},
{
"name" : "28914",
"name": "29461",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/28914"
"url": "http://secunia.com/advisories/29461"
},
{
"name" : "28926",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28926"
},
{
"name" : "28953",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28953"
},
{
"name" : "29068",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29068"
"name": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-bdb/modrdn.c.diff?r1=1.197&r2=1.198&f=h",
"refsource": "CONFIRM",
"url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-bdb/modrdn.c.diff?r1=1.197&r2=1.198&f=h"
},
{
"name": "29225",
@ -163,14 +78,9 @@
"url": "http://secunia.com/advisories/29225"
},
{
"name" : "29256",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29256"
},
{
"name" : "29461",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29461"
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0059",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0059"
},
{
"name": "29682",
@ -178,9 +88,69 @@
"url": "http://secunia.com/advisories/29682"
},
{
"name" : "29957",
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059"
},
{
"name": "29256",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/29957"
"url": "http://secunia.com/advisories/29256"
},
{
"name": "20080212 rPSA-2008-0059-1 openldap openldap-clients openldap-servers",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488242/100/200/threaded"
},
{
"name": "GLSA-200803-28",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200803-28.xml"
},
{
"name": "29068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29068"
},
{
"name": "USN-584-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-584-1"
},
{
"name": "RHSA-2008:0110",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0110.html"
},
{
"name": "oval:org.mitre.oval:def:9470",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9470"
},
{
"name": "28953",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28953"
},
{
"name": "28914",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28914"
},
{
"name": "DSA-1541",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1541"
},
{
"name": "openldap-modrdn-dos(40479)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40479"
},
{
"name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5358",
"refsource": "CONFIRM",
"url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5358"
},
{
"name": "ADV-2009-3184",
@ -188,9 +158,39 @@
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name" : "openldap-modrdn-dos(40479)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/40479"
"name": "28926",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28926"
},
{
"name": "27778",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27778"
},
{
"name": "ADV-2008-0536",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0536/references"
},
{
"name": "APPLE-SA-2009-11-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"name": "29957",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29957"
},
{
"name": "http://support.apple.com/kb/HT3937",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3937"
},
{
"name": "1019481",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019481"
}
]
}

View File

@ -63,9 +63,9 @@
"url": "https://www.exploit-db.com/exploits/5027"
},
{
"name" : "27541",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27541"
"name": "sflog-blog-index-directory-traversal(40115)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40115"
},
{
"name": "3629",
@ -73,9 +73,9 @@
"url": "http://securityreason.com/securityalert/3629"
},
{
"name" : "sflog-blog-index-directory-traversal(40115)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/40115"
"name": "27541",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27541"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://kuza55.blogspot.com/2008/07/some-random-safari-notes.html",
"refsource" : "MISC",
"url" : "http://kuza55.blogspot.com/2008/07/some-random-safari-notes.html"
},
{
"name" : "http://support.apple.com/kb/HT3338",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3338"
},
{
"name" : "APPLE-SA-2008-12-15",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"
"name": "ADV-2008-3444",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3444"
},
{
"name": "TA08-350A",
@ -77,25 +67,35 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30192"
},
{
"name" : "ADV-2008-3444",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3444"
},
{
"name" : "1020539",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020539"
},
{
"name": "31128",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31128"
},
{
"name": "http://support.apple.com/kb/HT3338",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3338"
},
{
"name": "safari-domains-session-hijacking(43839)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43839"
},
{
"name": "APPLE-SA-2008-12-15",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"
},
{
"name": "http://kuza55.blogspot.com/2008/07/some-random-safari-notes.html",
"refsource": "MISC",
"url": "http://kuza55.blogspot.com/2008/07/some-random-safari-notes.html"
},
{
"name": "1020539",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020539"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-3517",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.securityfocus.com/bid/30774/exploit",
"refsource" : "MISC",
"url" : "http://www.securityfocus.com/bid/30774/exploit"
"name": "30774",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30774"
},
{
"name": "http://packetstormsecurity.org/0808-exploits/simasycms-sql.txt",
@ -63,9 +63,9 @@
"url": "http://packetstormsecurity.org/0808-exploits/simasycms-sql.txt"
},
{
"name" : "30774",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30774"
"name": "http://www.securityfocus.com/bid/30774/exploit",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/30774/exploit"
},
{
"name": "simasycms-index-sql-injection(44580)",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20080825 [IVIZ-08-006] DiskCryptor Security Model bypass exploiting wrong BIOS API usage",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495725/100/0/threaded"
},
{
"name": "http://www.ivizsecurity.com/preboot-patch.html",
"refsource": "MISC",
@ -67,6 +62,11 @@
"refsource": "MISC",
"url": "http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf"
},
{
"name": "20080825 [IVIZ-08-006] DiskCryptor Security Model bypass exploiting wrong BIOS API usage",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495725/100/0/threaded"
},
{
"name": "4212",
"refsource": "SREASON",

