"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:48:10 +00:00
parent 2a2d0f0992
commit d3468c076a
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3685 additions and 3667 deletions

View File

@ -52,31 +52,61 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "SuSE-SA:2004:006",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2004_06_xf86.html"
},
{
"name": "oval:org.mitre.oval:def:11111",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11111"
},
{
"name": "RHSA-2004:060",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-060.html"
},
{ {
"name": "CLA-2004:821", "name": "CLA-2004:821",
"refsource": "CONECTIVA", "refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000821" "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000821"
}, },
{ {
"name" : "DSA-443", "name": "oval:org.mitre.oval:def:809",
"refsource" : "DEBIAN", "refsource": "OVAL",
"url" : "http://www.debian.org/security/2004/dsa-443" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A809"
},
{
"name": "xfree86-multiple-font-improper-handling(15206)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15206"
}, },
{ {
"name": "FLSA:2314", "name": "FLSA:2314",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://marc.info/?l=bugtraq&m=110979666528890&w=2" "url": "http://marc.info/?l=bugtraq&m=110979666528890&w=2"
}, },
{
"name": "DSA-443",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-443"
},
{
"name": "MDKSA-2004:012",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:012"
},
{
"name": "oval:org.mitre.oval:def:832",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A832"
},
{ {
"name": "RHSA-2004:059", "name": "RHSA-2004:059",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-059.html" "url": "http://www.redhat.com/support/errata/RHSA-2004-059.html"
}, },
{
"name" : "RHSA-2004:060",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-060.html"
},
{ {
"name": "RHSA-2004:061", "name": "RHSA-2004:061",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -86,36 +116,6 @@
"name": "SSA:2004-043", "name": "SSA:2004-043",
"refsource": "SLACKWARE", "refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053" "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053"
},
{
"name" : "SuSE-SA:2004:006",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2004_06_xf86.html"
},
{
"name" : "MDKSA-2004:012",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:012"
},
{
"name" : "oval:org.mitre.oval:def:11111",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11111"
},
{
"name" : "xfree86-multiple-font-improper-handling(15206)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15206"
},
{
"name" : "oval:org.mitre.oval:def:809",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A809"
},
{
"name" : "oval:org.mitre.oval:def:832",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A832"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20040215 problems with database files in 'SignatureDB'",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107695113832648&w=2"
},
{ {
"name": "9661", "name": "9661",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "signaturedb-sdbscan-bo(15217)", "name": "signaturedb-sdbscan-bo(15217)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15217" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15217"
},
{
"name": "20040215 problems with database files in 'SignatureDB'",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107695113832648&w=2"
} }
] ]
} }

View File

@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://issues.apache.org/bugzilla/show_bug.cgi?id=30134",
"refsource" : "CONFIRM",
"url" : "http://issues.apache.org/bugzilla/show_bug.cgi?id=30134"
},
{
"name" : "20040911 Remote buffer overflow in Apache mod_ssl when reverse proxying SSL",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2004-09/0096.html"
},
{
"name" : "GLSA-200409-21",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml"
},
{
"name" : "MDKSA-2004:096",
"refsource" : "MANDRAKE",
"url" : "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096"
},
{ {
"name": "RHSA-2004:463", "name": "RHSA-2004:463",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -82,20 +62,40 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2004_30_apache2.html" "url": "http://www.novell.com/linux/security/advisories/2004_30_apache2.html"
}, },
{
"name": "apache-modssl-speculative-dos(17273)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17273"
},
{
"name": "http://issues.apache.org/bugzilla/show_bug.cgi?id=30134",
"refsource": "CONFIRM",
"url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=30134"
},
{ {
"name": "2004-0047", "name": "2004-0047",
"refsource": "TRUSTIX", "refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2004/0047/" "url": "http://www.trustix.org/errata/2004/0047/"
}, },
{
"name": "MDKSA-2004:096",
"refsource": "MANDRAKE",
"url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096"
},
{
"name": "GLSA-200409-21",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml"
},
{ {
"name": "oval:org.mitre.oval:def:11864", "name": "oval:org.mitre.oval:def:11864",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11864" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11864"
}, },
{ {
"name" : "apache-modssl-speculative-dos(17273)", "name": "20040911 Remote buffer overflow in Apache mod_ssl when reverse proxying SSL",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17273" "url": "http://archives.neohapsis.com/archives/bugtraq/2004-09/0096.html"
} }
] ]
} }

