"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:44:24 +00:00
parent 3f63c473eb
commit c2d3000c2b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 3959 additions and 3917 deletions

View File

@ -57,15 +57,15 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-509" "url": "http://www.debian.org/security/2004/dsa-509"
}, },
{
"name" : "10437",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/10437"
},
{ {
"name": "gatos-xatitv-gain-privileges(16273)", "name": "gatos-xatitv-gain-privileges(16273)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16273" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16273"
},
{
"name": "10437",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10437"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "GLSA-200409-22",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200409-22.xml"
},
{ {
"name": "http://downloads.phpgroupware.org/changelog", "name": "http://downloads.phpgroupware.org/changelog",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://downloads.phpgroupware.org/changelog" "url": "http://downloads.phpgroupware.org/changelog"
}, },
{
"name": "GLSA-200409-22",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200409-22.xml"
},
{ {
"name": "phpgroupware-xss(17289)", "name": "phpgroupware-xss(17289)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "midnight-commander-section-dos(18907)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18907"
},
{
"name": "13863",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13863/"
},
{ {
"name": "DSA-639", "name": "DSA-639",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -61,16 +71,6 @@
"name": "RHSA-2005:512", "name": "RHSA-2005:512",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-512.html" "url": "http://www.redhat.com/support/errata/RHSA-2005-512.html"
},
{
"name" : "13863",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/13863/"
},
{
"name" : "midnight-commander-section-dos(18907)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18907"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "midnight-commander-command-execution(18906)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18906"
},
{
"name": "13863",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13863/"
},
{
"name": "1012903",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1012903"
},
{ {
"name": "DSA-639", "name": "DSA-639",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -61,21 +76,6 @@
"name": "RHSA-2005:512", "name": "RHSA-2005:512",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-512.html" "url": "http://www.redhat.com/support/errata/RHSA-2005-512.html"
},
{
"name" : "1012903",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1012903"
},
{
"name" : "13863",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/13863/"
},
{
"name" : "midnight-commander-command-execution(18906)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18906"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20040825 Multiple Vulnerabilities in Cisco Secure Access Control Server",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml"
},
{ {
"name": "11047", "name": "11047",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "ciscosecure-leap-radius-dos(17116)", "name": "ciscosecure-leap-radius-dos(17116)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17116" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17116"
},
{
"name": "20040825 Multiple Vulnerabilities in Cisco Secure Access Control Server",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=109483971420067&w=2" "url": "http://marc.info/?l=bugtraq&m=109483971420067&w=2"
}, },
{
"name" : "11371",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/11371"
},
{ {
"name": "12789", "name": "12789",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -71,6 +66,11 @@
"name": "merak-icewarp-path-disclosure(17315)", "name": "merak-icewarp-path-disclosure(17315)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17315" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17315"
},
{
"name": "11371",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11371"
} }
] ]
} }