View File

@ -53,35 +53,35 @@
"references": {
"reference_data": [
{
"name" : "20080916 [ECHO_ADV_101$2008] Attachmax Dolphin <= 2.1.0 Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/496427/100/0/threaded"
},
{
"name" : "6468",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6468"
"name": "48269",
"refsource": "OSVDB",
"url": "http://osvdb.org/48269"
},
{
"name": "http://e-rdc.org/v1/news.php?readmore=108",
"refsource": "MISC",
"url": "http://e-rdc.org/v1/news.php?readmore=108"
},
{
"name" : "31207",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31207"
},
{
"name" : "48269",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/48269"
},
{
"name": "31794",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31794"
},
{
"name": "6468",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6468"
},
{
"name": "20080916 [ECHO_ADV_101$2008] Attachmax Dolphin <= 2.1.0 Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/496427/100/0/threaded"
},
{
"name": "31207",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31207"
},
{
"name": "4307",
"refsource": "SREASON",

View File

@ -57,20 +57,15 @@
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2008/Oct/0054.html"
},
{
"name" : "http://www.irmplc.com/researchlab/advisories/170",
"refsource" : "MISC",
"url" : "http://www.irmplc.com/researchlab/advisories/170"
},
{
"name": "https://customersupport.kontiki.com/software/patch-20102",
"refsource": "MISC",
"url": "https://customersupport.kontiki.com/software/patch-20102"
},
{
"name" : "31580",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31580"
"name": "kontiki-zodiac-xss(45670)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45670"
},
{
"name": "32156",
@ -78,9 +73,14 @@
"url": "http://secunia.com/advisories/32156"
},
{
"name" : "kontiki-zodiac-xss(45670)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45670"
"name": "http://www.irmplc.com/researchlab/advisories/170",
"refsource": "MISC",
"url": "http://www.irmplc.com/researchlab/advisories/170"
},
{
"name": "31580",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31580"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://autonessus.cvs.sourceforge.net/viewvc/autonessus/AutoNessus/www/bulk_update.pl?r1=1.2&r2=1.3",
"refsource" : "MISC",
"url" : "http://autonessus.cvs.sourceforge.net/viewvc/autonessus/AutoNessus/www/bulk_update.pl?r1=1.2&r2=1.3"
},
{
"name" : "http://sourceforge.net/tracker/index.php?func=detail&aid=2141884&group_id=216367&atid=1037394",
"refsource" : "MISC",
"url" : "http://sourceforge.net/tracker/index.php?func=detail&aid=2141884&group_id=216367&atid=1037394"
"name": "31559",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31559"
},
{
"name": "http://sourceforge.net/project/shownotes.php?group_id=216367&release_id=630124",
@ -68,9 +63,14 @@
"url": "http://sourceforge.net/project/shownotes.php?group_id=216367&release_id=630124"
},
{
"name" : "31559",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31559"
"name": "http://autonessus.cvs.sourceforge.net/viewvc/autonessus/AutoNessus/www/bulk_update.pl?r1=1.2&r2=1.3",
"refsource": "MISC",
"url": "http://autonessus.cvs.sourceforge.net/viewvc/autonessus/AutoNessus/www/bulk_update.pl?r1=1.2&r2=1.3"
},
{
"name": "autonessus-bulkupdate-xss(45634)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45634"
},
{
"name": "32046",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/32046"
},
{
"name" : "autonessus-bulkupdate-xss(45634)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45634"
"name": "http://sourceforge.net/tracker/index.php?func=detail&aid=2141884&group_id=216367&atid=1037394",
"refsource": "MISC",
"url": "http://sourceforge.net/tracker/index.php?func=detail&aid=2141884&group_id=216367&atid=1037394"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://typo3.org/extensions/repository/view/sm_pageimprovements/0.3.0/info/ChangeLog/",
"refsource" : "MISC",
"url" : "http://typo3.org/extensions/repository/view/sm_pageimprovements/0.3.0/info/ChangeLog/"
"name": "ADV-2008-2870",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2870"
},
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-20081020-1/",
@ -63,9 +63,9 @@
"url": "http://typo3.org/teams/security/security-bulletins/typo3-20081020-1/"
},
{
"name" : "ADV-2008-2870",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2870"
"name": "http://typo3.org/extensions/repository/view/sm_pageimprovements/0.3.0/info/ChangeLog/",
"refsource": "MISC",