View File

@ -53,70 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://bugzilla.remotesensing.org/show_bug.cgi?id=111", "name": "RHSA-2004:577",
"refsource" : "MISC", "refsource": "REDHAT",
"url" : "http://bugzilla.remotesensing.org/show_bug.cgi?id=111" "url": "http://www.redhat.com/support/errata/RHSA-2004-577.html"
},
{
"name" : "http://www.kde.org/info/security/advisory-20041209-2.txt",
"refsource" : "CONFIRM",
"url" : "http://www.kde.org/info/security/advisory-20041209-2.txt"
},
{
"name" : "CLA-2004:888",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888"
},
{
"name" : "DSA-567",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-567"
}, },
{ {
"name": "MDKSA-2004:109", "name": "MDKSA-2004:109",
"refsource": "MANDRAKE", "refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:109" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:109"
}, },
{
"name" : "MDKSA-2005:052",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052"
},
{
"name" : "RHSA-2004:577",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-577.html"
},
{
"name" : "RHSA-2005:354",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-354.html"
},
{ {
"name": "RHSA-2005:021", "name": "RHSA-2005:021",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-021.html" "url": "http://www.redhat.com/support/errata/RHSA-2005-021.html"
}, },
{
"name" : "101677",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1"
},
{ {
"name": "201072", "name": "201072",
"refsource": "SUNALERT", "refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1"
}, },
{
"name" : "SUSE-SA:2004:038",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html"
},
{
"name" : "VU#555304",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/555304"
},
{ {
"name": "oval:org.mitre.oval:def:100115", "name": "oval:org.mitre.oval:def:100115",
"refsource": "OVAL", "refsource": "OVAL",
@ -127,10 +82,55 @@
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11711" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11711"
}, },
{
"name": "101677",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1"
},
{
"name": "SUSE-SA:2004:038",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html"
},
{
"name": "CLA-2004:888",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888"
},
{
"name": "MDKSA-2005:052",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052"
},
{
"name": "http://www.kde.org/info/security/advisory-20041209-2.txt",
"refsource": "CONFIRM",
"url": "http://www.kde.org/info/security/advisory-20041209-2.txt"
},
{
"name": "VU#555304",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/555304"
},
{
"name": "RHSA-2005:354",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-354.html"
},
{
"name": "DSA-567",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-567"
},
{ {
"name": "libtiff-dos(17755)", "name": "libtiff-dos(17755)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17755" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17755"
},
{
"name": "http://bugzilla.remotesensing.org/show_bug.cgi?id=111",
"refsource": "MISC",
"url": "http://bugzilla.remotesensing.org/show_bug.cgi?id=111"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2004-0818", "ID": "CVE-2004-0818",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20041223 SHOUTcast remote format string vulnerability", "name": "shoutcast-format-string(18669)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=110382975516003&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18669"
},
{
"name" : "20050219 exwormshoucast part of PTjob project: SHOUTcast v1.9.4 remote",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=110886444014745&w=2"
},
{
"name" : "GLSA-200501-04",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200501-04.xml"
}, },
{ {
"name": "12096", "name": "12096",
@ -78,9 +68,19 @@
"url": "http://securitytracker.com/id?1012675" "url": "http://securitytracker.com/id?1012675"
}, },
{ {
"name" : "shoutcast-format-string(18669)", "name": "GLSA-200501-04",
"refsource" : "XF", "refsource": "GENTOO",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18669" "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-04.xml"
},
{
"name": "20041223 SHOUTcast remote format string vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110382975516003&w=2"
},
{
"name": "20050219 exwormshoucast part of PTjob project: SHOUTcast v1.9.4 remote",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110886444014745&w=2"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/361300/2004-04-21/2004-04-27/0" "url": "http://www.securityfocus.com/archive/1/361300/2004-04-21/2004-04-27/0"
}, },
{
"name": "10206",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10206"
},
{ {
"name": "http://www.waraxe.us/index.php?modname=sa&id=25", "name": "http://www.waraxe.us/index.php?modname=sa&id=25",
"refsource": "MISC", "refsource": "MISC",
@ -66,11 +71,6 @@
"name": "http://protector.warcenter.se/article-53--0-0.html", "name": "http://protector.warcenter.se/article-53--0-0.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://protector.warcenter.se/article-53--0-0.html" "url": "http://protector.warcenter.se/article-53--0-0.html"
},
{
"name" : "10206",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/10206"
} }
] ]
} }