View File

@ -53,45 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[announce] 20080215 Horde Groupware 1.0.4 (final)", "name": "29186",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://lists.horde.org/archives/announce/2008/000380.html" "url": "http://secunia.com/advisories/29186"
}, },
{ {
"name": "[announce] 20080215 Horde Groupware Webmail Edition 1.0.5 (final)", "name": "[announce] 20080215 Horde Groupware Webmail Edition 1.0.5 (final)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://lists.horde.org/archives/announce/2008/000381.html" "url": "http://lists.horde.org/archives/announce/2008/000381.html"
}, },
{
"name" : "[announce] 20080215 Turba H3 (2.2-RC3)",
"refsource" : "MLIST",
"url" : "http://lists.horde.org/archives/announce/2008/000379.html"
},
{
"name" : "[announce] 20080215 Turba H3 (2.1.7) (final)",
"refsource" : "MLIST",
"url" : "http://lists.horde.org/archives/announce/2008/000378.html"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=432027", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=432027",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027"
}, },
{
"name" : "DSA-1507",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1507"
},
{
"name" : "FEDORA-2008-2040",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
},
{ {
"name": "FEDORA-2008-2087", "name": "FEDORA-2008-2087",
"refsource": "FEDORA", "refsource": "FEDORA",
@ -103,14 +78,9 @@
"url": "http://www.securityfocus.com/bid/27844" "url": "http://www.securityfocus.com/bid/27844"
}, },
{ {
"name" : "ADV-2008-0593", "name": "DSA-1507",
"refsource" : "VUPEN", "refsource": "DEBIAN",
"url" : "http://www.vupen.com/english/advisories/2008/0593/references" "url": "http://www.debian.org/security/2008/dsa-1507"
},
{
"name" : "1019433",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019433"
}, },
{ {
"name": "28982", "name": "28982",
@ -123,9 +93,19 @@
"url": "http://secunia.com/advisories/29071" "url": "http://secunia.com/advisories/29071"
}, },
{ {
"name" : "29184", "name": "[announce] 20080215 Turba H3 (2.1.7) (final)",
"refsource" : "SECUNIA", "refsource": "MLIST",
"url" : "http://secunia.com/advisories/29184" "url": "http://lists.horde.org/archives/announce/2008/000378.html"
},
{
"name": "ADV-2008-0593",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0593/references"
},
{
"name": "[announce] 20080215 Turba H3 (2.2-RC3)",
"refsource": "MLIST",
"url": "http://lists.horde.org/archives/announce/2008/000379.html"
}, },
{ {
"name": "29185", "name": "29185",
@ -133,9 +113,29 @@
"url": "http://secunia.com/advisories/29185" "url": "http://secunia.com/advisories/29185"
}, },
{ {
"name" : "29186", "name": "[announce] 20080215 Horde Groupware 1.0.4 (final)",
"refsource": "MLIST",
"url": "http://lists.horde.org/archives/announce/2008/000380.html"
},
{
"name": "1019433",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019433"
},
{
"name": "29184",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/29186" "url": "http://secunia.com/advisories/29184"
},
{
"name": "FEDORA-2008-2040",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://osvdb.org/ref/48/48-v-webmail.txt" "url": "http://osvdb.org/ref/48/48-v-webmail.txt"
}, },
{
"name" : "48796",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/48796"
},
{ {
"name": "vwebmail-redirect-phishing(45855)", "name": "vwebmail-redirect-phishing(45855)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45855" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45855"
},
{
"name": "48796",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/48796"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.securityfocus.com/bid/30331/exploit",
"refsource" : "MISC",
"url" : "http://www.securityfocus.com/bid/30331/exploit"
},
{ {
"name": "30331", "name": "30331",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "runcms-votepolls-file-include(43969)", "name": "runcms-votepolls-file-include(43969)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43969" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43969"
},
{
"name": "http://www.securityfocus.com/bid/30331/exploit",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/30331/exploit"
} }
] ]
} }

