"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:09:23 +00:00
parent f0aba79321
commit c59fb07908
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3510 additions and 3510 deletions

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "kerberos4-arbitrary-proxy(5733)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5733"
},
{
"name": "20001208 Vulnerabilities in KTH Kerberos IV",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "20001210 KTH upgrade and FIX",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0105.html"
},
{
"name" : "kerberos4-arbitrary-proxy(5733)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5733"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20010122 def-2001-04: Netscape Enterprise Server Dot-DoS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/157641"
},
{
"name": "20010124 iPlanet FastTrack/Enterprise 4.1 DoS clarifications",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=98035833331446&w=2"
},
{
"name": "20010122 def-2001-04: Netscape Enterprise Server Dot-DoS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/157641"
},
{
"name": "2282",
"refsource": "BID",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "alchemy-http-view-log(7630)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7630"
},
{
"name": "20011130 Rapid 7 Advisory R7-0002: Alchemy Eye Remote Unauthenticated Log Viewing",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "3598",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3598"
},
{
"name" : "alchemy-http-view-log(7630)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7630"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0005.html"
},
{
"name" : "http://www.jetico.com/index.htm#/linux.htm",
"refsource" : "CONFIRM",
"url" : "http://www.jetico.com/index.htm#/linux.htm"
"name": "2820",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2820"
},
{
"name": "bestcrypt-bctool-gain-privileges(6648)",
@ -68,9 +68,9 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6648"
},
{
"name" : "2820",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2820"
"name": "http://www.jetico.com/index.htm#/linux.htm",
"refsource": "CONFIRM",
"url": "http://www.jetico.com/index.htm#/linux.htm"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060503 OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432863/100/0/threaded"
},
{
"name" : "20060503 Re: OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432867/100/0/threaded"
"name": "http://openvpn.net/man.html",
"refsource": "MISC",
"url": "http://openvpn.net/man.html"
},
{
"name": "20060503 Re: OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/archive/1/433000/100/0/threaded"
},
{
"name" : "http://openvpn.net/man.html",
"refsource" : "MISC",
"url" : "http://openvpn.net/man.html"
"name": "20060503 Re: OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432867/100/0/threaded"
},
{
"name": "20060503 OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432863/100/0/threaded"
},
{
"name": "25660",

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "weblogic-domain-name-disclosure(26468)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26468"
},
{
"name": "BEA06-128.00",
"refsource": "BEA",
"url": "http://dev2dev.bea.com/pub/advisory/190"
},
{
"name" : "ADV-2006-1828",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1828"
},
{
"name" : "1016097",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016097"
},
{
"name" : "1016099",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016099"
},
{
"name": "20130",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20130"
},
{
"name" : "weblogic-domain-name-disclosure(26468)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26468"
"name": "ADV-2006-1828",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1828"
},
{
"name": "1016099",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016099"
},
{
"name": "1016097",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016097"
}
]
}

View File

@ -52,16 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "phpsimplechoose-script-xss(26714)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26714"
},
{
"name": "971",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/971"
},
{
"name": "20060524 PHPSimple Choose v0.3",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435165/100/0/threaded"
},
{
"name" : "20060601 Re: PHPSimple Choose v0.3",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/435684/100/0/threaded"
},
{
"name": "ADV-2006-2019",
"refsource": "VUPEN",
@ -73,14 +78,9 @@
"url": "http://secunia.com/advisories/20306"
},
{
"name" : "971",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/971"
},
{
"name" : "phpsimplechoose-script-xss(26714)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26714"
"name": "20060601 Re: PHPSimple Choose v0.3",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435684/100/0/threaded"
}
]
}

