"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:44:24 +00:00
parent 3f63c473eb
commit c2d3000c2b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 3959 additions and 3917 deletions

View File

@ -57,15 +57,15 @@
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-509"
},
{
"name" : "10437",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/10437"
},
{
"name": "gatos-xatitv-gain-privileges(16273)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16273"
},
{
"name": "10437",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10437"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "GLSA-200409-22",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200409-22.xml"
},
{
"name": "http://downloads.phpgroupware.org/changelog",
"refsource": "CONFIRM",
"url": "http://downloads.phpgroupware.org/changelog"
},
{
"name": "GLSA-200409-22",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200409-22.xml"
},
{
"name": "phpgroupware-xss(17289)",
"refsource": "XF",

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "midnight-commander-section-dos(18907)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18907"
},
{
"name": "13863",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13863/"
},
{
"name": "DSA-639",
"refsource": "DEBIAN",
@ -61,16 +71,6 @@
"name": "RHSA-2005:512",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-512.html"
},
{
"name" : "13863",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/13863/"
},
{
"name" : "midnight-commander-section-dos(18907)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18907"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "midnight-commander-command-execution(18906)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18906"
},
{
"name": "13863",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13863/"
},
{
"name": "1012903",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1012903"
},
{
"name": "DSA-639",
"refsource": "DEBIAN",
@ -61,21 +76,6 @@
"name": "RHSA-2005:512",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-512.html"
},
{
"name" : "1012903",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1012903"
},
{
"name" : "13863",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/13863/"
},
{
"name" : "midnight-commander-command-execution(18906)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18906"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20040825 Multiple Vulnerabilities in Cisco Secure Access Control Server",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml"
},
{
"name": "11047",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "ciscosecure-leap-radius-dos(17116)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17116"
},
{
"name": "20040825 Multiple Vulnerabilities in Cisco Secure Access Control Server",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=109483971420067&w=2"
},
{
"name" : "11371",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/11371"
},
{
"name": "12789",
"refsource": "SECUNIA",
@ -71,6 +66,11 @@
"name": "merak-icewarp-path-disclosure(17315)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17315"
},
{
"name": "11371",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11371"
}
]
}

View File

@ -53,45 +53,20 @@
"references": {
"reference_data": [
{
"name" : "[announce] 20080215 Horde Groupware 1.0.4 (final)",
"refsource" : "MLIST",
"url" : "http://lists.horde.org/archives/announce/2008/000380.html"
"name": "29186",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29186"
},
{
"name": "[announce] 20080215 Horde Groupware Webmail Edition 1.0.5 (final)",
"refsource": "MLIST",
"url": "http://lists.horde.org/archives/announce/2008/000381.html"
},
{
"name" : "[announce] 20080215 Turba H3 (2.2-RC3)",
"refsource" : "MLIST",
"url" : "http://lists.horde.org/archives/announce/2008/000379.html"
},
{
"name" : "[announce] 20080215 Turba H3 (2.1.7) (final)",
"refsource" : "MLIST",
"url" : "http://lists.horde.org/archives/announce/2008/000378.html"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=432027",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027"
},
{
"name" : "DSA-1507",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1507"
},
{
"name" : "FEDORA-2008-2040",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
},
{
"name": "FEDORA-2008-2087",
"refsource": "FEDORA",
@ -103,14 +78,9 @@
"url": "http://www.securityfocus.com/bid/27844"
},
{
"name" : "ADV-2008-0593",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0593/references"
},
{
"name" : "1019433",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019433"
"name": "DSA-1507",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1507"
},
{
"name": "28982",
@ -123,9 +93,19 @@
"url": "http://secunia.com/advisories/29071"
},
{
"name" : "29184",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29184"
"name": "[announce] 20080215 Turba H3 (2.1.7) (final)",
"refsource": "MLIST",
"url": "http://lists.horde.org/archives/announce/2008/000378.html"
},
{
"name": "ADV-2008-0593",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0593/references"
},
{
"name": "[announce] 20080215 Turba H3 (2.2-RC3)",
"refsource": "MLIST",
"url": "http://lists.horde.org/archives/announce/2008/000379.html"
},
{
"name": "29185",
@ -133,9 +113,29 @@
"url": "http://secunia.com/advisories/29185"
},
{
"name" : "29186",
"name": "[announce] 20080215 Horde Groupware 1.0.4 (final)",
"refsource": "MLIST",
"url": "http://lists.horde.org/archives/announce/2008/000380.html"
},
{
"name": "1019433",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019433"
},
{
"name": "29184",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/29186"
"url": "http://secunia.com/advisories/29184"
},
{
"name": "FEDORA-2008-2040",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "http://osvdb.org/ref/48/48-v-webmail.txt"
},
{
"name" : "48796",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/48796"
},
{
"name": "vwebmail-redirect-phishing(45855)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45855"
},
{
"name": "48796",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/48796"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.securityfocus.com/bid/30331/exploit",
"refsource" : "MISC",
"url" : "http://www.securityfocus.com/bid/30331/exploit"
},
{
"name": "30331",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "runcms-votepolls-file-include(43969)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43969"
},
{
"name": "http://www.securityfocus.com/bid/30331/exploit",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/30331/exploit"
}
]
}

