"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:38:45 +00:00
parent f97b5332c2
commit cdb738f09c
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
55 changed files with 3796 additions and 3796 deletions

View File

@ -52,15 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://www.opera.com/linux/changelogs/750/index.dml",
"refsource": "CONFIRM",
"url": "http://www.opera.com/linux/changelogs/750/index.dml"
},
{
"name": "opera-telnet-file-overwrite(16139)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16139"
},
{ {
"name": "20040512 Opera Telnet URI Handler File Creation/Truncation Vulnerability", "name": "20040512 Opera Telnet URI Handler File Creation/Truncation Vulnerability",
"refsource": "IDEFENSE", "refsource": "IDEFENSE",
"url": "http://www.idefense.com/application/poi/display?id=104&type=vulnerabilities" "url": "http://www.idefense.com/application/poi/display?id=104&type=vulnerabilities"
}, },
{ {
"name" : "http://www.opera.com/linux/changelogs/750/index.dml", "name": "1010142",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.opera.com/linux/changelogs/750/index.dml" "url": "http://securitytracker.com/id?1010142"
}, },
{ {
"name": "GLSA-200405-19", "name": "GLSA-200405-19",
@ -71,16 +81,6 @@
"name": "10341", "name": "10341",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/10341" "url": "http://www.securityfocus.com/bid/10341"
},
{
"name" : "1010142",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1010142"
},
{
"name" : "opera-telnet-file-overwrite(16139)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/16139"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "GLSA-200406-18",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200406-18.xml"
},
{ {
"name": "http://bugs.gentoo.org/show_bug.cgi?id=54890", "name": "http://bugs.gentoo.org/show_bug.cgi?id=54890",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=54890" "url": "http://bugs.gentoo.org/show_bug.cgi?id=54890"
}, },
{
"name" : "10603",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/10603"
},
{ {
"name": "gzip-gzexe-tmpfile(16506)", "name": "gzip-gzexe-tmpfile(16506)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16506" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16506"
},
{
"name": "GLSA-200406-18",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200406-18.xml"
},
{
"name": "10603",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10603"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20040820 Multiple vulnerabilities in MyDMS", "name": "mydms-folderld-sql-injection(17054)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=109314495007280&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17054"
}, },
{ {
"name": "10996", "name": "10996",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/12340" "url": "http://secunia.com/advisories/12340"
}, },
{ {
"name" : "mydms-folderld-sql-injection(17054)", "name": "20040820 Multiple vulnerabilities in MyDMS",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17054" "url": "http://marc.info/?l=bugtraq&m=109314495007280&w=2"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://holisticinfosec.org/content/view/62/45/",
"refsource" : "MISC",
"url" : "http://holisticinfosec.org/content/view/62/45/"
},
{ {
"name": "bitrix-redirect-security-bypass(42157)", "name": "bitrix-redirect-security-bypass(42157)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42157" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42157"
},
{
"name": "http://holisticinfosec.org/content/view/62/45/",
"refsource": "MISC",
"url": "http://holisticinfosec.org/content/view/62/45/"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-3011", "ID": "CVE-2008-3011",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-20080701-3/", "name": "sendacard-unspecified-xss(43510)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-20080701-3/" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43510"
},
{
"name" : "30028",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30028"
}, },
{ {
"name": "46624", "name": "46624",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/46624" "url": "http://osvdb.org/46624"
}, },
{
"name": "30028",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30028"
},
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-20080701-3/",
"refsource": "CONFIRM",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-20080701-3/"
},
{ {
"name": "30906", "name": "30906",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30906" "url": "http://secunia.com/advisories/30906"
},
{
"name" : "sendacard-unspecified-xss(43510)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43510"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://kuza55.blogspot.com/2008/07/some-random-safari-notes.html",