View File

@ -52,26 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "1016181",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016181"
},
{
"name": "20060530 Jiwa Financials - Reporting allows execution of arbitrary reports as SQL user with full permissions.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435352/100/0/threaded"
},
{
"name" : "20060602 Re: Jiwa Financials - Reporting allows execution of arbitrary reports as SQL user with full permissions.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/435730/100/0/threaded"
},
{
"name": "20060529 Jiwa Financials - Reporting allows execution of arbitrary reports as SQL user with full permissions.",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046398.html"
},
{
"name" : "1016181",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016181"
},
{
"name": "20342",
"refsource": "SECUNIA",
@ -82,6 +77,11 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1000"
},
{
"name": "20060602 Re: Jiwa Financials - Reporting allows execution of arbitrary reports as SQL user with full permissions.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435730/100/0/threaded"
},
{
"name": "jiwa-financials-information-disclosure(26756)",
"refsource": "XF",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060528 Advisory: tinyBB <= 0.3 Multiple Remote Vulnerabilities.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/435281/100/0/threaded"
},
{
"name" : "http://www.nukedx.com/?getxpl=33",
"refsource" : "MISC",
"url" : "http://www.nukedx.com/?getxpl=33"
"name": "20356",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20356"
},
{
"name": "http://www.nukedx.com/?viewdoc=33",
@ -68,14 +63,9 @@
"url": "http://www.nukedx.com/?viewdoc=33"
},
{
"name" : "18147",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18147"
},
{
"name" : "ADV-2006-2035",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2035"
"name": "tinybb-multiple-sql-injection(26826)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26826"
},
{
"name": "1016172",
@ -83,9 +73,19 @@
"url": "http://securitytracker.com/id?1016172"
},
{
"name" : "20356",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20356"
"name": "18147",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18147"
},
{
"name": "20060528 Advisory: tinyBB <= 0.3 Multiple Remote Vulnerabilities.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435281/100/0/threaded"
},
{
"name": "ADV-2006-2035",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2035"
},
{
"name": "1011",
@ -93,9 +93,9 @@
"url": "http://securityreason.com/securityalert/1011"
},
{
"name" : "tinybb-multiple-sql-injection(26826)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26826"
"name": "http://www.nukedx.com/?getxpl=33",
"refsource": "MISC",
"url": "http://www.nukedx.com/?getxpl=33"
}
]
}

View File

@ -57,25 +57,25 @@
"refsource": "MISC",
"url": "http://www.securityfocus.com/data/vulnerabilities/exploits/Tekno.Portal-0601-sql.txt"
},
{
"name" : "18216",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18216"
},
{
"name" : "ADV-2006-2192",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2192"
},
{
"name": "20464",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20464"
},
{
"name": "18216",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18216"
},
{
"name": "teknoportal-bolum-sql-injection(26990)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26990"
},
{
"name": "ADV-2006-2192",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2192"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2442",
"STATE": "PUBLIC"
},
@ -58,24 +58,24 @@
"url": "http://www.adobe.com/support/security/bulletins/apsb11-24.html"
},
{
"name" : "SUSE-SA:2011:044",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00025.html"
"name": "oval:org.mitre.oval:def:14042",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14042"
},
{
"name": "SUSE-SU-2011:1239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00013.html"
},
{
"name": "SUSE-SA:2011:044",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00025.html"
},
{
"name": "openSUSE-SU-2011:1238",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00012.html"
},
{
"name" : "oval:org.mitre.oval:def:14042",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14042"
}
]
}

