"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:43:37 +00:00
parent f2e00d662b
commit c17016bd2f
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3646 additions and 3628 deletions

View File

@ -52,26 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "DSA-497",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-497"
},
{
"name" : "MDKSA-2004:039",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:039"
},
{
"name": "SuSE-SA:2004:012",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2004_12_mc.html"
},
{
"name" : "RHSA-2004:172",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-172.html"
},
{
"name": "GLSA-200405-21",
"refsource": "GENTOO",
@ -81,6 +66,21 @@
"name": "midnight-commander-format-string(16021)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16021"
},
{
"name": "MDKSA-2004:039",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:039"
},
{
"name": "DSA-497",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-497"
},
{
"name": "RHSA-2004:172",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-172.html"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.systemsecure.org/advisories/ssadvisory16022004.php",
"refsource" : "MISC",
"url" : "http://www.systemsecure.org/advisories/ssadvisory16022004.php"
},
{
"name": "9676",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9676"
},
{
"name" : "1009079",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/alerts/2004/Feb/1009079.html"
},
{
"name": "10902",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/10902/"
},
{
"name": "http://www.systemsecure.org/advisories/ssadvisory16022004.php",
"refsource": "MISC",
"url": "http://www.systemsecure.org/advisories/ssadvisory16022004.php"
},
{
"name": "onlinestorekit-more-xss(15235)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15235"
},
{
"name": "1009079",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/alerts/2004/Feb/1009079.html"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "13079",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13079"
},
{
"name": "20041102 [Hat-Squad] SQL injection and XSS Vulnerabilities in HELM",
"refsource": "BUGTRAQ",
@ -67,11 +72,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11586"
},
{
"name" : "13079",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/13079"
},
{
"name": "helm-subject-xss(17943)",
"refsource": "XF",

View File

@ -52,30 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "12596",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/12596"
},
{
"name": "20040916 [sudo-announce] Sudo version 1.6.8p1 now available (fwd)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=109537972929201&w=2"
},
{
"name" : "http://packetstormsecurity.nl/0409-exploits/sudoedit.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.nl/0409-exploits/sudoedit.txt"
},
{
"name" : "http://www.sudo.ws/sudo/alerts/sudoedit.html",
"refsource" : "CONFIRM",
"url" : "http://www.sudo.ws/sudo/alerts/sudoedit.html"
},
{
"name": "VU#424358",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/424358"
},
{
"name" : "O-219",
"refsource" : "CIAC",
"url" : "http://www.ciac.org/ciac/bulletins/o-219.shtml"
"name": "10023",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/10023"
},
{
"name": "11204",
@ -83,19 +78,24 @@
"url": "http://www.securityfocus.com/bid/11204"
},
{
"name" : "10023",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/10023"
},
{
"name" : "12596",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/12596"
"name": "O-219",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/o-219.shtml"
},
{
"name": "sudo-sudoedit-view-files(17424)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17424"
},
{
"name": "http://www.sudo.ws/sudo/alerts/sudoedit.html",
"refsource": "CONFIRM",
"url": "http://www.sudo.ws/sudo/alerts/sudoedit.html"
},
{
"name": "http://packetstormsecurity.nl/0409-exploits/sudoedit.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.nl/0409-exploits/sudoedit.txt"
}
]
}

View File

@ -53,20 +53,15 @@
"references": {
"reference_data": [
{
"name" : "20040824 PHP Code Snippet Library Multiple Cross-Site Scripting (XSS)",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=109340580218818&w=2"
"name": "11038",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11038"
},
{
"name": "http://nikyt0x.webcindario.com/0001.txt",
"refsource": "MISC",
"url": "http://nikyt0x.webcindario.com/0001.txt"
},
{
"name" : "11038",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/11038"
},
{
"name": "12370",
"refsource": "SECUNIA",
@ -76,6 +71,11 @@
"name": "snippet-index-xss(17108)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17108"
},
{
"name": "20040824 PHP Code Snippet Library Multiple Cross-Site Scripting (XSS)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=109340580218818&w=2"
}
]
}

View File

@ -53,49 +53,49 @@
"references": {
"reference_data": [
{
"name" : "20040316 JelSoft vBulletin Multiple XSS Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107945556112453&w=2"
},
{
"name" : "20021121 XSS bug in vBulletin",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-11/0276.html"
},
{
"name" : "9887",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/9887"
"name": "vbulletin-showthread-xss(15495)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15495"
},
{
"name": "6226",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6226"
},
{
"name" : "4312",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/4312"
},
{
"name": "1009440",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1009440"
},
{
"name" : "11142",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/11142"
"name": "9887",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9887"
},
{
"name" : "vbulletin-showthread-xss(15495)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15495"
"name": "20040316 JelSoft vBulletin Multiple XSS Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107945556112453&w=2"
},
{
"name": "vbulletin-memberlist-xss(10679)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10679.php"
},
{
"name": "4312",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4312"
},
{
"name": "20021121 XSS bug in vBulletin",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-11/0276.html"
},
{
"name": "11142",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11142"
}
]
}