"url": "http://typo3.org/extensions/repository/view/sm_pageimprovements/0.3.0/info/ChangeLog/"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "5707",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5707"
"name": "45865",
"refsource": "OSVDB",
"url": "http://osvdb.org/45865"
},
{
"name": "socialsitegenerator-path-file-include(42780)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42780"
},
{
"name": "29462",
@ -63,19 +68,14 @@
"url": "http://www.securityfocus.com/bid/29462"
},
{
"name" : "45865",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/45865"
"name": "5707",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5707"
},
{
"name": "30462",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30462"
},
{
"name" : "socialsitegenerator-path-file-include(42780)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42780"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2053",
"STATE": "PUBLIC"
},
@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "[Swan-announce] 20130514 CVE-2013-2052: Libreswan remote buffer overflow in atodn()",
"refsource" : "MLIST",
"url" : "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=960229",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=960229"
},
{
"name": "https://www.openswan.org/news/13",
"refsource": "CONFIRM",
"url": "https://www.openswan.org/news/13"
},
{
"name" : "DSA-2893",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2893"
},
{
"name" : "RHSA-2013:0827",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0827.html"
},
{
"name": "SUSE-SU-2013:1150",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html"
},
{
"name": "RHSA-2013:0827",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0827.html"
},
{
"name": "59838",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59838"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=960229",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=960229"
},
{
"name": "[Swan-announce] 20130514 CVE-2013-2052: Libreswan remote buffer overflow in atodn()",
"refsource": "MLIST",
"url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html"
},
{
"name": "DSA-2893",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2893"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2013-2359",
"STATE": "PUBLIC"
},
@ -53,12 +53,12 @@
"references": {
"reference_data": [
{
"name" : "HPSBMU02900",
"name": "SSRT100907",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"name" : "SSRT100907",
"name": "HPSBMU02900",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-2473",
"STATE": "PUBLIC"
},
@ -58,119 +58,29 @@
"url": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/259d4998ce2f"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=975110",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=975110"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
},
{
"name" : "http://advisories.mageia.org/MGASA-2013-0185.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2013-0185.html"
},
{
"name" : "GLSA-201406-32",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBUX02922",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "SSRT101305",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "HPSBUX02907",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
"name": "RHSA-2013:1060",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
},
{
"name": "HPSBUX02908",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137545592101387&w=2"
},
{
"name" : "MDVSA-2013:183",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:183"
},
{
"name" : "RHSA-2013:0963",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
},
{
"name" : "RHSA-2013:1081",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
},
{
"name" : "RHSA-2013:1060",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
},
{
"name" : "RHSA-2013:1455",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name" : "RHSA-2013:1456",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name" : "RHSA-2013:1059",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
},
{
"name": "RHSA-2014:0414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "SUSE-SU-2013:1305",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "SUSE-SU-2013:1293",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
},
{
"name" : "SUSE-SU-2013:1255",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
},
{
"name" : "SUSE-SU-2013:1256",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
},
{
"name" : "SUSE-SU-2013:1257",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