View File

@ -52,26 +52,26 @@
},
"references": {
"reference_data": [
{
"name" : "20080718 Def_Blog 1.0.3 Multiple Remote SQL Injection Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/494534/100/0/threaded"
},
{
"name": "30289",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30289"
},
{
"name" : "31174",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31174"
"name": "20080718 Def_Blog 1.0.3 Multiple Remote SQL Injection Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494534/100/0/threaded"
},
{
"name": "4079",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4079"
},
{
"name": "31174",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31174"
},
{
"name": "defblog-comaddok-comlook-sql-injection(43909)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-3823",
"STATE": "PUBLIC"
},
@ -53,64 +53,64 @@
"references": {
"reference_data": [
{
"name" : "20080910 [oCERT-2008-012] Horde, Popoon frameworks common input sanitization errors (XSS)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/496182/100/0/threaded"
},
{
"name" : "[horde-announce] 20080910 [SECURITY] Horde 3.2.2 (final)",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=horde-announce&m=122104360019867&w=2"
},
{
"name" : "[oss-security] 20080910 [oCERT-2008-012] Horde, Popoon frameworks common input sanitization errors (XSS)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/09/10/1"
},
{
"name" : "http://ocert.org/patches/2008-012/MIME.patch",
"refsource" : "MISC",
"url" : "http://ocert.org/patches/2008-012/MIME.patch"
},
{
"name" : "http://www.ocert.org/advisories/ocert-2008-012.html",
"refsource" : "MISC",
"url" : "http://www.ocert.org/advisories/ocert-2008-012.html"
},
{
"name" : "DSA-1642",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1642"
},
{
"name" : "31110",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31110"
},
{
"name" : "ADV-2008-2548",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2548"
"name": "horde-mime-xss(45030)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45030"
},
{
"name": "31842",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31842"
},
{
"name": "DSA-1642",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1642"
},
{
"name": "ADV-2008-2548",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2548"
},
{
"name": "31959",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31959"
},
{
"name": "http://ocert.org/patches/2008-012/MIME.patch",
"refsource": "MISC",
"url": "http://ocert.org/patches/2008-012/MIME.patch"
},
{
"name": "[horde-announce] 20080910 [SECURITY] Horde 3.2.2 (final)",
"refsource": "MLIST",
"url": "http://marc.info/?l=horde-announce&m=122104360019867&w=2"
},
{
"name": "31110",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31110"
},
{
"name": "20080910 [oCERT-2008-012] Horde, Popoon frameworks common input sanitization errors (XSS)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/496182/100/0/threaded"
},
{
"name": "4245",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4245"
},
{
"name" : "horde-mime-xss(45030)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45030"
"name": "[oss-security] 20080910 [oCERT-2008-012] Horde, Popoon frameworks common input sanitization errors (XSS)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/09/10/1"
},
{
"name": "http://www.ocert.org/advisories/ocert-2008-012.html",
"refsource": "MISC",
"url": "http://www.ocert.org/advisories/ocert-2008-012.html"
}
]
}