"refsource" : "MISC",
"url" : "http://kuza55.blogspot.com/2008/07/some-random-safari-notes.html"
},
{ {
"name": "30193", "name": "30193",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "safari-referer-header-info-disclosure(43837)", "name": "safari-referer-header-info-disclosure(43837)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43837" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43837"
},
{
"name": "http://kuza55.blogspot.com/2008/07/some-random-safari-notes.html",
"refsource": "MISC",
"url": "http://kuza55.blogspot.com/2008/07/some-random-safari-notes.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-4065", "ID": "CVE-2008-4065",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,74 +58,14 @@
"url": "http://www.mozilla.org/security/announce/2008/mfsa2008-43.html" "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-43.html"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=430740", "name": "32025",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=430740" "url": "http://secunia.com/advisories/32025"
}, },
{ {
"name" : "http://download.novell.com/Download?buildid=WZXONb-tqBw~", "name": "32011",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://download.novell.com/Download?buildid=WZXONb-tqBw~" "url": "http://secunia.com/advisories/32011"
},
{
"name" : "DSA-1669",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1669"
},
{
"name" : "DSA-1697",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1697"
},
{
"name" : "DSA-1696",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1696"
},
{
"name" : "DSA-1649",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1649"
},
{
"name" : "FEDORA-2008-8401",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html"
},
{
"name" : "FEDORA-2008-8429",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html"
},
{
"name" : "FEDORA-2008-8425",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html"
},
{
"name" : "MDVSA-2008:205",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:205"
},
{
"name" : "MDVSA-2008:206",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:206"
},
{
"name" : "RHSA-2008:0908",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0908.html"
},
{
"name" : "RHSA-2008:0879",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0879.html"
},
{
"name" : "RHSA-2008:0882",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0882.html"
}, },
{ {
"name": "SSA:2008-269-01", "name": "SSA:2008-269-01",
@ -133,35 +73,55 @@
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232" "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232"
}, },
{ {
"name" : "SSA:2008-269-02", "name": "DSA-1697",
"refsource" : "SLACKWARE", "refsource": "DEBIAN",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422" "url": "http://www.debian.org/security/2009/dsa-1697"
}, },
{ {
"name" : "SSA:2008-270-01", "name": "1020920",
"refsource" : "SLACKWARE", "refsource": "SECTRACK",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123" "url": "http://www.securitytracker.com/id?1020920"
}, },
{ {
"name" : "256408", "name": "32096",
"refsource" : "SUNALERT", "refsource": "SECUNIA",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1" "url": "http://secunia.com/advisories/32096"
}, },
{ {
"name" : "SUSE-SA:2008:050", "name": "FEDORA-2008-8401",
"refsource" : "SUSE", "refsource": "FEDORA",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html"
},
{
"name" : "USN-647-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-647-1"
}, },
{ {
"name": "USN-645-1", "name": "USN-645-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-645-1" "url": "http://www.ubuntu.com/usn/usn-645-1"
}, },
{
"name": "oval:org.mitre.oval:def:11383",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11383"
},
{
"name": "MDVSA-2008:206",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:206"
},
{
"name": "32144",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32144"
},
{
"name": "32010",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32010"
},
{
"name": "ADV-2009-0977",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0977"
},
{ {
"name": "USN-645-2", "name": "USN-645-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -173,14 +133,19 @@
"url": "http://www.securityfocus.com/bid/31346" "url": "http://www.securityfocus.com/bid/31346"
}, },
{ {
"name" : "oval:org.mitre.oval:def:11383", "name": "31985",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11383" "url": "http://secunia.com/advisories/31985"
}, },
{ {
"name" : "34501", "name": "SUSE-SA:2008:050",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html"
},
{
"name": "31984",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/34501" "url": "http://secunia.com/advisories/31984"
}, },