},
{
"name" : "SUSE-SU-2013:1263",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
"name": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
},
{
"name": "SUSE-SU-2013:1264",
@ -178,25 +88,60 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"
},
{
"name" : "TA13-169A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-169A"
"name": "SUSE-SU-2013:1257",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
},
{
"name" : "60623",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/60623"
"name": "HPSBUX02907",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
},
{
"name": "SUSE-SU-2013:1256",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
},
{
"name": "oval:org.mitre.oval:def:17189",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17189"
},
{
"name": "54154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54154"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "oval:org.mitre.oval:def:18888",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18888"
},
{
"name": "SSRT101305",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "HPSBUX02922",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "SUSE-SU-2013:1263",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
},
{
"name": "RHSA-2013:1059",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
},
{
"name": "oval:org.mitre.oval:def:19600",
"refsource": "OVAL",
@ -208,9 +153,64 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19652"
},
{
"name" : "54154",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54154"
"name": "SUSE-SU-2013:1293",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=975110",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110"
},
{
"name": "RHSA-2013:1081",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
},
{
"name": "TA13-169A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-169A"
},
{
"name": "http://advisories.mageia.org/MGASA-2013-0185.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2013-0185.html"
},
{
"name": "60623",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/60623"
},
{
"name": "RHSA-2013:0963",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
},
{
"name": "SUSE-SU-2013:1255",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
},
{
"name": "RHSA-2013:1456",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name": "MDVSA-2013:183",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:183"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
},
{
"name": "SUSE-SU-2013:1305",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20140301 [CVE-2013-6233] Persistent HTML Script Insertion permits offsite-bound forms in SpagoBI v4.0",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/531322/100/0/threaded"
},
{
"name": "32039",
"refsource": "EXPLOIT-DB",
@ -67,6 +62,11 @@
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/125496"
},
{
"name": "20140301 [CVE-2013-6233] Persistent HTML Script Insertion permits offsite-bound forms in SpagoBI v4.0",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531322/100/0/threaded"
},
{
"name": "65915",
"refsource": "BID",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6409",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "63994",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63994"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730691",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "https://bitbucket.org/jwilk/adequate/raw/tip/debian/changelog",
"refsource": "CONFIRM",
"url": "https://bitbucket.org/jwilk/adequate/raw/tip/debian/changelog"
},
{
"name" : "63994",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/63994"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6412",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1034261",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1034261"
},
{
"name" : "https://github.com/hercules-team/augeas/commit/f5b4fc0c",
"refsource" : "CONFIRM",
"url" : "https://github.com/hercules-team/augeas/commit/f5b4fc0c"
},
{
"name": "https://github.com/hercules-team/augeas/pull/58",
"refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "RHSA-2014:0044",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0044.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1034261",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1034261"
},
{
"name": "https://github.com/hercules-team/augeas/commit/f5b4fc0c",
"refsource": "CONFIRM",
"url": "https://github.com/hercules-team/augeas/commit/f5b4fc0c"
}
]
}