View File

@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "http://www.likewise.com/community/index.php/forums/viewannounce/1212_6/",
"refsource" : "CONFIRM",
"url" : "http://www.likewise.com/community/index.php/forums/viewannounce/1212_6/"
},
{
"name" : "https://bugs.launchpad.net/ubuntu/+source/likewise-open/+bug/802748",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/ubuntu/+source/likewise-open/+bug/802748"
},
{
"name" : "https://launchpadlibrarian.net/74204969/LWSA-2011-002.txt",
"refsource" : "CONFIRM",
"url" : "https://launchpadlibrarian.net/74204969/LWSA-2011-002.txt"
"name": "45276",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45276"
},
{
"name": "USN-1171-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1171-1"
},
{
"name" : "48816",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/48816"
},
{
"name" : "45276",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/45276"
},
{
"name": "45326",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45326"
},
{
"name": "http://www.likewise.com/community/index.php/forums/viewannounce/1212_6/",
"refsource": "CONFIRM",
"url": "http://www.likewise.com/community/index.php/forums/viewannounce/1212_6/"
},
{
"name": "likewise-lsassd-sql-injection(68765)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68765"
},
{
"name": "https://launchpadlibrarian.net/74204969/LWSA-2011-002.txt",
"refsource": "CONFIRM",
"url": "https://launchpadlibrarian.net/74204969/LWSA-2011-002.txt"
},
{
"name": "48816",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48816"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/likewise-open/+bug/802748",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/likewise-open/+bug/802748"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://www.opera.com/docs/changelogs/windows/1110/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1110/"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/1110/",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "http://www.opera.com/docs/changelogs/unix/1110/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/unix/1110/"
},
{
"name" : "http://www.opera.com/docs/changelogs/windows/1110/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/windows/1110/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-2813",
"STATE": "PUBLIC"
},
@ -58,25 +58,15 @@
"url": "http://support.apple.com/kb/HT4981"
},
{
"name" : "http://support.apple.com/kb/HT4999",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4999"
},
{
"name" : "http://support.apple.com/kb/HT5000",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5000"
"name": "APPLE-SA-2011-10-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"name": "APPLE-SA-2011-10-11-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html"
},
{
"name" : "APPLE-SA-2011-10-12-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"name": "APPLE-SA-2011-10-12-4",
"refsource": "APPLE",
@ -87,6 +77,16 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50066"
},
{
"name": "http://support.apple.com/kb/HT4999",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4999"
},
{
"name": "http://support.apple.com/kb/HT5000",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5000"
},
{
"name": "oval:org.mitre.oval:def:17444",
"refsource": "OVAL",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-3117",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://foobla.com/news/latest/obsuggest-1.8-security-release.html",
"refsource" : "CONFIRM",
"url" : "http://foobla.com/news/latest/obsuggest-1.8-security-release.html"
},
{
"name": "48944",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48944"
},
{
"name": "http://foobla.com/news/latest/obsuggest-1.8-security-release.html",
"refsource": "CONFIRM",
"url": "http://foobla.com/news/latest/obsuggest-1.8-security-release.html"
},
{
"name": "46844",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-0081",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-067"
},
{
"name" : "TA13-253A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-253A"
},
{
"name": "oval:org.mitre.oval:def:19036",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19036"
},
{
"name": "TA13-253A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0177",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20130118 [CVE-2013-0177] Cross-Site Scripting (XSS) Vulnerability in Apache OFBiz",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2013/Jan/148"
},
{
"name" : "http://packetstormsecurity.com/files/119673/Apache-OFBiz-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/119673/Apache-OFBiz-Cross-Site-Scripting.html"
"name": "89453",
"refsource": "OSVDB",
"url": "http://osvdb.org/89453"
},
{
"name": "http://ofbiz.apache.org/download.html#vulnerabilities",
@ -68,14 +63,9 @@
"url": "http://ofbiz.apache.org/download.html#vulnerabilities"
},
{
"name" : "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432395",
"refsource" : "CONFIRM",
"url" : "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432395"
},
{
"name" : "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432850",
"refsource" : "CONFIRM",
"url" : "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432850"
"name": "20130118 [CVE-2013-0177] Cross-Site Scripting (XSS) Vulnerability in Apache OFBiz",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Jan/148"
},
{
"name": "89452",
@ -83,9 +73,19 @@
"url": "http://osvdb.org/89452"
},
{
"name" : "89453",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/89453"
"name": "http://packetstormsecurity.com/files/119673/Apache-OFBiz-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/119673/Apache-OFBiz-Cross-Site-Scripting.html"
},
{
"name": "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432395",
"refsource": "CONFIRM",
"url": "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432395"
},
{
"name": "apache-ofbiz-xss(81398)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81398"
},
{
"name": "51812",
@ -93,9 +93,9 @@
"url": "http://secunia.com/advisories/51812"
},
{
"name" : "apache-ofbiz-xss(81398)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/81398"
"name": "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432850",
"refsource": "CONFIRM",
"url": "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432850"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-0544",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1159",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1256",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016"
},
{
"name" : "TA13-043B",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
},
{
"name": "oval:org.mitre.oval:def:16436",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16436"
},
{
"name": "TA13-043B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-1383",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@symantec.com",
"ID": "CVE-2013-4678",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-5173",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-5187",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-5195",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/kb/HT6537",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT6537"
},
{
"name": "APPLE-SA-2013-12-16-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0087.html"
},
{
"name": "https://support.apple.com/kb/HT6537",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6537"
},
{
"name": "APPLE-SA-2013-12-16-2",
"refsource": "APPLE",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2161",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0438",
"STATE": "PUBLIC"
},
@ -55,11 +55,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-02-01.html",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-02-01.html"
},
{
"name": "96047",
"refsource": "BID",
@ -69,6 +64,11 @@
"name": "1037798",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037798"
},
{
"name": "https://source.android.com/security/bulletin/2017-02-01.html",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-02-01.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0525",
"STATE": "PUBLIC"
},
@ -55,25 +55,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-03-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-03-01"
},
{
"name" : "https://www.codeaurora.org/use-after-free-vulnerability-during-ipa-routing-commit-logic-cve-2017-0525",
"refsource" : "CONFIRM",
"url" : "https://www.codeaurora.org/use-after-free-vulnerability-during-ipa-routing-commit-logic-cve-2017-0525"
},
{
"name": "96947",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96947"
},
{
"name": "https://source.android.com/security/bulletin/2017-03-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01"
},
{
"name": "1037968",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037968"
},
{
"name": "https://www.codeaurora.org/use-after-free-vulnerability-during-ipa-routing-commit-logic-cve-2017-0525",
"refsource": "CONFIRM",
"url": "https://www.codeaurora.org/use-after-free-vulnerability-during-ipa-routing-commit-logic-cve-2017-0525"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0531",
"STATE": "PUBLIC"
},
@ -55,25 +55,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-03-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-03-01"
},
{
"name": "https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=530f3a0fd837ed105eddaf99810bc13d97dc4302",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=530f3a0fd837ed105eddaf99810bc13d97dc4302"
},
{
"name" : "96743",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96743"
"name": "https://source.android.com/security/bulletin/2017-03-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01"
},
{
"name": "1037968",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037968"
},
{
"name": "96743",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96743"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0545",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0646",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.340007",
"ID": "CVE-2017-1000126",
"REQUESTER": "hanno@hboeck.de",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "exiv2",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "0.26"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : ""
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Buffer Overflow"
"value": "n/a"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "DSA-4000",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4000"
},
{
"name": "[debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1509215",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1509215"
},
{
"name": "https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e",
"refsource": "CONFIRM",
"url": "https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e"
},
{
"name" : "DSA-4000",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2017/dsa-4000"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1509215",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509215"
}
]
}