View File

@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080718 Def_Blog 1.0.3 Multiple Remote SQL Injection Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/494534/100/0/threaded"
},
{ {
"name": "30289", "name": "30289",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/30289" "url": "http://www.securityfocus.com/bid/30289"
}, },
{ {
"name" : "31174", "name": "20080718 Def_Blog 1.0.3 Multiple Remote SQL Injection Vulnerabilities",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/31174" "url": "http://www.securityfocus.com/archive/1/494534/100/0/threaded"
}, },
{ {
"name": "4079", "name": "4079",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4079" "url": "http://securityreason.com/securityalert/4079"
}, },
{
"name": "31174",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31174"
},
{ {
"name": "defblog-comaddok-comlook-sql-injection(43909)", "name": "defblog-comaddok-comlook-sql-injection(43909)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-3823", "ID": "CVE-2008-3823",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,64 +53,64 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080910 [oCERT-2008-012] Horde, Popoon frameworks common input sanitization errors (XSS)", "name": "horde-mime-xss(45030)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/496182/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45030"
},
{
"name" : "[horde-announce] 20080910 [SECURITY] Horde 3.2.2 (final)",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=horde-announce&m=122104360019867&w=2"
},
{
"name" : "[oss-security] 20080910 [oCERT-2008-012] Horde, Popoon frameworks common input sanitization errors (XSS)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/09/10/1"
},
{
"name" : "http://ocert.org/patches/2008-012/MIME.patch",
"refsource" : "MISC",
"url" : "http://ocert.org/patches/2008-012/MIME.patch"
},
{
"name" : "http://www.ocert.org/advisories/ocert-2008-012.html",
"refsource" : "MISC",
"url" : "http://www.ocert.org/advisories/ocert-2008-012.html"
},
{
"name" : "DSA-1642",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1642"
},
{
"name" : "31110",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31110"
},
{
"name" : "ADV-2008-2548",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2548"
}, },
{ {
"name": "31842", "name": "31842",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31842" "url": "http://secunia.com/advisories/31842"
}, },
{
"name": "DSA-1642",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1642"
},
{
"name": "ADV-2008-2548",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2548"
},
{ {
"name": "31959", "name": "31959",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31959" "url": "http://secunia.com/advisories/31959"
}, },
{
"name": "http://ocert.org/patches/2008-012/MIME.patch",
"refsource": "MISC",
"url": "http://ocert.org/patches/2008-012/MIME.patch"
},
{
"name": "[horde-announce] 20080910 [SECURITY] Horde 3.2.2 (final)",
"refsource": "MLIST",
"url": "http://marc.info/?l=horde-announce&m=122104360019867&w=2"
},
{
"name": "31110",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31110"
},
{
"name": "20080910 [oCERT-2008-012] Horde, Popoon frameworks common input sanitization errors (XSS)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/496182/100/0/threaded"
},
{ {
"name": "4245", "name": "4245",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4245" "url": "http://securityreason.com/securityalert/4245"
}, },
{ {
"name" : "horde-mime-xss(45030)", "name": "[oss-security] 20080910 [oCERT-2008-012] Horde, Popoon frameworks common input sanitization errors (XSS)",
"refsource" : "XF", "refsource": "MLIST",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45030" "url": "http://www.openwall.com/lists/oss-security/2008/09/10/1"
},
{
"name": "http://www.ocert.org/advisories/ocert-2008-012.html",
"refsource": "MISC",
"url": "http://www.ocert.org/advisories/ocert-2008-012.html"
} }
] ]
} }

View File

@ -52,30 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20080911 CVE request for Joomla multiple vuln.",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=122118210029084&w=2"
},
{
"name" : "[oss-security] 20080911 CVE request: joomla < 1.5.7",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=122115344915232&w=2"
},
{ {
"name": "[oss-security] 20080916 Re: CVE request: joomla < 1.5.7", "name": "[oss-security] 20080916 Re: CVE request: joomla < 1.5.7",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=122152798516853&w=2" "url": "http://marc.info/?l=oss-security&m=122152798516853&w=2"
}, },
{
"name": "31789",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31789"
},
{ {
"name": "http://developer.joomla.org/security/news/273-20080903-core-commailto-spam.html", "name": "http://developer.joomla.org/security/news/273-20080903-core-commailto-spam.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://developer.joomla.org/security/news/273-20080903-core-commailto-spam.html" "url": "http://developer.joomla.org/security/news/273-20080903-core-commailto-spam.html"
}, },
{ {
"name" : "31789", "name": "[oss-security] 20080911 CVE request: joomla < 1.5.7",
"refsource" : "SECUNIA", "refsource": "MLIST",
"url" : "http://secunia.com/advisories/31789" "url": "http://marc.info/?l=oss-security&m=122115344915232&w=2"
}, },
{ {
"name": "4275", "name": "4275",
@ -86,6 +81,11 @@
"name": "mailto-joomla-mail-relay(45070)", "name": "mailto-joomla-mail-relay(45070)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45070" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45070"
},
{
"name": "[oss-security] 20080911 CVE request for Joomla multiple vuln.",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=122118210029084&w=2"
} }
] ]
} }

