"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:48:10 +00:00
parent 2a2d0f0992
commit d3468c076a
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3685 additions and 3667 deletions

View File

@ -52,31 +52,61 @@
},
"references": {
"reference_data": [
{
"name": "SuSE-SA:2004:006",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2004_06_xf86.html"
},
{
"name": "oval:org.mitre.oval:def:11111",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11111"
},
{
"name": "RHSA-2004:060",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-060.html"
},
{
"name": "CLA-2004:821",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000821"
},
{
"name" : "DSA-443",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-443"
"name": "oval:org.mitre.oval:def:809",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A809"
},
{
"name": "xfree86-multiple-font-improper-handling(15206)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15206"
},
{
"name": "FLSA:2314",
"refsource": "FEDORA",
"url": "http://marc.info/?l=bugtraq&m=110979666528890&w=2"
},
{
"name": "DSA-443",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-443"
},
{
"name": "MDKSA-2004:012",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:012"
},
{
"name": "oval:org.mitre.oval:def:832",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A832"
},
{
"name": "RHSA-2004:059",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-059.html"
},
{
"name" : "RHSA-2004:060",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-060.html"
},
{
"name": "RHSA-2004:061",
"refsource": "REDHAT",
@ -86,36 +116,6 @@
"name": "SSA:2004-043",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053"
},
{
"name" : "SuSE-SA:2004:006",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2004_06_xf86.html"
},
{
"name" : "MDKSA-2004:012",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:012"
},
{
"name" : "oval:org.mitre.oval:def:11111",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11111"
},
{
"name" : "xfree86-multiple-font-improper-handling(15206)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15206"
},
{
"name" : "oval:org.mitre.oval:def:809",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A809"
},
{
"name" : "oval:org.mitre.oval:def:832",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A832"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20040215 problems with database files in 'SignatureDB'",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107695113832648&w=2"
},
{
"name": "9661",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "signaturedb-sdbscan-bo(15217)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15217"
},
{
"name": "20040215 problems with database files in 'SignatureDB'",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107695113832648&w=2"
}
]
}

View File

@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://issues.apache.org/bugzilla/show_bug.cgi?id=30134",
"refsource" : "CONFIRM",
"url" : "http://issues.apache.org/bugzilla/show_bug.cgi?id=30134"
},
{
"name" : "20040911 Remote buffer overflow in Apache mod_ssl when reverse proxying SSL",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2004-09/0096.html"
},
{
"name" : "GLSA-200409-21",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml"
},
{
"name" : "MDKSA-2004:096",
"refsource" : "MANDRAKE",
"url" : "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096"
},
{
"name": "RHSA-2004:463",
"refsource": "REDHAT",
@ -82,20 +62,40 @@
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2004_30_apache2.html"
},
{
"name": "apache-modssl-speculative-dos(17273)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17273"
},
{
"name": "http://issues.apache.org/bugzilla/show_bug.cgi?id=30134",
"refsource": "CONFIRM",
"url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=30134"
},
{
"name": "2004-0047",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2004/0047/"
},
{
"name": "MDKSA-2004:096",
"refsource": "MANDRAKE",
"url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096"
},
{
"name": "GLSA-200409-21",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml"
},
{
"name": "oval:org.mitre.oval:def:11864",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11864"
},
{
"name" : "apache-modssl-speculative-dos(17273)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17273"
"name": "20040911 Remote buffer overflow in Apache mod_ssl when reverse proxying SSL",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-09/0096.html"
}
]
}