View File

@ -54,9 +54,9 @@
"references": {
"reference_data": [
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
"name": "1039152",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039152"
},
{
"name": "100367",
@ -64,9 +64,9 @@
"url": "http://www.securityfocus.com/bid/100367"
},
{
"name" : "1039152",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039152"
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
}
]
}

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20171104 [SECURITY] [DLA 1160-1] wordpress security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2017/11/msg00003.html"
},
{
"name" : "https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html",
"refsource" : "MISC",
"url" : "https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html"
},
{
"name" : "https://codex.wordpress.org/Version_4.8.3",
"refsource" : "MISC",
"url" : "https://codex.wordpress.org/Version_4.8.3"
},
{
"name": "https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d",
"refsource": "MISC",
"url": "https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d"
},
{
"name" : "https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/",
"refsource" : "MISC",
"url" : "https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/"
},
{
"name" : "https://wpvulndb.com/vulnerabilities/8941",
"refsource" : "MISC",
"url" : "https://wpvulndb.com/vulnerabilities/8941"
},
{
"name": "DSA-4090",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4090"
},
{
"name": "[debian-lts-announce] 20171104 [SECURITY] [DLA 1160-1] wordpress security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00003.html"
},
{
"name": "101638",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101638"
},
{
"name": "https://wpvulndb.com/vulnerabilities/8941",
"refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/8941"
},
{
"name": "https://codex.wordpress.org/Version_4.8.3",
"refsource": "MISC",
"url": "https://codex.wordpress.org/Version_4.8.3"
},
{
"name": "https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html",
"refsource": "MISC",
"url": "https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html"
},
{
"name": "https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/",
"refsource": "MISC",
"url": "https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4173",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4357",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "42140",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/42140/"
"name": "1038526",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038526"
},
{
"name": "https://www.vmware.com/security/advisories/VMSA-2017-0009.html",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/98560"
},
{
"name" : "1038526",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038526"
"name": "42140",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42140/"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "45783",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45783/"
},
{
"name": "20181102 Royal TS/X - Information Disclosure",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Nov/4"
},
{
"name" : "20181105 Re: Royal TS/X - Information Disclosure",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/Nov/25"
"name": "45783",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45783/"
},
{
"name": "http://packetstormsecurity.com/files/150136/Royal-TS-X-Information-Disclosure.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/150136/Royal-TS-X-Information-Disclosure.html"
},
{
"name": "20181105 Re: Royal TS/X - Information Disclosure",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Nov/25"
}
]
}