View File

@ -53,9 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20081021 CVE Request: Opera 9.60 with security fixes", "name": "32394",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://www.openwall.com/lists/oss-security/2008/10/21/5" "url": "http://secunia.com/advisories/32394"
},
{
"name": "32538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32538"
},
{
"name": "http://www.opera.com/docs/changelogs/solaris/960/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/solaris/960/"
}, },
{ {
"name": "[oss-security] 20081022 Re: CVE Request: Opera 9.60 with security fixes", "name": "[oss-security] 20081022 Re: CVE Request: Opera 9.60 with security fixes",
@ -63,9 +73,39 @@
"url": "http://www.openwall.com/lists/oss-security/2008/10/22/5" "url": "http://www.openwall.com/lists/oss-security/2008/10/22/5"
}, },
{ {
"name" : "http://www.opera.com/docs/changelogs/freebsd/960/", "name": "1021016",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021016"
},
{
"name": "[oss-security] 20081021 CVE Request: Opera 9.60 with security fixes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/10/21/5"
},
{
"name": "32177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32177"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/960/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/freebsd/960/" "url": "http://www.opera.com/docs/changelogs/windows/960/"
},
{
"name": "opera-redirect-code-execution(45722)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45722"
},
{
"name": "31631",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31631"
},
{
"name": "SUSE-SR:2008:022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html"
}, },
{ {
"name": "http://www.opera.com/docs/changelogs/linux/960/", "name": "http://www.opera.com/docs/changelogs/linux/960/",
@ -78,64 +118,24 @@
"url": "http://www.opera.com/docs/changelogs/mac/960/" "url": "http://www.opera.com/docs/changelogs/mac/960/"
}, },
{ {
"name" : "http://www.opera.com/docs/changelogs/solaris/960/", "name": "ADV-2008-2765",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://www.opera.com/docs/changelogs/solaris/960/" "url": "http://www.vupen.com/english/advisories/2008/2765"
},
{
"name" : "http://www.opera.com/docs/changelogs/windows/960/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/windows/960/"
}, },
{ {
"name": "http://www.opera.com/support/search/view/901/", "name": "http://www.opera.com/support/search/view/901/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.opera.com/support/search/view/901/" "url": "http://www.opera.com/support/search/view/901/"
}, },
{
"name": "http://www.opera.com/docs/changelogs/freebsd/960/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/freebsd/960/"
},
{ {
"name": "GLSA-200811-01", "name": "GLSA-200811-01",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200811-01.xml" "url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
},
{
"name" : "SUSE-SR:2008:022",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html"
},
{
"name" : "31631",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31631"
},
{
"name" : "32538",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32538"
},
{
"name" : "ADV-2008-2765",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2765"
},
{
"name" : "1021016",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1021016"
},
{
"name" : "32177",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32177"
},
{
"name" : "32394",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32394"
},
{
"name" : "opera-redirect-code-execution(45722)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45722"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "49597",
"refsource": "OSVDB",
"url": "http://osvdb.org/49597"
},
{ {
"name": "6942", "name": "6942",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -62,11 +67,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32060" "url": "http://www.securityfocus.com/bid/32060"
}, },
{
"name" : "49597",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/49597"
},
{ {
"name": "4541", "name": "4541",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://kayalang.org/about/news",
"refsource" : "CONFIRM",
"url" : "http://kayalang.org/about/news"
},
{ {
"name": "45882", "name": "45882",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/45882" "url": "http://osvdb.org/45882"
}, },
{
"name": "kaya-cgiframework-header-injection(42774)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42774"
},
{ {
"name": "30466", "name": "30466",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30466" "url": "http://secunia.com/advisories/30466"
}, },
{ {
"name" : "kaya-cgiframework-header-injection(42774)", "name": "http://kayalang.org/about/news",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42774" "url": "http://kayalang.org/about/news"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "7408",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7408"
},
{ {
"name": "32761", "name": "32761",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "livinglocal-listtest-xss(47214)", "name": "livinglocal-listtest-xss(47214)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47214" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47214"
},
{
"name": "7408",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7408"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "7558",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7558"
},
{ {
"name": "32989", "name": "32989",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "phpld-page-sql-injection(47580)", "name": "phpld-page-sql-injection(47580)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47580" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47580"
},
{
"name": "7558",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7558"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2144", "ID": "CVE-2013-2144",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-2376", "ID": "CVE-2013-2376",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html", "name": "53372",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html" "url": "http://secunia.com/advisories/53372"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}, },
{ {
"name": "GLSA-201308-06", "name": "GLSA-201308-06",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
}, },
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
},
{ {
"name": "MDVSA-2013:150", "name": "MDVSA-2013:150",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
}, },
{ {
"name" : "53372", "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/53372" "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-2384", "ID": "CVE-2013-2384",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,70 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[distro-pkg-dev] 20130417 [SECURITY] IcedTea 1.11.10 for OpenJDK 6 Released!",