View File

@ -52,30 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20080911 CVE request for Joomla multiple vuln.",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=122118210029084&w=2"
},
{
"name" : "[oss-security] 20080911 CVE request: joomla < 1.5.7",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=122115344915232&w=2"
},
{
"name": "[oss-security] 20080916 Re: CVE request: joomla < 1.5.7",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=122152798516853&w=2"
},
{
"name": "31789",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31789"
},
{
"name": "http://developer.joomla.org/security/news/273-20080903-core-commailto-spam.html",
"refsource": "CONFIRM",
"url": "http://developer.joomla.org/security/news/273-20080903-core-commailto-spam.html"
},
{
"name" : "31789",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31789"
"name": "[oss-security] 20080911 CVE request: joomla < 1.5.7",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=122115344915232&w=2"
},
{
"name": "4275",
@ -86,6 +81,11 @@
"name": "mailto-joomla-mail-relay(45070)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45070"
},
{
"name": "[oss-security] 20080911 CVE request for Joomla multiple vuln.",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=122118210029084&w=2"
}
]
}

View File

@ -53,9 +53,19 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20081021 CVE Request: Opera 9.60 with security fixes",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/10/21/5"
"name": "32394",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32394"
},
{
"name": "32538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32538"
},
{
"name": "http://www.opera.com/docs/changelogs/solaris/960/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/solaris/960/"
},
{
"name": "[oss-security] 20081022 Re: CVE Request: Opera 9.60 with security fixes",
@ -63,9 +73,39 @@
"url": "http://www.openwall.com/lists/oss-security/2008/10/22/5"
},
{
"name" : "http://www.opera.com/docs/changelogs/freebsd/960/",
"name": "1021016",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021016"
},
{
"name": "[oss-security] 20081021 CVE Request: Opera 9.60 with security fixes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/10/21/5"
},
{
"name": "32177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32177"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/960/",
"refsource": "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/freebsd/960/"
"url": "http://www.opera.com/docs/changelogs/windows/960/"
},
{
"name": "opera-redirect-code-execution(45722)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45722"
},
{
"name": "31631",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31631"
},
{
"name": "SUSE-SR:2008:022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html"
},
{
"name": "http://www.opera.com/docs/changelogs/linux/960/",
@ -78,64 +118,24 @@
"url": "http://www.opera.com/docs/changelogs/mac/960/"
},
{
"name" : "http://www.opera.com/docs/changelogs/solaris/960/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/solaris/960/"
},
{
"name" : "http://www.opera.com/docs/changelogs/windows/960/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/windows/960/"
"name": "ADV-2008-2765",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2765"
},
{
"name": "http://www.opera.com/support/search/view/901/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/support/search/view/901/"
},
{
"name": "http://www.opera.com/docs/changelogs/freebsd/960/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/freebsd/960/"
},
{
"name": "GLSA-200811-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
},
{
"name" : "SUSE-SR:2008:022",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html"
},
{
"name" : "31631",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31631"
},
{
"name" : "32538",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32538"
},
{
"name" : "ADV-2008-2765",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2765"
},
{
"name" : "1021016",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1021016"
},
{
"name" : "32177",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32177"
},
{
"name" : "32394",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32394"
},
{
"name" : "opera-redirect-code-execution(45722)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45722"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "49597",
"refsource": "OSVDB",
"url": "http://osvdb.org/49597"
},
{
"name": "6942",
"refsource": "EXPLOIT-DB",
@ -62,11 +67,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32060"
},
{
"name" : "49597",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/49597"
},
{
"name": "4541",
"refsource": "SREASON",