View File

@ -52,36 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=268565",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=268565"
},
{
"name" : "DSA-2799",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2799"
},
{
"name" : "openSUSE-SU-2013:1776",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html"
},
{
"name" : "openSUSE-SU-2013:1777",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html"
},
{
"name" : "openSUSE-SU-2013:1861",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html"
},
{
"name": "openSUSE-SU-2014:0065",
"refsource": "SUSE",
@ -91,6 +66,31 @@
"name": "oval:org.mitre.oval:def:19006",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19006"
},
{
"name": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html"
},
{
"name": "openSUSE-SU-2013:1776",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html"
},
{
"name": "DSA-2799",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2799"
},
{
"name": "openSUSE-SU-2013:1861",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html"
},
{
"name": "openSUSE-SU-2013:1777",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html"
}
]
}

View File

@ -52,45 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "40944",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40944/"
},
{
"name" : "20161219 CVE-2013-6627: Chrome Chrome HTTP 1xx base::StringTokenizerT<...>::QuickGetNext OOBR",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Dec/65"
},
{
"name" : "http://blog.skylined.nl/20161219001.html",
"refsource" : "MISC",
"url" : "http://blog.skylined.nl/20161219001.html"
},
{
"name": "http://packetstormsecurity.com/files/140209/Chrome-HTTP-1xx-Out-Of-Bounds-Read.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/140209/Chrome-HTTP-1xx-Out-Of-Bounds-Read.html"
},
{
"name" : "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=299892",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=299892"
},
{
"name": "https://src.chromium.org/viewvc/chrome?revision=226539&view=revision",
"refsource": "CONFIRM",
"url": "https://src.chromium.org/viewvc/chrome?revision=226539&view=revision"
},
{
"name" : "DSA-2799",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2799"
"name": "40944",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40944/"
},
{
"name": "openSUSE-SU-2014:0065",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=299892",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=299892"
},
{
"name": "20161219 CVE-2013-6627: Chrome Chrome HTTP 1xx base::StringTokenizerT<...>::QuickGetNext OOBR",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Dec/65"
},
{
"name": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html"
},
{
"name": "openSUSE-SU-2013:1776",
@ -98,9 +93,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html"
},
{
"name" : "openSUSE-SU-2013:1777",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html"
"name": "http://blog.skylined.nl/20161219001.html",
"refsource": "MISC",
"url": "http://blog.skylined.nl/20161219001.html"
},
{
"name": "DSA-2799",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2799"
},
{
"name": "openSUSE-SU-2013:1861",
@ -108,9 +108,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html"
},
{
"name" : "openSUSE-SU-2014:0065",
"name": "openSUSE-SU-2013:1777",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html"
},
{
"name": "oval:org.mitre.oval:def:19113",

View File

@ -61,11 +61,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20171019-0002/",
"refsource": "CONFIRM",
@ -80,6 +75,11 @@
"name": "1039597",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039597"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
}
]
}

View File

@ -54,34 +54,34 @@
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-17-785",
"name": "http://www.zerodayinitiative.com/advisories/ZDI-17-807",
"refsource": "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-17-785"
"url": "http://www.zerodayinitiative.com/advisories/ZDI-17-807"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-17-789",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-17-789"
},
{
"name": "100970",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100970"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-17-790",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-17-790"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-17-807",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-17-807"
},
{
"name": "https://success.trendmicro.com/solution/1118224",
"refsource": "CONFIRM",
"url": "https://success.trendmicro.com/solution/1118224"
},
{
"name" : "100970",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/100970"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-17-785",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-17-785"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://seclists.org/fulldisclosure/2017/Oct/70",
"refsource" : "CONFIRM",
"url" : "http://seclists.org/fulldisclosure/2017/Oct/70"
},
{
"name": "101673",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101673"
},
{
"name": "http://seclists.org/fulldisclosure/2017/Oct/70",
"refsource": "CONFIRM",
"url": "http://seclists.org/fulldisclosure/2017/Oct/70"
},
{
"name": "1039704",
"refsource": "SECTRACK",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/radare/radare2/commit/796dd28aaa6b9fa76d99c42c4d5ff8b257cc2191",
"refsource" : "CONFIRM",
"url" : "https://github.com/radare/radare2/commit/796dd28aaa6b9fa76d99c42c4d5ff8b257cc2191"
},
{
"name": "https://github.com/radare/radare2/issues/7683",
"refsource": "CONFIRM",
"url": "https://github.com/radare/radare2/issues/7683"
},
{
"name": "https://github.com/radare/radare2/commit/796dd28aaa6b9fa76d99c42c4d5ff8b257cc2191",
"refsource": "CONFIRM",
"url": "https://github.com/radare/radare2/commit/796dd28aaa6b9fa76d99c42c4d5ff8b257cc2191"
},
{
"name": "99305",
"refsource": "BID",