View File

@ -53,70 +53,25 @@
"references": {
"reference_data": [
{
"name" : "http://bugzilla.remotesensing.org/show_bug.cgi?id=111",
"refsource" : "MISC",
"url" : "http://bugzilla.remotesensing.org/show_bug.cgi?id=111"
},
{
"name" : "http://www.kde.org/info/security/advisory-20041209-2.txt",
"refsource" : "CONFIRM",
"url" : "http://www.kde.org/info/security/advisory-20041209-2.txt"
},
{
"name" : "CLA-2004:888",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888"
},
{
"name" : "DSA-567",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-567"
"name": "RHSA-2004:577",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-577.html"
},
{
"name": "MDKSA-2004:109",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:109"
},
{
"name" : "MDKSA-2005:052",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052"
},
{
"name" : "RHSA-2004:577",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-577.html"
},
{
"name" : "RHSA-2005:354",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-354.html"
},
{
"name": "RHSA-2005:021",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-021.html"
},
{
"name" : "101677",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1"
},
{
"name": "201072",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1"
},
{
"name" : "SUSE-SA:2004:038",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html"
},
{
"name" : "VU#555304",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/555304"
},
{
"name": "oval:org.mitre.oval:def:100115",
"refsource": "OVAL",
@ -127,10 +82,55 @@
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11711"
},
{
"name": "101677",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1"
},
{
"name": "SUSE-SA:2004:038",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html"
},
{
"name": "CLA-2004:888",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888"
},
{
"name": "MDKSA-2005:052",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052"
},
{
"name": "http://www.kde.org/info/security/advisory-20041209-2.txt",
"refsource": "CONFIRM",
"url": "http://www.kde.org/info/security/advisory-20041209-2.txt"
},
{
"name": "VU#555304",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/555304"
},
{
"name": "RHSA-2005:354",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-354.html"
},
{
"name": "DSA-567",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-567"
},
{
"name": "libtiff-dos(17755)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17755"
},
{
"name": "http://bugzilla.remotesensing.org/show_bug.cgi?id=111",
"refsource": "MISC",
"url": "http://bugzilla.remotesensing.org/show_bug.cgi?id=111"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2004-0818",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20041223 SHOUTcast remote format string vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=110382975516003&w=2"
},
{
"name" : "20050219 exwormshoucast part of PTjob project: SHOUTcast v1.9.4 remote",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=110886444014745&w=2"
},
{
"name" : "GLSA-200501-04",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200501-04.xml"
"name": "shoutcast-format-string(18669)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18669"
},
{
"name": "12096",
@ -78,9 +68,19 @@
"url": "http://securitytracker.com/id?1012675"
},
{
"name" : "shoutcast-format-string(18669)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18669"
"name": "GLSA-200501-04",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200501-04.xml"
},
{
"name": "20041223 SHOUTcast remote format string vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110382975516003&w=2"
},
{
"name": "20050219 exwormshoucast part of PTjob project: SHOUTcast v1.9.4 remote",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110886444014745&w=2"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/361300/2004-04-21/2004-04-27/0"
},
{
"name": "10206",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10206"
},
{
"name": "http://www.waraxe.us/index.php?modname=sa&id=25",
"refsource": "MISC",
@ -66,11 +71,6 @@
"name": "http://protector.warcenter.se/article-53--0-0.html",
"refsource": "CONFIRM",
"url": "http://protector.warcenter.se/article-53--0-0.html"
},
{
"name" : "10206",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/10206"
}
]
}

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20040121 [SuSE 9.0] possible symlink attacks in some scripts",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107461582413923&w=2"
},
{
"name": "20040122 Re: [SuSE 9.0] possible symlink attacks in some scripts",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107478920006258&w=2"
},
{
"name" : "9457",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/9457"
"name": "20040121 [SuSE 9.0] possible symlink attacks in some scripts",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107461582413923&w=2"
},
{
"name": "1008781",
@ -76,6 +71,11 @@
"name": "suse-multiple-symlink-attack(14963)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14963"
},
{
"name": "9457",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9457"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm"
"name": "netware-installation-file-disclosure(15600)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15600"
},
{
"name": "9934",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9934"
},
{
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm",
"refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm"
},
{
"name": "11188",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11188"
},
{
"name" : "netware-installation-file-disclosure(15600)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15600"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "SUSE-SA:2008:041",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html"
},
{
"name": "30694",
"refsource": "BID",
@ -67,6 +62,11 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2397"
},
{
"name": "SUSE-SA:2008:041",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html"
},
{
"name": "31429",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-2251",
"STATE": "PUBLIC"
},
@ -53,34 +53,44 @@
"references": {
"reference_data": [
{
"name" : "HPSBST02379",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=122479227205998&w=2"
"name": "oval:org.mitre.oval:def:6010",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6010"
},
{
"name": "win-kernel-system-calls-privilege-escalation(45542)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45542"
},
{
"name": "SSRT080143",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=122479227205998&w=2"
},
{
"name": "32247",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32247"
},
{
"name": "MS08-061",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061"
},
{
"name" : "TA08-288A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-288A.html"
},
{
"name": "31653",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31653"
},
{
"name" : "oval:org.mitre.oval:def:6010",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6010"
"name": "win-ms08kb954211-update(45544)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45544"
},
{
"name": "HPSBST02379",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=122479227205998&w=2"
},
{
"name": "ADV-2008-2812",
@ -93,19 +103,9 @@
"url": "http://www.securitytracker.com/id?1021046"
},
{
"name" : "32247",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32247"
},
{
"name" : "win-kernel-system-calls-privilege-escalation(45542)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45542"
},
{
"name" : "win-ms08kb954211-update(45544)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45544"
"name": "TA08-288A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-288A.html"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "phpfix-browse-sql-injection(42636)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42636"
},
{
"name": "20080526 phpFix v2 Multiple SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/492582/100/0/threaded"
},
{
"name" : "29371",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29371"
},
{
"name": "30397",
"refsource": "SECUNIA",
@ -73,9 +73,9 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42637"
},
{
"name" : "phpfix-browse-sql-injection(42636)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42636"
"name": "29371",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29371"
}
]
}

View File

@ -52,16 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "20080730 HIOX Random Ad 1.3 (hioxRandomAd.php hm) RFI Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/494927/100/0/threaded"
},
{
"name": "6161",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6161"
},
{
"name": "hioxrandomad-hm-file-include(44061)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44061"
},
{
"name": "20080730 HIOX Random Ad 1.3 (hioxRandomAd.php hm) RFI Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494927/100/0/threaded"
},
{
"name": "30435",
"refsource": "BID",
@ -76,11 +81,6 @@
"name": "4082",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4082"
},
{
"name" : "hioxrandomad-hm-file-include(44061)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44061"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "flipscms-neu-sql-injection(44522)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44522"
},
{
"name": "http://www.securityfocus.com/bid/30712/exploit",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "30712",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30712"
},
{
"name" : "flipscms-neu-sql-injection(44522)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44522"
}
]
}