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://kayalang.org/about/news",
"refsource" : "CONFIRM",
"url" : "http://kayalang.org/about/news"
},
{
"name": "45882",
"refsource": "OSVDB",
"url": "http://osvdb.org/45882"
},
{
"name": "kaya-cgiframework-header-injection(42774)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42774"
},
{
"name": "30466",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30466"
},
{
"name" : "kaya-cgiframework-header-injection(42774)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42774"
"name": "http://kayalang.org/about/news",
"refsource": "CONFIRM",
"url": "http://kayalang.org/about/news"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "7408",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7408"
},
{
"name": "32761",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "livinglocal-listtest-xss(47214)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47214"
},
{
"name": "7408",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7408"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "7558",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7558"
},
{
"name": "32989",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "phpld-page-sql-injection(47580)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47580"
},
{
"name": "7558",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7558"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2144",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-2376",
"STATE": "PUBLIC"
},
@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
"name": "53372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53372"
},
{
"name": "GLSA-201308-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
},
{
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name" : "53372",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/53372"
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-2384",
"STATE": "PUBLIC"
},
@ -52,70 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[distro-pkg-dev] 20130417 [SECURITY] IcedTea 1.11.10 for OpenJDK 6 Released!",
"refsource" : "MLIST",
"url" : "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022796.html"
},
{
"name" : "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7",
"refsource" : "MISC",
"url" : "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=952709",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
},
{
"name" : "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/",
"refsource" : "CONFIRM",
"url" : "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/"
},
{
"name" : "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/",
"refsource" : "CONFIRM",
"url" : "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/"
},
{
"name" : "http://bugs.icu-project.org/trac/ticket/10107",
"refsource" : "CONFIRM",
"url" : "http://bugs.icu-project.org/trac/ticket/10107"
},
{
"name" : "http://site.icu-project.org/download/51#TOC-Known-Issues",
"refsource" : "CONFIRM",
"url" : "http://site.icu-project.org/download/51#TOC-Known-Issues"
},
{
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124",
"refsource" : "CONFIRM",
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124"
},
{
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
"refsource" : "CONFIRM",
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name" : "APPLE-SA-2013-04-16-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
"name": "SUSE-SU-2013:0835",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html"
},
{
"name": "GLSA-201406-32",
@ -123,55 +68,140 @@
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBUX02889",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
"name": "[distro-pkg-dev] 20130417 [SECURITY] IcedTea 1.11.10 for OpenJDK 6 Released!",
"refsource": "MLIST",
"url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022796.html"
},
{
"name" : "SSRT101252",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
},
{
"name" : "HPSBUX02922",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "SSRT101305",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "MDVSA-2013:145",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:145"
},
{
"name" : "MDVSA-2013:161",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:161"
},
{
"name" : "RHSA-2013:0752",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0752.html"
},
{
"name" : "RHSA-2013:0757",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
"name": "SUSE-SU-2013:0871",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html"
},
{
"name": "RHSA-2013:0758",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0758.html"
},
{
"name": "http://site.icu-project.org/download/51#TOC-Known-Issues",
"refsource": "CONFIRM",
"url": "http://site.icu-project.org/download/51#TOC-Known-Issues"
},
{
"name": "APPLE-SA-2013-04-16-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
},
{
"name": "MDVSA-2013:145",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:145"
},
{
"name": "TA13-107A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-107A"
},
{
"name": "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/",
"refsource": "CONFIRM",
"url": "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/"
},
{
"name": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7",
"refsource": "MISC",
"url": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7"
},
{
"name": "SSRT101252",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "oval:org.mitre.oval:def:19549",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19549"
},
{
"name": "SSRT101305",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "RHSA-2013:0757",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
},
{
"name": "HPSBUX02922",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124"
},
{
"name": "openSUSE-SU-2013:0777",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html"
},
{
"name": "MDVSA-2013:161",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:161"
},
{
"name": "openSUSE-SU-2013:0964",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html"
},
{
"name": "RHSA-2013:0752",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0752.html"
},
{
"name": "http://bugs.icu-project.org/trac/ticket/10107",
"refsource": "CONFIRM",
"url": "http://bugs.icu-project.org/trac/ticket/10107"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name": "oval:org.mitre.oval:def:16549",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16549"
},
{
"name": "USN-1806-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1806-1"
},
{
"name": "oval:org.mitre.oval:def:19341",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19341"
},
{
"name": "59179",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59179"
},
{
"name": "RHSA-2013:1456",
"refsource": "REDHAT",
@ -183,19 +213,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html"
},
{
"name" : "openSUSE-SU-2013:0777",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html"
"name": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
},
{
"name" : "SUSE-SU-2013:0835",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html"
},
{
"name" : "SUSE-SU-2013:0871",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html"
"name": "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/",
"refsource": "CONFIRM",
"url": "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/"
},
{
"name": "SUSE-SU-2013:0934",
@ -203,39 +228,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html"
},
{
"name" : "openSUSE-SU-2013:0964",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html"
"name": "HPSBUX02889",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
},
{
"name" : "USN-1806-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1806-1"
},
{
"name" : "TA13-107A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-107A"
},
{
"name" : "59179",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/59179"
},
{
"name" : "oval:org.mitre.oval:def:16549",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16549"
},
{
"name" : "oval:org.mitre.oval:def:19341",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19341"
},
{
"name" : "oval:org.mitre.oval:def:19549",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19549"
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}
]
}