"refsource" : "MLIST",
"url" : "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022796.html"
},
{
"name" : "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7",
"refsource" : "MISC",
"url" : "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=952709", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=952709",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "name": "SUSE-SU-2013:0835",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html"
},
{
"name" : "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/",
"refsource" : "CONFIRM",
"url" : "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/"
},
{
"name" : "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/",
"refsource" : "CONFIRM",
"url" : "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/"
},
{
"name" : "http://bugs.icu-project.org/trac/ticket/10107",
"refsource" : "CONFIRM",
"url" : "http://bugs.icu-project.org/trac/ticket/10107"
},
{
"name" : "http://site.icu-project.org/download/51#TOC-Known-Issues",
"refsource" : "CONFIRM",
"url" : "http://site.icu-project.org/download/51#TOC-Known-Issues"
},
{
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124",
"refsource" : "CONFIRM",
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124"
},
{
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
"refsource" : "CONFIRM",
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name" : "APPLE-SA-2013-04-16-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
}, },
{ {
"name": "GLSA-201406-32", "name": "GLSA-201406-32",
@ -123,55 +68,140 @@
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
}, },
{ {
"name" : "HPSBUX02889", "name": "[distro-pkg-dev] 20130417 [SECURITY] IcedTea 1.11.10 for OpenJDK 6 Released!",
"refsource" : "HP", "refsource": "MLIST",
"url" : "http://marc.info/?l=bugtraq&m=137283787217316&w=2" "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022796.html"
}, },
{ {
"name" : "SSRT101252", "name": "SUSE-SU-2013:0871",
"refsource" : "HP", "refsource": "SUSE",
"url" : "http://marc.info/?l=bugtraq&m=137283787217316&w=2" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html"
},
{
"name" : "HPSBUX02922",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "SSRT101305",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "MDVSA-2013:145",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:145"
},
{
"name" : "MDVSA-2013:161",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:161"
},
{
"name" : "RHSA-2013:0752",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0752.html"
},
{
"name" : "RHSA-2013:0757",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
}, },
{ {
"name": "RHSA-2013:0758", "name": "RHSA-2013:0758",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0758.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-0758.html"
}, },
{
"name": "http://site.icu-project.org/download/51#TOC-Known-Issues",
"refsource": "CONFIRM",
"url": "http://site.icu-project.org/download/51#TOC-Known-Issues"
},
{
"name": "APPLE-SA-2013-04-16-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
},
{
"name": "MDVSA-2013:145",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:145"
},
{
"name": "TA13-107A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-107A"
},
{
"name": "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/",
"refsource": "CONFIRM",
"url": "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/"
},
{
"name": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7",
"refsource": "MISC",
"url": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7"
},
{
"name": "SSRT101252",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
},
{ {
"name": "RHSA-2013:1455", "name": "RHSA-2013:1455",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
}, },
{
"name": "oval:org.mitre.oval:def:19549",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19549"
},
{
"name": "SSRT101305",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "RHSA-2013:0757",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
},
{
"name": "HPSBUX02922",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124"
},
{
"name": "openSUSE-SU-2013:0777",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html"
},
{
"name": "MDVSA-2013:161",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:161"
},
{
"name": "openSUSE-SU-2013:0964",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html"
},
{
"name": "RHSA-2013:0752",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0752.html"
},
{
"name": "http://bugs.icu-project.org/trac/ticket/10107",
"refsource": "CONFIRM",
"url": "http://bugs.icu-project.org/trac/ticket/10107"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name": "oval:org.mitre.oval:def:16549",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16549"
},
{
"name": "USN-1806-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1806-1"
},
{
"name": "oval:org.mitre.oval:def:19341",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19341"
},
{
"name": "59179",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59179"
},
{ {
"name": "RHSA-2013:1456", "name": "RHSA-2013:1456",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -183,19 +213,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html"
}, },
{ {
"name" : "openSUSE-SU-2013:0777", "name": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}, },
{ {
"name" : "SUSE-SU-2013:0835", "name": "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" "url": "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/"
},
{
"name" : "SUSE-SU-2013:0871",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html"
}, },
{ {
"name": "SUSE-SU-2013:0934", "name": "SUSE-SU-2013:0934",
@ -203,39 +228,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html"
}, },
{ {
"name" : "openSUSE-SU-2013:0964", "name": "HPSBUX02889",
"refsource" : "SUSE", "refsource": "HP",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" "url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
}, },
{ {
"name" : "USN-1806-1", "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-1806-1" "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name" : "TA13-107A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-107A"
},
{
"name" : "59179",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/59179"
},
{
"name" : "oval:org.mitre.oval:def:16549",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16549"
},
{
"name" : "oval:org.mitre.oval:def:19341",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19341"
},
{
"name" : "oval:org.mitre.oval:def:19549",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19549"
} }
] ]
} }