{ {
"name": "32185", "name": "32185",
@ -193,14 +158,14 @@
"url": "http://secunia.com/advisories/32196" "url": "http://secunia.com/advisories/32196"
}, },
{ {
"name" : "ADV-2008-2661", "name": "FEDORA-2008-8425",
"refsource" : "VUPEN", "refsource": "FEDORA",
"url" : "http://www.vupen.com/english/advisories/2008/2661" "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html"
}, },
{ {
"name" : "1020920", "name": "DSA-1669",
"refsource" : "SECTRACK", "refsource": "DEBIAN",
"url" : "http://www.securitytracker.com/id?1020920" "url": "http://www.debian.org/security/2008/dsa-1669"
}, },
{ {
"name": "32042", "name": "32042",
@ -208,34 +173,19 @@
"url": "http://secunia.com/advisories/32042" "url": "http://secunia.com/advisories/32042"
}, },
{ {
"name" : "32025", "name": "33433",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/32025" "url": "http://secunia.com/advisories/33433"
}, },
{ {
"name" : "32092", "name": "ADV-2008-2661",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/32092" "url": "http://www.vupen.com/english/advisories/2008/2661"
}, },
{ {
"name" : "32144", "name": "SSA:2008-269-02",
"refsource" : "SECUNIA", "refsource": "SLACKWARE",
"url" : "http://secunia.com/advisories/32144" "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422"
},
{
"name" : "32044",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32044"
},
{
"name" : "32082",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32082"
},
{
"name" : "32089",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32089"
}, },
{ {
"name": "32095", "name": "32095",
@ -243,69 +193,119 @@
"url": "http://secunia.com/advisories/32095" "url": "http://secunia.com/advisories/32095"
}, },
{ {
"name" : "32096", "name": "32089",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/32096" "url": "http://secunia.com/advisories/32089"
}, },
{ {
"name" : "32845", "name": "256408",
"refsource" : "SECUNIA", "refsource": "SUNALERT",
"url" : "http://secunia.com/advisories/32845" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"
}, },
{ {
"name" : "31984", "name": "32092",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/31984" "url": "http://secunia.com/advisories/32092"
}, },
{ {
"name" : "31985", "name": "RHSA-2008:0879",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/31985" "url": "http://www.redhat.com/support/errata/RHSA-2008-0879.html"
},
{
"name": "MDVSA-2008:205",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:205"
},
{
"name": "DSA-1696",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1696"
},
{
"name": "http://download.novell.com/Download?buildid=WZXONb-tqBw~",
"refsource": "CONFIRM",
"url": "http://download.novell.com/Download?buildid=WZXONb-tqBw~"
},
{
"name": "FEDORA-2008-8429",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html"
}, },
{ {
"name": "31987", "name": "31987",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31987" "url": "http://secunia.com/advisories/31987"
}, },
{
"name": "firefox-bom-security-bypass(45356)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45356"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=430740",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=430740"
},
{
"name": "USN-647-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-647-1"
},
{ {
"name": "32007", "name": "32007",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32007" "url": "http://secunia.com/advisories/32007"
}, },
{ {
"name" : "32010", "name": "RHSA-2008:0882",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/32010" "url": "http://www.redhat.com/support/errata/RHSA-2008-0882.html"
}, },
{ {
"name" : "32011", "name": "32845",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/32011" "url": "http://secunia.com/advisories/32845"
},
{
"name": "DSA-1649",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1649"
}, },
{ {
"name": "32012", "name": "32012",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32012" "url": "http://secunia.com/advisories/32012"
}, },
{
"name" : "33433",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33433"
},
{ {
"name": "33434", "name": "33434",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33434" "url": "http://secunia.com/advisories/33434"
}, },
{ {
"name" : "ADV-2009-0977", "name": "SSA:2008-270-01",
"refsource" : "VUPEN", "refsource": "SLACKWARE",
"url" : "http://www.vupen.com/english/advisories/2009/0977" "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123"
}, },
{ {
"name" : "firefox-bom-security-bypass(45356)", "name": "32044",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45356" "url": "http://secunia.com/advisories/32044"
},
{
"name": "RHSA-2008:0908",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0908.html"
},
{