View File

@ -52,31 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html"
},
{
"name": "20130926 XAMPP 1.8.1 Local Write Access Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0131.html"
},
{
"name": "97780",
"refsource": "OSVDB",
"url": "http://osvdb.org/97780"
},
{
"name": "28654",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/28654"
},
{
"name" : "http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html"
},
{
"name": "62665",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/62665"
},
{
"name" : "97780",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/97780"
},
{
"name": "xampp-cve20122586-lang-security-bypass(87499)",
"refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20131120 Mybb Ajaxfs Plugin Sql Injection vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://seclists.org/bugtraq/2013/Nov/102"
"name": "100030",
"refsource": "OSVDB",
"url": "http://osvdb.org/100030"
},
{
"name": "29797",
@ -72,15 +72,15 @@
"refsource": "MISC",
"url": "http://www.iedb.ir/exploits-889.html"
},
{
"name" : "100030",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/100030"
},
{
"name": "mybb-ajaxfs-sql-injection(89084)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89084"
},
{
"name": "20131120 Mybb Ajaxfs Plugin Sql Injection vulnerability",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2013/Nov/102"
}
]
}

View File

@ -70,24 +70,24 @@
"references": {
"reference_data": [
{
"name" : "44141",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/44141/"
"name": "1038946",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038946"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name": "44141",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44141/"
},
{
"name": "99770",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99770"
},
{
"name" : "1038946",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038946"
}
]
}

View File

@ -53,29 +53,19 @@
"references": {
"reference_data": [
{
"name" : "42943",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/42943/"
"name": "1039474",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039474"
},
{
"name" : "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.",
"refsource" : "MLIST",
"url" : "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html"
},
{
"name" : "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.",
"refsource" : "MLIST",
"url" : "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html"
},
{
"name" : "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html",
"refsource" : "MISC",
"url" : "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html"
},
{
"name" : "http://thekelleys.org.uk/dnsmasq/CHANGELOG",
"name": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq",
"refsource": "CONFIRM",
"url" : "http://thekelleys.org.uk/dnsmasq/CHANGELOG"
"url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq"
},
{
"name": "DSA-3989",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3989"
},
{
"name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033",
@ -88,69 +78,79 @@
"url": "https://access.redhat.com/security/vulnerabilities/3199382"
},
{
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
"refsource" : "CONFIRM",
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
"name": "101085",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101085"
},
{
"name" : "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq",
"refsource" : "CONFIRM",
"url" : "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq"
},
{
"name" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt",
"refsource" : "CONFIRM",
"url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt"
},
{
"name" : "DSA-3989",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3989"
},
{
"name" : "GLSA-201710-27",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201710-27"
},
{
"name" : "RHSA-2017:2836",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2836"
},
{
"name" : "RHSA-2017:2837",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2837"
},
{
"name" : "openSUSE-SU-2017:2633",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html"
"name": "42943",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42943/"
},
{
"name": "USN-3430-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3430-1"
},
{
"name" : "USN-3430-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3430-2"
},
{
"name": "VU#973527",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/973527"
},
{
"name" : "101085",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101085"
"name": "GLSA-201710-27",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201710-27"
},
{
"name" : "1039474",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039474"
"name": "USN-3430-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3430-2"
},
{
"name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.",
"refsource": "MLIST",
"url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html"
},
{
"name": "RHSA-2017:2836",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2836"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt"
},
{
"name": "RHSA-2017:2837",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2837"
},
{
"name": "http://thekelleys.org.uk/dnsmasq/CHANGELOG",
"refsource": "CONFIRM",
"url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG"
},
{
"name": "openSUSE-SU-2017:2633",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html"
},
{
"name": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html",
"refsource": "MISC",
"url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html"
},
{
"name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.",
"refsource": "MLIST",
"url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-14677",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/",
"refsource" : "MISC",
"url" : "https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/"
},
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=22200",
"refsource" : "MISC",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=22200"
},
{
"name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf",
"refsource" : "MISC",
"url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf"
"name": "101611",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101611"
},
{
"name": "GLSA-201801-01",
@ -73,9 +63,19 @@
"url": "https://security.gentoo.org/glsa/201801-01"
},
{
"name" : "101611",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101611"
"name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf",
"refsource": "MISC",
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=22200",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22200"
},
{
"name": "https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/",
"refsource": "MISC",
"url": "https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "lpardo@redhat.com",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-15138",
"STATE": "PUBLIC"
},