View File

@ -52,20 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20040121 [SuSE 9.0] possible symlink attacks in some scripts",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107461582413923&w=2"
},
{ {
"name": "20040122 Re: [SuSE 9.0] possible symlink attacks in some scripts", "name": "20040122 Re: [SuSE 9.0] possible symlink attacks in some scripts",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107478920006258&w=2" "url": "http://marc.info/?l=bugtraq&m=107478920006258&w=2"
}, },
{ {
"name" : "9457", "name": "20040121 [SuSE 9.0] possible symlink attacks in some scripts",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/9457" "url": "http://marc.info/?l=bugtraq&m=107461582413923&w=2"
}, },
{ {
"name": "1008781", "name": "1008781",
@ -76,6 +71,11 @@
"name": "suse-multiple-symlink-attack(14963)", "name": "suse-multiple-symlink-attack(14963)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14963" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14963"
},
{
"name": "9457",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9457"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm", "name": "netware-installation-file-disclosure(15600)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15600"
}, },
{ {
"name": "9934", "name": "9934",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/9934" "url": "http://www.securityfocus.com/bid/9934"
}, },
{
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm",
"refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm"
},
{ {
"name": "11188", "name": "11188",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11188" "url": "http://secunia.com/advisories/11188"
},
{
"name" : "netware-installation-file-disclosure(15600)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15600"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "SUSE-SA:2008:041",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html"
},
{ {
"name": "30694", "name": "30694",
"refsource": "BID", "refsource": "BID",
@ -67,6 +62,11 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2397" "url": "http://www.vupen.com/english/advisories/2008/2397"
}, },
{
"name": "SUSE-SA:2008:041",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html"
},
{ {
"name": "31429", "name": "31429",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-2251", "ID": "CVE-2008-2251",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,34 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBST02379", "name": "oval:org.mitre.oval:def:6010",
"refsource" : "HP", "refsource": "OVAL",
"url" : "http://marc.info/?l=bugtraq&m=122479227205998&w=2" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6010"
},
{
"name": "win-kernel-system-calls-privilege-escalation(45542)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45542"
}, },
{ {
"name": "SSRT080143", "name": "SSRT080143",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=122479227205998&w=2" "url": "http://marc.info/?l=bugtraq&m=122479227205998&w=2"
}, },
{
"name": "32247",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32247"
},
{ {
"name": "MS08-061", "name": "MS08-061",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061"
}, },
{
"name" : "TA08-288A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-288A.html"
},
{ {
"name": "31653", "name": "31653",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/31653" "url": "http://www.securityfocus.com/bid/31653"
}, },
{ {
"name" : "oval:org.mitre.oval:def:6010", "name": "win-ms08kb954211-update(45544)",
"refsource" : "OVAL", "refsource": "XF",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6010" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45544"
},
{
"name": "HPSBST02379",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=122479227205998&w=2"
}, },
{ {
"name": "ADV-2008-2812", "name": "ADV-2008-2812",
@ -93,19 +103,9 @@
"url": "http://www.securitytracker.com/id?1021046" "url": "http://www.securitytracker.com/id?1021046"
}, },
{ {
"name" : "32247", "name": "TA08-288A",
"refsource" : "SECUNIA", "refsource": "CERT",
"url" : "http://secunia.com/advisories/32247" "url": "http://www.us-cert.gov/cas/techalerts/TA08-288A.html"
},
{
"name" : "win-kernel-system-calls-privilege-escalation(45542)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45542"
},
{
"name" : "win-ms08kb954211-update(45544)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45544"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "phpfix-browse-sql-injection(42636)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42636"
},
{ {
"name": "20080526 phpFix v2 Multiple SQL Injection Vulnerability", "name": "20080526 phpFix v2 Multiple SQL Injection Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/492582/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/492582/100/0/threaded"
}, },
{
"name" : "29371",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29371"
},
{ {
"name": "30397", "name": "30397",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -73,9 +73,9 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42637" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42637"
}, },
{ {
"name" : "phpfix-browse-sql-injection(42636)", "name": "29371",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42636" "url": "http://www.securityfocus.com/bid/29371"
} }
] ]
} }