"name": "34501",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34501"
},
{
"name": "32082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32082"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080916 [ECHO_ADV_101$2008] Attachmax Dolphin <= 2.1.0 Multiple Vulnerabilities", "name": "http://e-rdc.org/v1/news.php?readmore=108",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://www.securityfocus.com/archive/1/496427/100/0/threaded" "url": "http://e-rdc.org/v1/news.php?readmore=108"
},
{
"name": "31794",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31794"
}, },
{ {
"name": "6468", "name": "6468",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6468" "url": "https://www.exploit-db.com/exploits/6468"
}, },
{
"name" : "http://e-rdc.org/v1/news.php?readmore=108",
"refsource" : "MISC",
"url" : "http://e-rdc.org/v1/news.php?readmore=108"
},
{
"name" : "31207",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31207"
},
{ {
"name": "48271", "name": "48271",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/48271" "url": "http://osvdb.org/48271"
}, },
{ {
"name" : "31794", "name": "20080916 [ECHO_ADV_101$2008] Attachmax Dolphin <= 2.1.0 Multiple Vulnerabilities",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/31794" "url": "http://www.securityfocus.com/archive/1/496427/100/0/threaded"
},
{
"name": "31207",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31207"
}, },
{ {
"name": "4307", "name": "4307",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-4307", "ID": "CVE-2008-4307",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "name": "34962",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/507985/100/0/threaded" "url": "http://secunia.com/advisories/34962"
}, },
{ {
"name": "[oss-security] 20090113 CVE-2008-4307 kernel: local denial of service in locks_remove_flock", "name": "[oss-security] 20090113 CVE-2008-4307 kernel: local denial of service in locks_remove_flock",
@ -63,39 +63,9 @@
"url": "http://openwall.com/lists/oss-security/2009/01/13/1" "url": "http://openwall.com/lists/oss-security/2009/01/13/1"
}, },
{ {
"name" : "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=c4d7c402b788b73dc24f1e54a57f89d3dc5eb7bc", "name": "37471",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=c4d7c402b788b73dc24f1e54a57f89d3dc5eb7bc" "url": "http://secunia.com/advisories/37471"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=456282",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name" : "DSA-1787",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1787"
},
{
"name" : "DSA-1794",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1794"
},
{
"name" : "RHSA-2009:0451",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0451.html"
}, },
{ {
"name": "RHSA-2009:0459", "name": "RHSA-2009:0459",
@ -103,9 +73,24 @@
"url": "http://rhn.redhat.com/errata/RHSA-2009-0459.html" "url": "http://rhn.redhat.com/errata/RHSA-2009-0459.html"
}, },
{ {
"name" : "RHSA-2009:0473", "name": "oval:org.mitre.oval:def:7728",
"refsource" : "REDHAT", "refsource": "OVAL",
"url" : "http://rhn.redhat.com/errata/RHSA-2009-0473.html" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7728"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "DSA-1794",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1794"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=c4d7c402b788b73dc24f1e54a57f89d3dc5eb7bc",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=c4d7c402b788b73dc24f1e54a57f89d3dc5eb7bc"
}, },
{ {
"name": "USN-751-1", "name": "USN-751-1",
@ -113,34 +98,9 @@
"url": "http://www.ubuntu.com/usn/usn-751-1" "url": "http://www.ubuntu.com/usn/usn-751-1"
}, },
{ {
"name" : "oval:org.mitre.oval:def:7728", "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7728" "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26"
},
{
"name" : "oval:org.mitre.oval:def:9233",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9233"
},
{
"name" : "34917",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34917"
},
{
"name" : "34962",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34962"
},
{
"name" : "34981",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34981"
},
{
"name" : "35011",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35011"
}, },
{ {
"name": "35015", "name": "35015",
@ -148,9 +108,49 @@
"url": "http://secunia.com/advisories/35015" "url": "http://secunia.com/advisories/35015"
}, },
{ {
"name" : "37471", "name": "35011",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/37471" "url": "http://secunia.com/advisories/35011"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=456282",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
},
{
"name": "oval:org.mitre.oval:def:9233",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9233"