View File

@ -53,9 +53,19 @@
"references": {
"reference_data": [
{
"name" : "6069",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6069"
"name": "itechbids-forwardtofriend-xss(43758)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43758"
},
{
"name": "4015",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4015"
},
{
"name": "31084",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31084"
},
{
"name": "30215",
@ -68,19 +78,9 @@
"url": "http://www.vupen.com/english/advisories/2008/2107/references"
},
{
"name" : "31084",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31084"
},
{
"name" : "4015",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4015"
},
{
"name" : "itechbids-forwardtofriend-xss(43758)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43758"
"name": "6069",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6069"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20080718 [ISecAuditors Security Advisories] SmbClientParser Perl module allows remote command execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/494536/100/0/threaded"
},
{
"name" : "30290",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30290"
},
{
"name": "31175",
"refsource": "SECUNIA",
@ -76,6 +66,16 @@
"name": "filesyssmb-directory-command-execution(43910)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43910"
},
{
"name": "30290",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30290"
},
{
"name": "20080718 [ISecAuditors Security Advisories] SmbClientParser Perl module allows remote command execution",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494536/100/0/threaded"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "6751",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6751"
},
{
"name": "31756",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31756"
},
{
"name" : "4473",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4473"
},
{
"name": "sezhoo-sezhootabsandactions-file-include(45859)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45859"
},
{
"name": "6751",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6751"
},
{
"name": "4473",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4473"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://holisticinfosec.org/content/view/85/45/",
"refsource" : "MISC",
"url" : "http://holisticinfosec.org/content/view/85/45/"
"name": "32511",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32511"
},
{
"name": "32069",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32069"
},
{
"name" : "32511",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32511"
},
{
"name": "rateme-rate-xss(46202)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46202"
},
{
"name": "http://holisticinfosec.org/content/view/85/45/",
"refsource": "MISC",
"url": "http://holisticinfosec.org/content/view/85/45/"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
},
{
"name" : "http://bugs.debian.org/496419",
"name": "https://bugs.gentoo.org/show_bug.cgi?id=235770",
"refsource": "CONFIRM",
"url" : "http://bugs.debian.org/496419"
"url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
},
{
"name": "http://dev.gentoo.org/~rbu/security/debiantemp/convirt",
@ -68,9 +68,9 @@
"url": "http://dev.gentoo.org/~rbu/security/debiantemp/convirt"
},
{
"name" : "https://bugs.gentoo.org/show_bug.cgi?id=235770",
"name": "http://bugs.debian.org/496419",
"refsource": "CONFIRM",
"url" : "https://bugs.gentoo.org/show_bug.cgi?id=235770"
"url": "http://bugs.debian.org/496419"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "6922",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6922"
},
{
"name": "32039",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "ezestore-searchresults-sql-injection(46273)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46273"
},
{
"name": "6922",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6922"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://drupal.org/node/280592",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/node/280592"
},
{
"name" : "http://drupal.org/node/280593",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/node/280593"
},
{
"name": "30165",
"refsource": "BID",
@ -72,6 +62,16 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/46938"
},
{
"name": "http://drupal.org/node/280592",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/280592"
},
{
"name": "http://drupal.org/node/280593",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"refsource": "SECUNIA",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "7082",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7082"
},
{
"name": "50292",
"refsource": "OSVDB",
@ -67,6 +62,11 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32626"
},
{
"name": "7082",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7082"
},
{
"name": "ADV-2008-3098",
"refsource": "VUPEN",