View File

@ -52,31 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html"
},
{ {
"name": "20130926 XAMPP 1.8.1 Local Write Access Vulnerability", "name": "20130926 XAMPP 1.8.1 Local Write Access Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0131.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0131.html"
}, },
{
"name": "97780",
"refsource": "OSVDB",
"url": "http://osvdb.org/97780"
},
{ {
"name": "28654", "name": "28654",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/28654" "url": "http://www.exploit-db.com/exploits/28654"
}, },
{
"name" : "http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html"
},
{ {
"name": "62665", "name": "62665",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/62665" "url": "http://www.securityfocus.com/bid/62665"
}, },
{
"name" : "97780",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/97780"
},
{ {
"name": "xampp-cve20122586-lang-security-bypass(87499)", "name": "xampp-cve20122586-lang-security-bypass(87499)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20131120 Mybb Ajaxfs Plugin Sql Injection vulnerability", "name": "100030",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://seclists.org/bugtraq/2013/Nov/102" "url": "http://osvdb.org/100030"
}, },
{ {
"name": "29797", "name": "29797",
@ -72,15 +72,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.iedb.ir/exploits-889.html" "url": "http://www.iedb.ir/exploits-889.html"
}, },
{
"name" : "100030",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/100030"
},
{ {
"name": "mybb-ajaxfs-sql-injection(89084)", "name": "mybb-ajaxfs-sql-injection(89084)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89084" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89084"
},
{
"name": "20131120 Mybb Ajaxfs Plugin Sql Injection vulnerability",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2013/Nov/102"
} }
] ]
} }

View File

@ -70,24 +70,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "44141", "name": "1038946",
"refsource" : "EXPLOIT-DB", "refsource": "SECTRACK",
"url" : "https://www.exploit-db.com/exploits/44141/" "url": "http://www.securitytracker.com/id/1038946"
}, },
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
}, },
{
"name": "44141",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44141/"
},
{ {
"name": "99770", "name": "99770",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/99770" "url": "http://www.securityfocus.com/bid/99770"
},
{
"name" : "1038946",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038946"
} }
] ]
} }