},
{
"name": "34981",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34981"
},
{
"name": "34917",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34917"
},
{
"name": "DSA-1787",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1787"
},
{
"name": "RHSA-2009:0473",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2009-0473.html"
},
{
"name": "RHSA-2009:0451",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0451.html"
}, },
{ {
"name": "ADV-2009-3316", "name": "ADV-2009-3316",

View File

@ -68,9 +68,9 @@
"url": "http://www.securitytracker.com/id?1020954" "url": "http://www.securitytracker.com/id?1020954"
}, },
{ {
"name" : "ADV-2008-2702", "name": "citrix-server-unspecified-priv-escalation(45507)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2008/2702" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45507"
}, },
{ {
"name": "32017", "name": "32017",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/32017" "url": "http://secunia.com/advisories/32017"
}, },
{ {
"name" : "citrix-server-unspecified-priv-escalation(45507)", "name": "ADV-2008-2702",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45507" "url": "http://www.vupen.com/english/advisories/2008/2702"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "6625",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6625"
},
{ {
"name": "27991", "name": "27991",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27991" "url": "http://secunia.com/advisories/27991"
}, },
{ {
"name" : "4502", "name": "6625",
"refsource" : "SREASON", "refsource": "EXPLOIT-DB",
"url" : "http://securityreason.com/securityalert/4502" "url": "https://www.exploit-db.com/exploits/6625"
}, },
{ {
"name": "postcomments-postcomments-security-bypass(45503)", "name": "postcomments-postcomments-security-bypass(45503)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45503" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45503"
},
{
"name": "4502",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4502"
} }
] ]
} }

View File

@ -57,16 +57,16 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6870" "url": "https://www.exploit-db.com/exploits/6870"
}, },
{
"name" : "31974",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31974"
},
{ {
"name": "32425", "name": "32425",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32425" "url": "http://secunia.com/advisories/32425"
}, },
{
"name": "31974",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31974"
},
{ {
"name": "4561", "name": "4561",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -57,6 +57,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.digitrustgroup.com/advisories/web-application-security-camera-life2.html" "url": "http://www.digitrustgroup.com/advisories/web-application-security-camera-life2.html"
}, },
{
"name": "cameralife-multiple-scripts-xss(46285)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46285"
},
{ {
"name": "32019", "name": "32019",
"refsource": "BID", "refsource": "BID",
@ -66,11 +71,6 @@
"name": "31234", "name": "31234",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31234" "url": "http://secunia.com/advisories/31234"
},
{
"name" : "cameralife-multiple-scripts-xss(46285)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46285"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[announce] 20080613 Turba H3 (2.2.1) (final)",
"refsource" : "MLIST",
"url" : "http://lists.horde.org/archives/announce/2008/000414.html"
},
{ {
"name": "http://cvs.horde.org/diff.php/turba/docs/CHANGES?r1=1.181.2.165&r2=1.181.2.170&ty=h", "name": "http://cvs.horde.org/diff.php/turba/docs/CHANGES?r1=1.181.2.165&r2=1.181.2.170&ty=h",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://cvs.horde.org/diff.php/turba/docs/CHANGES?r1=1.181.2.165&r2=1.181.2.170&ty=h" "url": "http://cvs.horde.org/diff.php/turba/docs/CHANGES?r1=1.181.2.165&r2=1.181.2.170&ty=h"
}, },
{
"name" : "29743",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29743"
},
{ {
"name": "30704", "name": "30704",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30704" "url": "http://secunia.com/advisories/30704"
}, },
{
"name": "[announce] 20080613 Turba H3 (2.2.1) (final)",
"refsource": "MLIST",
"url": "http://lists.horde.org/archives/announce/2008/000414.html"
},
{ {
"name": "turba-contactview-xss(43098)", "name": "turba-contactview-xss(43098)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43098" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43098"
},
{
"name": "29743",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29743"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "6819", "name": "49266",
"refsource" : "EXPLOIT-DB", "refsource": "OSVDB",
"url" : "https://www.exploit-db.com/exploits/6819" "url": "http://osvdb.org/49266"