View File

@ -52,16 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080730 HIOX Random Ad 1.3 (hioxRandomAd.php hm) RFI Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/494927/100/0/threaded"
},
{ {
"name": "6161", "name": "6161",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6161" "url": "https://www.exploit-db.com/exploits/6161"
}, },
{
"name": "hioxrandomad-hm-file-include(44061)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44061"
},
{
"name": "20080730 HIOX Random Ad 1.3 (hioxRandomAd.php hm) RFI Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494927/100/0/threaded"
},
{ {
"name": "30435", "name": "30435",
"refsource": "BID", "refsource": "BID",
@ -76,11 +81,6 @@
"name": "4082", "name": "4082",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4082" "url": "http://securityreason.com/securityalert/4082"
},
{
"name" : "hioxrandomad-hm-file-include(44061)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44061"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "flipscms-neu-sql-injection(44522)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44522"
},
{ {
"name": "http://www.securityfocus.com/bid/30712/exploit", "name": "http://www.securityfocus.com/bid/30712/exploit",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "30712", "name": "30712",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/30712" "url": "http://www.securityfocus.com/bid/30712"
},
{
"name" : "flipscms-neu-sql-injection(44522)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44522"
} }
] ]
} }

View File

@ -53,9 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20081012 NewLife Blogger <= v3.0 / Insecure Cookie Handling & SQL Injection Vulnerability", "name": "31728",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/497283/100/0/threaded" "url": "http://www.securityfocus.com/bid/31728"
},
{
"name": "32214",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32214"
},
{
"name": "ADV-2008-2797",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2797"
}, },
{ {
"name": "6739", "name": "6739",
@ -67,21 +77,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.pepelux.org/exploits/newlife-es.txt" "url": "http://www.pepelux.org/exploits/newlife-es.txt"
}, },
{
"name" : "31728",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31728"
},
{
"name" : "ADV-2008-2797",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2797"
},
{
"name" : "32214",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32214"
},
{ {
"name": "newlifeblogger-nlbuserclass-sql-injection(45820)", "name": "newlifeblogger-nlbuserclass-sql-injection(45820)",
"refsource": "XF", "refsource": "XF",
@ -91,6 +86,11 @@
"name": "newlifeblogger-nlbuserclass-security-bypass(45821)", "name": "newlifeblogger-nlbuserclass-security-bypass(45821)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45821" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45821"
},
{
"name": "20081012 NewLife Blogger <= v3.0 / Insecure Cookie Handling & SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497283/100/0/threaded"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://freshmeat.net/projects/octopussy/releases/275561",
"refsource" : "CONFIRM",
"url" : "http://freshmeat.net/projects/octopussy/releases/275561"
},
{ {
"name": "48839", "name": "48839",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/48839" "url": "http://osvdb.org/48839"
},
{
"name": "http://freshmeat.net/projects/octopussy/releases/275561",
"refsource": "CONFIRM",
"url": "http://freshmeat.net/projects/octopussy/releases/275561"
} }
] ]
} }