View File

@ -53,29 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "42943", "name": "1039474",
"refsource" : "EXPLOIT-DB", "refsource": "SECTRACK",
"url" : "https://www.exploit-db.com/exploits/42943/" "url": "http://www.securitytracker.com/id/1039474"
}, },
{ {
"name" : "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", "name": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq",
"refsource" : "MLIST",
"url" : "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html"
},
{
"name" : "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.",
"refsource" : "MLIST",
"url" : "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html"
},
{
"name" : "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html",
"refsource" : "MISC",
"url" : "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html"
},
{
"name" : "http://thekelleys.org.uk/dnsmasq/CHANGELOG",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://thekelleys.org.uk/dnsmasq/CHANGELOG" "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq"
},
{
"name": "DSA-3989",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3989"
}, },
{ {
"name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033", "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033",
@ -88,69 +78,79 @@
"url": "https://access.redhat.com/security/vulnerabilities/3199382" "url": "https://access.redhat.com/security/vulnerabilities/3199382"
}, },
{ {
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", "name": "101085",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" "url": "http://www.securityfocus.com/bid/101085"
}, },
{ {
"name" : "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", "name": "42943",
"refsource" : "CONFIRM", "refsource": "EXPLOIT-DB",
"url" : "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" "url": "https://www.exploit-db.com/exploits/42943/"
},
{
"name" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt",
"refsource" : "CONFIRM",
"url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt"
},
{
"name" : "DSA-3989",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3989"
},
{
"name" : "GLSA-201710-27",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201710-27"
},
{
"name" : "RHSA-2017:2836",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2836"
},
{
"name" : "RHSA-2017:2837",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2837"
},
{
"name" : "openSUSE-SU-2017:2633",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html"
}, },
{ {
"name": "USN-3430-1", "name": "USN-3430-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3430-1" "url": "http://www.ubuntu.com/usn/USN-3430-1"
}, },
{
"name" : "USN-3430-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3430-2"
},
{ {
"name": "VU#973527", "name": "VU#973527",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/973527" "url": "https://www.kb.cert.org/vuls/id/973527"
}, },
{ {
"name" : "101085", "name": "GLSA-201710-27",
"refsource" : "BID", "refsource": "GENTOO",
"url" : "http://www.securityfocus.com/bid/101085" "url": "https://security.gentoo.org/glsa/201710-27"
}, },
{ {
"name" : "1039474", "name": "USN-3430-2",
"refsource" : "SECTRACK", "refsource": "UBUNTU",
"url" : "http://www.securitytracker.com/id/1039474" "url": "http://www.ubuntu.com/usn/USN-3430-2"
},
{
"name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.",
"refsource": "MLIST",
"url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html"
},
{
"name": "RHSA-2017:2836",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2836"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt"
},
{
"name": "RHSA-2017:2837",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2837"
},
{
"name": "http://thekelleys.org.uk/dnsmasq/CHANGELOG",
"refsource": "CONFIRM",
"url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG"
},
{
"name": "openSUSE-SU-2017:2633",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html"
},
{
"name": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html",
"refsource": "MISC",
"url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html"
},
{
"name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.",
"refsource": "MLIST",
"url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-14677", "ID": "CVE-2017-14677",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/", "name": "101611",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/" "url": "http://www.securityfocus.com/bid/101611"
},
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=22200",
"refsource" : "MISC",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=22200"
},
{
"name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf",
"refsource" : "MISC",
"url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf"
}, },
{ {
"name": "GLSA-201801-01", "name": "GLSA-201801-01",
@ -73,9 +63,19 @@
"url": "https://security.gentoo.org/glsa/201801-01" "url": "https://security.gentoo.org/glsa/201801-01"
}, },
{ {
"name" : "101611", "name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/101611" "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=22200",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22200"
},
{
"name": "https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/",
"refsource": "MISC",
"url": "https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "lpardo@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-15138", "ID": "CVE-2017-15138",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515",
"refsource" : "CONFIRM",
"url" : "https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515"
},
{ {
"name": "https://github.com/radare/radare2/issues/8673", "name": "https://github.com/radare/radare2/issues/8673",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/radare/radare2/issues/8673" "url": "https://github.com/radare/radare2/issues/8673"
},
{
"name": "https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515",
"refsource": "CONFIRM",
"url": "https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-15794", "ID": "CVE-2017-15794",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
"refsource" : "CONFIRM",
"url" : "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
},
{ {
"name": "https://github.com/systemd/systemd/pull/5998", "name": "https://github.com/systemd/systemd/pull/5998",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,6 +62,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/1621396" "url": "https://launchpad.net/bugs/1621396"
}, },
{
"name": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
"refsource": "CONFIRM",
"url": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
},
{ {
"name": "98677", "name": "98677",
"refsource": "BID", "refsource": "BID",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2", "name": "1040463",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2" "url": "http://www.securitytracker.com/id/1040463"
}, },
{ {
"name": "103328", "name": "103328",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/103328" "url": "http://www.securityfocus.com/bid/103328"
}, },
{ {
"name" : "1040463", "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1040463" "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss"
},
{ {
"name": "103551", "name": "103551",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103551" "url": "http://www.securityfocus.com/bid/103551"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss"
} }
] ]
} }