},
{
"name": "photogallery-id-username-sql-injection(46075)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46075"
}, },
{ {
"name": "31893", "name": "31893",
@ -63,19 +68,14 @@
"url": "http://www.securityfocus.com/bid/31893" "url": "http://www.securityfocus.com/bid/31893"
}, },
{ {
"name" : "49266", "name": "6819",
"refsource" : "OSVDB", "refsource": "EXPLOIT-DB",
"url" : "http://osvdb.org/49266" "url": "https://www.exploit-db.com/exploits/6819"
}, },
{ {
"name": "32358", "name": "32358",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32358" "url": "http://secunia.com/advisories/32358"
},
{
"name" : "photogallery-id-username-sql-injection(46075)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46075"
} }
] ]
} }

View File

@ -62,15 +62,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6899" "url": "https://www.exploit-db.com/exploits/6899"
}, },
{
"name" : "http://www.louhinetworks.fi/advisory/alink_081028.txt",
"refsource" : "MISC",
"url" : "http://www.louhinetworks.fi/advisory/alink_081028.txt"
},
{ {
"name": "wl54ap3-wl54ap2-default-password(51199)", "name": "wl54ap3-wl54ap2-default-password(51199)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51199" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51199"
},
{
"name": "http://www.louhinetworks.fi/advisory/alink_081028.txt",
"refsource": "MISC",
"url": "http://www.louhinetworks.fi/advisory/alink_081028.txt"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080303 Heap overflow in Borland VisiBroker Smart Agent 08.00.00.C1.03", "name": "43057",
"refsource" : "FULLDISC", "refsource": "OSVDB",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2008-03/0018.html" "url": "http://osvdb.org/43057"
},
{
"name": "visibroker-osagent-bo(40978)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40978"
}, },
{ {
"name": "http://aluigi.altervista.org/adv/visibroken-adv.txt", "name": "http://aluigi.altervista.org/adv/visibroken-adv.txt",
@ -63,14 +68,9 @@
"url": "http://aluigi.altervista.org/adv/visibroken-adv.txt" "url": "http://aluigi.altervista.org/adv/visibroken-adv.txt"
}, },
{ {
"name" : "28084", "name": "20080303 Heap overflow in Borland VisiBroker Smart Agent 08.00.00.C1.03",
"refsource" : "BID", "refsource": "FULLDISC",
"url" : "http://www.securityfocus.com/bid/28084" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-03/0018.html"
},
{
"name" : "43057",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/43057"
}, },
{ {
"name": "29213", "name": "29213",
@ -83,9 +83,9 @@
"url": "http://www.vupen.com/english/advisories/2008/0748/references" "url": "http://www.vupen.com/english/advisories/2008/0748/references"
}, },
{ {
"name" : "visibroker-osagent-bo(40978)", "name": "28084",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/40978" "url": "http://www.securityfocus.com/bid/28084"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://download.redgalaxy.net/?nav=home",
"refsource" : "CONFIRM",
"url" : "http://download.redgalaxy.net/?nav=home"
},
{ {
"name": "28219", "name": "28219",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "downloadcenter-multiple-xss(41198)", "name": "downloadcenter-multiple-xss(41198)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41198" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41198"
},
{
"name": "http://download.redgalaxy.net/?nav=home",
"refsource": "CONFIRM",
"url": "http://download.redgalaxy.net/?nav=home"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2000", "ID": "CVE-2013-2000",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20130523 Fwd: [ANNOUNCE] X.Org Security Advisory: Protocol handling issues in X Window System client libraries",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/05/23/3"
},
{
"name" : "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23",
"refsource" : "CONFIRM",
"url" : "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"
},
{ {
"name": "DSA-2690", "name": "DSA-2690",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2690" "url": "http://www.debian.org/security/2013/dsa-2690"
}, },
{
"name": "USN-1869-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1869-1"
},
{
"name": "[oss-security] 20130523 Fwd: [ANNOUNCE] X.Org Security Advisory: Protocol handling issues in X Window System client libraries",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/05/23/3"
},
{ {
"name": "FEDORA-2013-9085", "name": "FEDORA-2013-9085",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html"
}, },
{ {
"name" : "USN-1869-1", "name": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-1869-1" "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2089", "ID": "CVE-2013-2089",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2199", "ID": "CVE-2013-2199",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://codex.wordpress.org/Version_3.5.2",