View File

@ -52,20 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "7306",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7306"
},
{ {
"name": "32537", "name": "32537",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32537" "url": "http://www.securityfocus.com/bid/32537"
}, },
{ {
"name" : "32886", "name": "7306",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/32886" "url": "https://www.exploit-db.com/exploits/7306"
}, },
{ {
"name": "ADV-2008-3291", "name": "ADV-2008-3291",
@ -76,6 +71,11 @@
"name": "minimalablog-uploader-file-upload(46964)", "name": "minimalablog-uploader-file-upload(46964)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46964" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46964"
},
{
"name": "32886",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32886"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "krate-index-sql-injection(44670)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44670"
},
{ {
"name": "6312", "name": "6312",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -62,20 +67,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/30842" "url": "http://www.securityfocus.com/bid/30842"
}, },
{
"name" : "48338",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/48338"
},
{ {
"name": "31548", "name": "31548",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31548" "url": "http://secunia.com/advisories/31548"
}, },
{ {
"name" : "krate-index-sql-injection(44670)", "name": "48338",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44670" "url": "http://osvdb.org/48338"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html",
"refsource" : "MISC",
"url" : "http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html"
},
{ {
"name": "https://bugs.debian.org/868705", "name": "https://bugs.debian.org/868705",
"refsource": "MISC", "refsource": "MISC",
@ -67,6 +62,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/gnome-exe-thumbnailer/gnome-exe-thumbnailer/commit/1d8e3102dd8fd23431ae6127d14a236da6b4a4a5" "url": "https://github.com/gnome-exe-thumbnailer/gnome-exe-thumbnailer/commit/1d8e3102dd8fd23431ae6127d14a236da6b4a4a5"
}, },
{
"name": "http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html",
"refsource": "MISC",
"url": "http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html"
},
{ {
"name": "99922", "name": "99922",
"refsource": "BID", "refsource": "BID",