View File

@ -53,25 +53,20 @@
"references": {
"reference_data": [
{
"name" : "20080128 Mambo 4.6.3 Path Disclosure, XSS , XSRF, DOS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/487128/100/200/threaded"
"name": "ADV-2008-0325",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0325"
},
{
"name": "mambo-connector-csrf(39985)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39985"
},
{
"name": "20080227 Re: Mambo 4.6.3 Path Disclosure, XSS , XSRF, DOS",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2008-02/0444.html"
},
{
"name" : "http://www.bugreport.ir/index_33.htm",
"refsource" : "MISC",
"url" : "http://www.bugreport.ir/index_33.htm"
},
{
"name" : "http://forum.mambo-foundation.org/showthread.php?t=10158",
"refsource" : "CONFIRM",
"url" : "http://forum.mambo-foundation.org/showthread.php?t=10158"
},
{
"name": "42531",
"refsource": "OSVDB",
@ -83,14 +78,19 @@
"url": "http://secunia.com/advisories/28670"
},
{
"name" : "ADV-2008-0325",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0325"
"name": "http://forum.mambo-foundation.org/showthread.php?t=10158",
"refsource": "CONFIRM",
"url": "http://forum.mambo-foundation.org/showthread.php?t=10158"
},
{
"name" : "mambo-connector-csrf(39985)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39985"
"name": "20080128 Mambo 4.6.3 Path Disclosure, XSS , XSRF, DOS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/487128/100/200/threaded"
},
{
"name": "http://www.bugreport.ir/index_33.htm",
"refsource": "MISC",
"url": "http://www.bugreport.ir/index_33.htm"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2219",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:1119",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1119.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=979508",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "RHSA-2013:1116",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1116.html"
},
{
"name" : "RHSA-2013:1119",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1119.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2013-2358",
"STATE": "PUBLIC"
},
@ -53,12 +53,12 @@
"references": {
"reference_data": [
{
"name" : "HPSBMU02900",
"name": "SSRT100907",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"name" : "SSRT100907",
"name": "HPSBMU02900",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6476",
"STATE": "PUBLIC"
},
@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176",
"refsource" : "CONFIRM",
"url" : "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176"
"name": "USN-2144-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2144-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1027551",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027551"
},
{
"name" : "DSA-2875",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2875"
},
{
"name": "DSA-2876",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2876"
},
{
"name": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176",
"refsource": "CONFIRM",
"url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176"
},
{
"name": "USN-2143-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2143-1"
},
{
"name" : "USN-2144-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2144-1"
"name": "DSA-2875",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2875"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20130801 SilverStripe(R) Information Exposure Through Query Strings in GET Request (CWE-598)",
"refsource" : "BUGTRAQ",
"url" : "http://seclists.org/bugtraq/2013/Aug/12"
},
{
"name": "https://github.com/chillu/silverstripe-framework/commit/3e88c98ca513880e2b43ed7f27ade17fef5d9170",
"refsource": "CONFIRM",
"url": "https://github.com/chillu/silverstripe-framework/commit/3e88c98ca513880e2b43ed7f27ade17fef5d9170"
},
{
"name": "20130801 SilverStripe(R) Information Exposure Through Query Strings in GET Request (CWE-598)",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2013/Aug/12"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://securityundefined.com/wordpress-plugin-blue-wrench-video-widget-csrf-persistent-xss-0day-disclosure/",
"refsource" : "MISC",
"url" : "http://securityundefined.com/wordpress-plugin-blue-wrench-video-widget-csrf-persistent-xss-0day-disclosure/"
},
{
"name": "http://wordpress.org/plugins/blue-wrench-videos-widget/changelog",
"refsource": "CONFIRM",
"url": "http://wordpress.org/plugins/blue-wrench-videos-widget/changelog"
},
{
"name": "98923",
"refsource": "OSVDB",
"url": "http://osvdb.org/98923"
},
{
"name": "98922",
"refsource": "OSVDB",
"url": "http://osvdb.org/98922"
},
{
"name" : "98923",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/98923"
"name": "http://securityundefined.com/wordpress-plugin-blue-wrench-video-widget-csrf-persistent-xss-0day-disclosure/",
"refsource": "MISC",
"url": "http://securityundefined.com/wordpress-plugin-blue-wrench-video-widget-csrf-persistent-xss-0day-disclosure/"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "100395",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100395"
},
{
"name": "DSA-4321",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4321"
},
{
"name": "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update",
"refsource": "MLIST",
@ -61,16 +71,6 @@
"name": "http://hg.code.sf.net/p/graphicsmagick/code/rev/29550606d8b9",
"refsource": "CONFIRM",
"url": "http://hg.code.sf.net/p/graphicsmagick/code/rev/29550606d8b9"
},
{
"name" : "DSA-4321",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4321"
},
{
"name" : "100395",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/100395"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/"
},
{
"name" : "https://www.nomotion.net/blog/sharknatto/",
"refsource" : "MISC",
"url" : "https://www.nomotion.net/blog/sharknatto/"
},
{
"name": "100585",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100585"
},
{
"name": "https://www.nomotion.net/blog/sharknatto/",
"refsource": "MISC",
"url": "https://www.nomotion.net/blog/sharknatto/"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://zerodayinitiative.com/advisories/ZDI-17-877",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-17-877"
},
{
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://zerodayinitiative.com/advisories/ZDI-17-877",
"refsource": "MISC",
"url": "https://zerodayinitiative.com/advisories/ZDI-17-877"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "anemec@redhat.com",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-15119",
"STATE": "PUBLIC"
},
@ -68,26 +68,31 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.openwall.com/lists/oss-security/2017/11/28/9",
"refsource" : "MISC",
"url" : "http://www.openwall.com/lists/oss-security/2017/11/28/9"
},
{
"name": "https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05044.html",
"refsource": "MISC",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05044.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15119",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15119"
"name": "http://www.openwall.com/lists/oss-security/2017/11/28/9",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2017/11/28/9"
},
{
"name": "102011",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102011"
},
{
"name": "DSA-4213",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4213"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15119",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15119"
},
{
"name": "RHSA-2018:1104",
"refsource": "REDHAT",
@ -102,11 +107,6 @@
"name": "USN-3575-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3575-1/"
},
{
"name" : "102011",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102011"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2018-09-01#qualcomm-components",
"name": "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin",
"refsource": "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2018-09-01#qualcomm-components"
"url": "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin"
},
{
"name": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=252e22c9adb9b59c36e59e00d8b43013facec4d6",
@ -63,9 +63,9 @@
"url": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=252e22c9adb9b59c36e59e00d8b43013facec4d6"
},
{
"name" : "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin",
"name": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-components",
"refsource": "CONFIRM",
"url" : "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin"
"url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-components"
}
]
}