"refsource" : "CONFIRM",
"url" : "http://codex.wordpress.org/Version_3.5.2"
},
{ {
"name": "http://wordpress.org/news/2013/06/wordpress-3-5-2/", "name": "http://wordpress.org/news/2013/06/wordpress-3-5-2/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://wordpress.org/news/2013/06/wordpress-3-5-2/" "url": "http://wordpress.org/news/2013/06/wordpress-3-5-2/"
}, },
{
"name": "DSA-2718",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2718"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=976784", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=976784",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=976784" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=976784"
}, },
{ {
"name" : "DSA-2718", "name": "http://codex.wordpress.org/Version_3.5.2",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2013/dsa-2718" "url": "http://codex.wordpress.org/Version_3.5.2"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-2518", "ID": "CVE-2013-2518",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-2737", "ID": "CVE-2013-2737",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,24 +58,24 @@
"url": "http://www.adobe.com/support/security/bulletins/apsb13-15.html" "url": "http://www.adobe.com/support/security/bulletins/apsb13-15.html"
}, },
{ {
"name" : "GLSA-201308-03", "name": "SUSE-SU-2013:0809",
"refsource" : "GENTOO", "refsource": "SUSE",
"url" : "http://security.gentoo.org/glsa/glsa-201308-03.xml" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html"
}, },
{ {
"name": "RHSA-2013:0826", "name": "RHSA-2013:0826",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0826.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-0826.html"
}, },
{
"name" : "SUSE-SU-2013:0809",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html"
},
{ {
"name": "oval:org.mitre.oval:def:16864", "name": "oval:org.mitre.oval:def:16864",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16864" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16864"
},
{
"name": "GLSA-201308-03",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201308-03.xml"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2013-2881", "ID": "CVE-2013-2881",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update_30.html", "name": "oval:org.mitre.oval:def:17348",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update_30.html" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17348"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=257748",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=257748"
},
{
"name" : "https://src.chromium.org/viewvc/blink?revision=153929&view=revision",
"refsource" : "CONFIRM",
"url" : "https://src.chromium.org/viewvc/blink?revision=153929&view=revision"
}, },
{ {
"name": "DSA-2732", "name": "DSA-2732",
@ -73,9 +63,19 @@
"url": "http://www.debian.org/security/2013/dsa-2732" "url": "http://www.debian.org/security/2013/dsa-2732"
}, },
{ {
"name" : "oval:org.mitre.oval:def:17348", "name": "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update_30.html",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17348" "url": "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update_30.html"
},
{
"name": "https://src.chromium.org/viewvc/blink?revision=153929&view=revision",
"refsource": "CONFIRM",
"url": "https://src.chromium.org/viewvc/blink?revision=153929&view=revision"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=257748",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=257748"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-11545", "ID": "CVE-2017-11545",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2017-008.html" "url": "http://downloads.asterisk.org/pub/security/AST-2017-008.html"
}, },
{
"name" : "https://issues.asterisk.org/jira/browse/ASTERISK-27274",
"refsource" : "CONFIRM",
"url" : "https://issues.asterisk.org/jira/browse/ASTERISK-27274"
},
{ {
"name": "DSA-3990", "name": "DSA-3990",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3990" "url": "http://www.debian.org/security/2017/dsa-3990"
},
{
"name": "https://issues.asterisk.org/jira/browse/ASTERISK-27274",
"refsource": "CONFIRM",
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-27274"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1040929",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040929"
},
{ {
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-cucm-cup-xss", "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-cucm-cup-xss",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-cucm-cup-xss" "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-cucm-cup-xss"
}, },
{