View File

@ -60,15 +60,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20180905 Cisco Umbrella API Unauthorized Access Vulnerability",
"refsource" : "CISCO",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-api"
},
{ {
"name": "105283", "name": "105283",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/105283" "url": "http://www.securityfocus.com/bid/105283"
},
{
"name": "20180905 Cisco Umbrella API Unauthorized Access Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-api"
} }
] ]
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-06-05T13:57:43.653459", "DATE_ASSIGNED": "2018-06-05T13:57:43.653459",
"DATE_REQUESTED": "2018-05-09T00:00:00", "DATE_REQUESTED": "2018-05-09T00:00:00",
"ID": "CVE-2018-1000195", "ID": "CVE-2018-1000195",
@ -14,18 +14,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Jenkins", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "2.120 and older, LTS 2.107.2 and older" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Jenkins project" "vendor_name": "n/a"
} }
] ]
} }
@ -47,7 +47,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-441, CWE-918" "value": "n/a"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-11-27T13:54:33.456461", "DATE_ASSIGNED": "2018-11-27T13:54:33.456461",
"DATE_REQUESTED": "2018-10-15T09:16:59", "DATE_REQUESTED": "2018-10-15T09:16:59",
"ID": "CVE-2018-1000816", "ID": "CVE-2018-1000816",
@ -14,18 +14,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Grafana", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "confirmed for 5.2.4 and 5.3.0 " "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Grafana" "vendor_name": "n/a"
} }
] ]
} }
@ -47,7 +47,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Cross Site Scripting (XSS)" "value": "n/a"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "44919",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/44919/"
},
{ {
"name": "https://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html", "name": "https://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html",
"refsource": "MISC", "refsource": "MISC",
"url": "https://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html" "url": "https://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html"
}, },
{ {
"name" : "http://www.iwantacve.cn/index.php/archives/44/", "name": "44919",
"refsource" : "MISC", "refsource": "EXPLOIT-DB",
"url" : "http://www.iwantacve.cn/index.php/archives/44/" "url": "https://www.exploit-db.com/exploits/44919/"
}, },
{ {
"name": "https://www.cnblogs.com/v1vvwv/p/9203899.html", "name": "https://www.cnblogs.com/v1vvwv/p/9203899.html",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.cnblogs.com/v1vvwv/p/9203899.html" "url": "https://www.cnblogs.com/v1vvwv/p/9203899.html"
},
{
"name": "http://www.iwantacve.cn/index.php/archives/44/",
"refsource": "MISC",
"url": "http://www.iwantacve.cn/index.php/archives/44/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com", "ASSIGNER": "security@google.com",
"ID": "CVE-2018-16078", "ID": "CVE-2018-16078",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -54,9 +54,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://crbug.com/858820", "name": "105215",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://crbug.com/858820" "url": "http://www.securityfocus.com/bid/105215"
},
{
"name": "RHSA-2018:2666",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2666"
}, },
{ {
"name": "https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html", "name": "https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html",
@ -69,14 +74,9 @@
"url": "https://security.gentoo.org/glsa/201811-10" "url": "https://security.gentoo.org/glsa/201811-10"
}, },
{ {
"name" : "RHSA-2018:2666", "name": "https://crbug.com/858820",
"refsource" : "REDHAT", "refsource": "MISC",
"url" : "https://access.redhat.com/errata/RHSA-2018:2666" "url": "https://crbug.com/858820"
},
{
"name" : "105215",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/105215"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176",
"refsource" : "MISC",
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176"
},
{ {
"name": "https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more", "name": "https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more",
"refsource": "MISC", "refsource": "MISC",
"url": "https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more" "url": "https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176",
"refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "106375",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106375"
},
{ {
"name": "[debian-lts-announce] 20180921 [SECURITY] [DLA 1513-1] openafs security update", "name": "[debian-lts-announce] 20180921 [SECURITY] [DLA 1513-1] openafs security update",
"refsource": "MLIST", "refsource": "MLIST",
@ -66,11 +71,6 @@
"name": "DSA-4302", "name": "DSA-4302",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4302" "url": "https://www.debian.org/security/2018/dsa-4302"
},
{
"name" : "106375",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/106375"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/HT208849",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208849"
},
{ {
"name": "1041027", "name": "1041027",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041027" "url": "http://www.securitytracker.com/id/1041027"
},
{
"name": "https://support.apple.com/HT208849",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208849"
} }
] ]
} }

View File

@ -1,17 +1,59 @@
{ {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-5417",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0", "data_version": "4.0",
"description": { "CVE_data_meta": {
"description_data": [ "ID": "CVE-2019-5417",
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{ {
"lang": "eng", "vendor_name": "n/a",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "product": {
"product_data": [
{
"product_name": "serve",
"version": {
"version_data": [
{
"version_value": "Fixed Version 7.1.3"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": {
"lang": "eng",
"value": "Directory Traversal (Local File Inclusion)"
}
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/358645",
"url": "https://hackerone.com/reports/358645"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A path traversal vulnerability in serve npm package version 7.0.1 allows the attackers to read content of arbitrary files on the remote server."
} }
] ]
} }