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=2e1b54e38f1516e70d9f6581c4f1ee935effb903",
"refsource" : "MISC",
"url" : "https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=2e1b54e38f1516e70d9f6581c4f1ee935effb903"
},
{
"name": "https://source.android.com/security/bulletin/pixel/2018-03-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/pixel/2018-03-01"
},
{
"name": "https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=2e1b54e38f1516e70d9f6581c4f1ee935effb903",
"refsource": "MISC",
"url": "https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=2e1b54e38f1516e70d9f6581c4f1ee935effb903"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "https://github.com/radare/radare2/issues/7723",
"refsource": "CONFIRM",
"url": "https://github.com/radare/radare2/issues/7723"
},
{
"name": "http://git.savannah.gnu.org/cgit/grub.git/commit/grub-core/fs/ext2.c?id=ac8cac1dac50daaf1c390d701cca3b55e16ee768",
"refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "CONFIRM",
"url": "https://github.com/radare/radare2/commit/65000a7fd9eea62359e6d6714f17b94a99a82edd"
},
{
"name" : "https://github.com/radare/radare2/issues/7723",
"refsource" : "CONFIRM",
"url" : "https://github.com/radare/radare2/issues/7723"
},
{
"name": "99141",
"refsource": "BID",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9876",
"refsource" : "MISC",
"url" : "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9876"
},
{
"name": "http://www.irfanview.com/plugins.htm",
"refsource": "CONFIRM",
"url": "http://www.irfanview.com/plugins.htm"
},
{
"name": "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9876",
"refsource": "MISC",
"url": "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9876"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf"
},
{
"name" : "103143",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/103143"
},
{
"name": "1040407",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040407"
},
{
"name": "103143",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103143"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-0740",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "3/15/2018 22:35:10",
"ID": "CVE-2018-1000139",
"REQUESTER": "3022235906@qq.com",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "I, Librarian ",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "4.8 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "I, Librarian "
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Cross Site Scripting (XSS)"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-07-31T16:52:42.845027",
"DATE_REQUESTED": "2018-07-27T00:00:00",
"ID": "CVE-2018-1000631",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "V2I Hub",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "3"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Battelle"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "SQL Injection"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-11-27T13:54:33.486534",
"DATE_REQUESTED": "2018-11-18T12:33:39",
"ID": "CVE-2018-1000848",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "Wampserver",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "prior to version 3.1.5"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Wampserver"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "Cross Site Scripting (XSS)"
"value": "n/a"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
},
{
"name": "106164",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106164"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://pc-dl.panasonic.co.jp/dl/docs/077770",
"refsource" : "MISC",
"url" : "https://pc-dl.panasonic.co.jp/dl/docs/077770"
},
{
"name": "JVN#36895151",
"refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN36895151/index.html"
},
{
"name": "https://pc-dl.panasonic.co.jp/dl/docs/077770",
"refsource": "MISC",
"url": "https://pc-dl.panasonic.co.jp/dl/docs/077770"
}
]
}

View File

@ -52,35 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT208848",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208848"
},
{
"name": "https://support.apple.com/HT208850",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208850"
},
{
"name" : "https://support.apple.com/HT208852",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208852"
},
{
"name": "https://support.apple.com/HT208853",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208853"
},
{
"name": "GLSA-201808-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201808-04"
},
{
"name": "https://support.apple.com/HT208854",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208854"
},
{
"name" : "GLSA-201808-04",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201808-04"
"name": "1041029",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041029"
},
{
"name": "USN-3687-1",
@ -88,9 +83,14 @@
"url": "https://usn.ubuntu.com/3687-1/"
},
{
"name" : "1041029",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041029"
"name": "https://support.apple.com/HT208848",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208848"
},
{
"name": "https://support.apple.com/HT208852",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208852"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-9854",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}