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515",
"refsource" : "CONFIRM",
"url" : "https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515"
},
{
"name": "https://github.com/radare/radare2/issues/8673",
"refsource": "CONFIRM",
"url": "https://github.com/radare/radare2/issues/8673"
},
{
"name": "https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515",
"refsource": "CONFIRM",
"url": "https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-15794",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
"refsource" : "CONFIRM",
"url" : "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
},
{
"name": "https://github.com/systemd/systemd/pull/5998",
"refsource": "CONFIRM",
@ -67,6 +62,11 @@
"refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/1621396"
},
{
"name": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
"refsource": "CONFIRM",
"url": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
},
{
"name": "98677",
"refsource": "BID",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2"
"name": "1040463",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040463"
},
{
"name": "103328",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/103328"
},
{
"name" : "1040463",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040463"
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss"
},
{
"name": "103551",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103551"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss"
}
]
}

View File

@ -60,15 +60,15 @@
},
"references": {
"reference_data": [
{
"name" : "20180905 Cisco Umbrella API Unauthorized Access Vulnerability",
"refsource" : "CISCO",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-api"
},
{
"name": "105283",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105283"
},
{
"name": "20180905 Cisco Umbrella API Unauthorized Access Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-api"
}
]
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-06-05T13:57:43.653459",
"DATE_REQUESTED": "2018-05-09T00:00:00",
"ID": "CVE-2018-1000195",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.120 and older, LTS 2.107.2 and older"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins project"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-441, CWE-918"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-11-27T13:54:33.456461",
"DATE_REQUESTED": "2018-10-15T09:16:59",
"ID": "CVE-2018-1000816",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "Grafana",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "confirmed for 5.2.4 and 5.3.0 "
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Grafana"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "Cross Site Scripting (XSS)"
"value": "n/a"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "44919",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/44919/"
},
{
"name": "https://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html"
},
{
"name" : "http://www.iwantacve.cn/index.php/archives/44/",
"refsource" : "MISC",
"url" : "http://www.iwantacve.cn/index.php/archives/44/"
"name": "44919",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44919/"
},
{
"name": "https://www.cnblogs.com/v1vvwv/p/9203899.html",
"refsource": "MISC",
"url": "https://www.cnblogs.com/v1vvwv/p/9203899.html"
},
{
"name": "http://www.iwantacve.cn/index.php/archives/44/",
"refsource": "MISC",
"url": "http://www.iwantacve.cn/index.php/archives/44/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com",
"ASSIGNER": "security@google.com",
"ID": "CVE-2018-16078",
"STATE": "PUBLIC"
},
@ -54,9 +54,14 @@
"references": {
"reference_data": [
{
"name" : "https://crbug.com/858820",
"refsource" : "MISC",
"url" : "https://crbug.com/858820"
"name": "105215",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105215"
},
{
"name": "RHSA-2018:2666",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2666"
},
{
"name": "https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html",
@ -69,14 +74,9 @@
"url": "https://security.gentoo.org/glsa/201811-10"
},
{
"name" : "RHSA-2018:2666",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2666"
},
{
"name" : "105215",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/105215"
"name": "https://crbug.com/858820",
"refsource": "MISC",
"url": "https://crbug.com/858820"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176",
"refsource" : "MISC",
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176"
},
{
"name": "https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more",
"refsource": "MISC",
"url": "https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176",
"refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "106375",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106375"
},
{
"name": "[debian-lts-announce] 20180921 [SECURITY] [DLA 1513-1] openafs security update",
"refsource": "MLIST",
@ -66,11 +71,6 @@
"name": "DSA-4302",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4302"
},
{
"name" : "106375",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/106375"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT208849",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208849"
},
{
"name": "1041027",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041027"
},
{
"name": "https://support.apple.com/HT208849",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208849"
}
]
}

View File

@ -1,17 +1,59 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-5417",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"description": {
"description_data": [
"CVE_data_meta": {
"ID": "CVE-2019-5417",
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "serve",
"version": {
"version_data": [
{
"version_value": "Fixed Version 7.1.3"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": {
"lang": "eng",
"value": "Directory Traversal (Local File Inclusion)"
}
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/358645",
"url": "https://hackerone.com/reports/358645"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A path traversal vulnerability in serve npm package version 7.0.1 allows the attackers to read content of arbitrary files on the remote server."
}
]
}