"name" : "104200",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104200"
},
{ {
"name": "1040928", "name": "1040928",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040928" "url": "http://www.securitytracker.com/id/1040928"
}, },
{ {
"name" : "1040929", "name": "104200",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id/1040929" "url": "http://www.securityfocus.com/bid/104200"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html" "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html"
}, },
{
"name" : "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-02",
"refsource" : "CONFIRM",
"url" : "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-02"
},
{ {
"name": "DSA-4296", "name": "DSA-4296",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4296" "url": "https://www.debian.org/security/2018/dsa-4296"
},
{
"name": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-02",
"refsource": "CONFIRM",
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-02"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2/8/2018 5:47:33", "DATE_ASSIGNED": "2/8/2018 5:47:33",
"ID": "CVE-2018-1000069", "ID": "CVE-2018-1000069",
"REQUESTER": "wojciech.regula@securing.pl", "REQUESTER": "wojciech.regula@securing.pl",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "FreePlane", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "1.5.9 and earlier" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "FreePlane" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "XML External Entity (XXE)" "value": "n/a"
} }
] ]
} }
@ -60,9 +60,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00019.html" "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00019.html"
}, },
{ {
"name" : "https://www.freeplane.org/wiki/index.php/XML_External_Entity_vulnerability_in_map_parser", "name": "DSA-4175",
"refsource" : "MISC", "refsource": "DEBIAN",
"url" : "https://www.freeplane.org/wiki/index.php/XML_External_Entity_vulnerability_in_map_parser" "url": "https://www.debian.org/security/2018/dsa-4175"
}, },
{ {
"name": "https://www.youtube.com/watch?v=7IXtiTNilAI", "name": "https://www.youtube.com/watch?v=7IXtiTNilAI",
@ -70,9 +70,9 @@
"url": "https://www.youtube.com/watch?v=7IXtiTNilAI" "url": "https://www.youtube.com/watch?v=7IXtiTNilAI"
}, },
{ {
"name" : "DSA-4175", "name": "https://www.freeplane.org/wiki/index.php/XML_External_Entity_vulnerability_in_map_parser",
"refsource" : "DEBIAN", "refsource": "MISC",
"url" : "https://www.debian.org/security/2018/dsa-4175" "url": "https://www.freeplane.org/wiki/index.php/XML_External_Entity_vulnerability_in_map_parser"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-02-26", "DATE_ASSIGNED": "2018-02-26",
"ID": "CVE-2018-1000110", "ID": "CVE-2018-1000110",
"REQUESTER": "ml@beckweb.net", "REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Jenkins Git Plugin", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "3.7.0 and older" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Jenkins project" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-912, CWE-285" "value": "n/a"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-16101", "ID": "CVE-2018-16101",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md",
"refsource": "CONFIRM",
"url": "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md"
},
{ {
"name": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/", "name": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/", "name": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/" "url": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/"
},
{
"name" : "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md",
"refsource" : "CONFIRM",
"url" : "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md"
} }
] ]
} }

View File

@ -70,15 +70,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-025-02" "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-025-02"
}, },
{
"name" : "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-824231.pdf",
"refsource" : "CONFIRM",
"url" : "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-824231.pdf"
},
{ {
"name": "102850", "name": "102850",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102850" "url": "http://www.securityfocus.com/bid/102850"
},
{
"name": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-824231.pdf",
"refsource": "CONFIRM",
"url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-824231.pdf"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{ {
"name": "102996", "name": "102996",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102996" "url": "http://www.securityfocus.com/bid/102996"
}, },
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{ {
"name": "1040364", "name": "1040364",
"refsource": "SECTRACK", "refsource": "SECTRACK",