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
},
{
"name" : "https://github.com/FFmpeg/FFmpeg/commit/189ff4219644532bdfa7bab28dfedaee4d6d4021",
"refsource" : "MISC",
"url" : "https://github.com/FFmpeg/FFmpeg/commit/189ff4219644532bdfa7bab28dfedaee4d6d4021"
},
{
"name": "https://github.com/FFmpeg/FFmpeg/commit/a5d849b149ca67ced2d271dc84db0bc95a548abb",
"refsource": "MISC",
@ -72,10 +62,20 @@
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3957"
},
{
"name": "https://github.com/FFmpeg/FFmpeg/commit/189ff4219644532bdfa7bab28dfedaee4d6d4021",
"refsource": "MISC",
"url": "https://github.com/FFmpeg/FFmpeg/commit/189ff4219644532bdfa7bab28dfedaee4d6d4021"
},
{
"name": "99315",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99315"
},
{
"name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/h2o/h2o/issues/1775",
"refsource" : "MISC",
"url" : "https://github.com/h2o/h2o/issues/1775"
},
{
"name": "JVN#93226941",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN93226941/index.html"
},
{
"name": "https://github.com/h2o/h2o/issues/1775",
"refsource": "MISC",
"url": "https://github.com/h2o/h2o/issues/1775"
}
]
}

View File

@ -58,6 +58,11 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43717/"
},
{
"name": "1040100",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040100"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0775",
"refsource": "CONFIRM",
@ -67,11 +72,6 @@
"name": "102400",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102400"
},
{
"name" : "1040100",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040100"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-06-23T11:22:33.047687",
"DATE_REQUESTED": "2018-04-25T21:21:45",
"ID": "CVE-2018-1000533",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "GitList",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "<= 0.6"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "klaussilveira"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "Passing incorrectly sanitized input to system function"
"value": "n/a"
}
]
}
@ -55,15 +55,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/klaussilveira/gitlist/commit/87b8c26b023c3fc37f0796b14bb13710f397b322",
"refsource" : "MISC",
"url" : "https://github.com/klaussilveira/gitlist/commit/87b8c26b023c3fc37f0796b14bb13710f397b322"
},
{
"name": "https://security.szurek.pl/exploit-bypass-php-escapeshellarg-escapeshellcmd.html",
"refsource": "MISC",
"url": "https://security.szurek.pl/exploit-bypass-php-escapeshellarg-escapeshellcmd.html"
},
{
"name": "https://github.com/klaussilveira/gitlist/commit/87b8c26b023c3fc37f0796b14bb13710f397b322",
"refsource": "MISC",
"url": "https://github.com/klaussilveira/gitlist/commit/87b8c26b023c3fc37f0796b14bb13710f397b322"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-09-03T16:07:16.981347",
"DATE_REQUESTED": "2018-08-26T16:04:53",
"ID": "CVE-2018-1000671",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "sympa",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "6.2.16 and later"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "sympa"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')"
"value": "n/a"
}
]
}
@ -55,15 +55,15 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20180921 [SECURITY] [DLA 1512-1] sympa security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/09/msg00023.html"
},
{
"name": "https://github.com/sympa-community/sympa/issues/268",
"refsource": "MISC",
"url": "https://github.com/sympa-community/sympa/issues/268"
},
{
"name": "[debian-lts-announce] 20180921 [SECURITY] [DLA 1512-1] sympa security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00023.html"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "https://github.com/OTRS/otrs/commit/d9db0c6a15caafda7689320ecf61777993c33711",
"refsource": "CONFIRM",
"url": "https://github.com/OTRS/otrs/commit/d9db0c6a15caafda7689320ecf61777993c33711"
},
{
"name": "DSA-4317",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4317"
},
{
"name": "[debian-lts-announce] 20180926 [SECURITY] [DLA 1521-1] otrs2 security update",
"refsource": "MLIST",
@ -71,16 +81,6 @@
"name": "https://github.com/OTRS/otrs/commit/d8cae00b0f78c2a07bb10cedb817304139395843",
"refsource": "CONFIRM",
"url": "https://github.com/OTRS/otrs/commit/d8cae00b0f78c2a07bb10cedb817304139395843"
},
{
"name" : "https://github.com/OTRS/otrs/commit/d9db0c6a15caafda7689320ecf61777993c33711",
"refsource" : "CONFIRM",
"url" : "https://github.com/OTRS/otrs/commit/d9db0c6a15caafda7689320ecf61777993c33711"
},
{
"name" : "DSA-4317",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4317"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT208848",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208848"
},
{
"name": "1041031",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041031"
},
{
"name": "https://support.apple.com/HT208848",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208848"
}
]
}