View File

@ -54,9 +54,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11767", "name": "1039369",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11767" "url": "http://www.securitytracker.com/id/1039369"
}, },
{ {
"name": "100838", "name": "100838",
@ -64,9 +64,9 @@
"url": "http://www.securityfocus.com/bid/100838" "url": "http://www.securityfocus.com/bid/100838"
}, },
{ {
"name" : "1039369", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11767",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1039369" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11767"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://seclists.org/fulldisclosure/2018/Jan/17", "name": "1040070",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://seclists.org/fulldisclosure/2018/Jan/17" "url": "http://www.securitytracker.com/id/1040070"
}, },
{ {
"name": "102363", "name": "102363",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/102363" "url": "http://www.securityfocus.com/bid/102363"
}, },
{ {
"name" : "1040070", "name": "http://seclists.org/fulldisclosure/2018/Jan/17",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1040070" "url": "http://seclists.org/fulldisclosure/2018/Jan/17"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html", "name": "https://wpvulndb.com/vulnerabilities/8930",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html" "url": "https://wpvulndb.com/vulnerabilities/8930"
}, },
{ {
"name": "https://plugins.trac.wordpress.org/changeset/1745805/pootle-button/tags/", "name": "https://plugins.trac.wordpress.org/changeset/1745805/pootle-button/tags/",
@ -63,9 +63,9 @@
"url": "https://plugins.trac.wordpress.org/changeset/1745805/pootle-button/tags/" "url": "https://plugins.trac.wordpress.org/changeset/1745805/pootle-button/tags/"
}, },
{ {
"name" : "https://wpvulndb.com/vulnerabilities/8930", "name": "https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://wpvulndb.com/vulnerabilities/8930" "url": "https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "43099",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/43099/"
},
{ {
"name": "https://packetstormsecurity.com/files/144429/Article-Directory-Script-3.0-SQL-Injection.html", "name": "https://packetstormsecurity.com/files/144429/Article-Directory-Script-3.0-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
"url": "https://packetstormsecurity.com/files/144429/Article-Directory-Script-3.0-SQL-Injection.html" "url": "https://packetstormsecurity.com/files/144429/Article-Directory-Script-3.0-SQL-Injection.html"
},
{
"name": "43099",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43099/"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1039812",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039812"
},
{ {
"name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html", "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "DSA-4036", "name": "DSA-4036",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4036" "url": "https://www.debian.org/security/2017/dsa-4036"
},
{
"name" : "1039812",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039812"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516",
"refsource" : "CONFIRM",
"url" : "https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516"
},
{ {
"name": "https://bugs.torproject.org/21534", "name": "https://bugs.torproject.org/21534",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.torproject.org/21534" "url": "https://bugs.torproject.org/21534"
}, },
{
"name": "https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516",
"refsource": "CONFIRM",
"url": "https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516"
},
{ {
"name": "https://bugs.torproject.org/24333", "name": "https://bugs.torproject.org/24333",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2/11/2018 18:32:45", "DATE_ASSIGNED": "2/11/2018 18:32:45",
"ID": "CVE-2018-1000093", "ID": "CVE-2018-1000093",
"REQUESTER": "terrycwk1994@gmail.com", "REQUESTER": "terrycwk1994@gmail.com",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "CryptoNote", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "version 0.8.9 and possibly later" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "CryptoNote" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Unauthenticated JSON RPC server" "value": "n/a"
} }
] ]
} }
@ -55,9 +55,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://github.com/amjuarez/bytecoin/issues/217", "name": "https://www.ayrx.me/cryptonote-unauthenticated-json-rpc",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://github.com/amjuarez/bytecoin/issues/217" "url": "https://www.ayrx.me/cryptonote-unauthenticated-json-rpc"
}, },
{ {
"name": "https://github.com/cryptonotefoundation/cryptonote/issues/172", "name": "https://github.com/cryptonotefoundation/cryptonote/issues/172",
@ -65,9 +65,9 @@
"url": "https://github.com/cryptonotefoundation/cryptonote/issues/172" "url": "https://github.com/cryptonotefoundation/cryptonote/issues/172"
}, },
{ {
"name" : "https://www.ayrx.me/cryptonote-unauthenticated-json-rpc", "name": "https://github.com/amjuarez/bytecoin/issues/217",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://www.ayrx.me/cryptonote-unauthenticated-json-rpc" "url": "https://github.com/amjuarez/bytecoin/issues/217"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-09-03T16:07:16.974886", "DATE_ASSIGNED": "2018-09-03T16:07:16.974886",
"DATE_REQUESTED": "2018-08-22T22:28:15", "DATE_REQUESTED": "2018-08-22T22:28:15",
"ID": "CVE-2018-1000665", "ID": "CVE-2018-1000665",
@ -14,18 +14,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Dojo Objective Harness (DOH)", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "prior to version 1.14" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Dojo" "vendor_name": "n/a"
} }
] ]
} }
@ -47,7 +47,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Cross Site Scripting (XSS)" "value": "n/a"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028",
"refsource" : "MISC",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028"
},
{ {
"name": "https://security.netapp.com/advisory/ntap-20181112-0001/", "name": "https://security.netapp.com/advisory/ntap-20181112-0001/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "105841", "name": "105841",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/105841" "url": "http://www.securityfocus.com/bid/105841"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028",
"refsource": "MISC",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028"
} }
] ]
} }

View File

@ -65,40 +65,35 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update", "name": "DSA-4324",
"refsource" : "MLIST", "refsource": "DEBIAN",
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html" "url": "https://www.debian.org/security/2018/dsa-4324"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523"
}, },
{ {
"name": "https://www.mozilla.org/security/advisories/mfsa2018-26/", "name": "https://www.mozilla.org/security/advisories/mfsa2018-26/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/"
}, },
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-27/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-27/"
},
{
"name" : "DSA-4324",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4324"
},
{ {
"name": "GLSA-201811-04", "name": "GLSA-201811-04",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-04" "url": "https://security.gentoo.org/glsa/201811-04"
}, },
{
"name": "https://www.mozilla.org/security/advisories/mfsa2018-27/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2018-27/"
},
{ {
"name": "RHSA-2018:3005", "name": "RHSA-2018:3005",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3005" "url": "https://access.redhat.com/errata/RHSA-2018:3005"
}, },
{
"name": "105718",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105718"
},
{ {
"name": "RHSA-2018:3006", "name": "RHSA-2018:3006",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -110,14 +105,19 @@
"url": "https://usn.ubuntu.com/3801-1/" "url": "https://usn.ubuntu.com/3801-1/"
}, },
{ {
"name" : "105718", "name": "[debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/105718" "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html"
}, },
{ {
"name": "1041944", "name": "1041944",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041944" "url": "http://www.securitytracker.com/id/1041944"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523"
} }
] ]
} }

View File

@ -58,35 +58,35 @@
"url": "http://www.openwall.com/lists/oss-security/2018/06/27/11" "url": "http://www.openwall.com/lists/oss-security/2018/06/27/11"
}, },
{ {
"name" : "[debian-lts-announce] 20181112 [SECURITY] [DLA 1577-1] xen security update", "name": "DSA-4236",
"refsource" : "MLIST", "refsource": "DEBIAN",
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html" "url": "https://www.debian.org/security/2018/dsa-4236"
},
{
"name" : "http://xenbits.xen.org/xsa/advisory-265.html",
"refsource" : "CONFIRM",
"url" : "http://xenbits.xen.org/xsa/advisory-265.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1590979",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1590979"
}, },
{ {
"name": "https://support.citrix.com/article/CTX235748", "name": "https://support.citrix.com/article/CTX235748",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX235748" "url": "https://support.citrix.com/article/CTX235748"
}, },
{
"name" : "DSA-4236",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4236"
},
{ {
"name": "GLSA-201810-06", "name": "GLSA-201810-06",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201810-06" "url": "https://security.gentoo.org/glsa/201810-06"
}, },
{
"name": "[debian-lts-announce] 20181112 [SECURITY] [DLA 1577-1] xen security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1590979",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590979"
},
{
"name": "http://xenbits.xen.org/xsa/advisory-265.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-265.html"
},
{ {
"name": "104572", "name": "104572",
"refsource": "BID", "refsource": "BID",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
"refsource" : "MISC",
"url" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
},
{ {
"name": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/hentaisolo", "name": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/hentaisolo",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/hentaisolo" "url": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/hentaisolo"
},
{
"name": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
"refsource": "MISC",
"url": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-13277", "ID": "CVE-2018-13277",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md",
"refsource": "CONFIRM",
"url": "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md"
},
{ {
"name": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/", "name": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/", "name": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/" "url": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/"
},
{
"name" : "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md",
"refsource" : "CONFIRM",
"url" : "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "45916",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45916/"
},
{
"name" : "https://support.apple.com/HT208848",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208848"
},
{
"name" : "https://support.apple.com/HT208849",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208849"
},
{ {
"name": "https://support.apple.com/HT208850", "name": "https://support.apple.com/HT208850",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -81,6 +66,21 @@
"name": "1041027", "name": "1041027",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041027" "url": "http://www.securitytracker.com/id/1041027"
},
{
"name": "https://support.apple.com/HT208848",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208848"
},
{
"name": "https://support.apple.com/HT208849",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208849"
},
{
"name": "45916",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45916/"
} }
] ]
} }

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-9856",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}