View File

@ -53,9 +53,19 @@
"references": {
"reference_data": [
{
"name" : "20081012 NewLife Blogger <= v3.0 / Insecure Cookie Handling & SQL Injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/497283/100/0/threaded"
"name": "31728",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31728"
},
{
"name": "32214",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32214"
},
{
"name": "ADV-2008-2797",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2797"
},
{
"name": "6739",
@ -67,21 +77,6 @@
"refsource": "MISC",
"url": "http://www.pepelux.org/exploits/newlife-es.txt"
},
{
"name" : "31728",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31728"
},
{
"name" : "ADV-2008-2797",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2797"
},
{
"name" : "32214",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32214"
},
{
"name": "newlifeblogger-nlbuserclass-sql-injection(45820)",
"refsource": "XF",
@ -91,6 +86,11 @@
"name": "newlifeblogger-nlbuserclass-security-bypass(45821)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45821"
},
{
"name": "20081012 NewLife Blogger <= v3.0 / Insecure Cookie Handling & SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497283/100/0/threaded"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://freshmeat.net/projects/octopussy/releases/275561",
"refsource" : "CONFIRM",
"url" : "http://freshmeat.net/projects/octopussy/releases/275561"
},
{
"name": "48839",
"refsource": "OSVDB",
"url": "http://osvdb.org/48839"
},
{
"name": "http://freshmeat.net/projects/octopussy/releases/275561",
"refsource": "CONFIRM",
"url": "http://freshmeat.net/projects/octopussy/releases/275561"
}
]
}

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "7306",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7306"
},
{
"name": "32537",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32537"
},
{
"name" : "32886",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32886"
"name": "7306",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7306"
},
{
"name": "ADV-2008-3291",
@ -76,6 +71,11 @@
"name": "minimalablog-uploader-file-upload(46964)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46964"
},
{
"name": "32886",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32886"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "krate-index-sql-injection(44670)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44670"
},
{
"name": "6312",
"refsource": "EXPLOIT-DB",
@ -62,20 +67,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30842"
},
{
"name" : "48338",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/48338"
},
{
"name": "31548",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31548"
},
{
"name" : "krate-index-sql-injection(44670)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44670"
"name": "48338",
"refsource": "OSVDB",
"url": "http://osvdb.org/48338"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html",
"refsource" : "MISC",
"url" : "http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html"
},
{
"name": "https://bugs.debian.org/868705",
"refsource": "MISC",
@ -67,6 +62,11 @@
"refsource": "MISC",
"url": "https://github.com/gnome-exe-thumbnailer/gnome-exe-thumbnailer/commit/1d8e3102dd8fd23431ae6127d14a236da6b4a4a5"
},
{
"name": "http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html",
"refsource": "MISC",
"url": "http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html"
},
{
"name": "99922",
"refsource": "BID",

View File

@ -54,9 +54,9 @@
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11767",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11767"
"name": "1039369",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039369"
},
{
"name": "100838",
@ -64,9 +64,9 @@
"url": "http://www.securityfocus.com/bid/100838"
},
{
"name" : "1039369",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039369"
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11767",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11767"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://seclists.org/fulldisclosure/2018/Jan/17",
"refsource" : "CONFIRM",
"url" : "http://seclists.org/fulldisclosure/2018/Jan/17"
"name": "1040070",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040070"
},
{
"name": "102363",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/102363"
},
{
"name" : "1040070",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040070"
"name": "http://seclists.org/fulldisclosure/2018/Jan/17",
"refsource": "CONFIRM",
"url": "http://seclists.org/fulldisclosure/2018/Jan/17"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html",
"name": "https://wpvulndb.com/vulnerabilities/8930",
"refsource": "MISC",
"url" : "https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html"
"url": "https://wpvulndb.com/vulnerabilities/8930"
},
{
"name": "https://plugins.trac.wordpress.org/changeset/1745805/pootle-button/tags/",
@ -63,9 +63,9 @@
"url": "https://plugins.trac.wordpress.org/changeset/1745805/pootle-button/tags/"
},
{
"name" : "https://wpvulndb.com/vulnerabilities/8930",
"name": "https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html",
"refsource": "MISC",
"url" : "https://wpvulndb.com/vulnerabilities/8930"
"url": "https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "43099",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/43099/"
},
{
"name": "https://packetstormsecurity.com/files/144429/Article-Directory-Script-3.0-SQL-Injection.html",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/144429/Article-Directory-Script-3.0-SQL-Injection.html"
},
{
"name": "43099",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43099/"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1039812",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039812"
},
{
"name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "DSA-4036",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4036"
},
{
"name" : "1039812",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039812"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516",
"refsource" : "CONFIRM",
"url" : "https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516"
},
{
"name": "https://bugs.torproject.org/21534",
"refsource": "CONFIRM",
"url": "https://bugs.torproject.org/21534"
},
{
"name": "https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516",
"refsource": "CONFIRM",
"url": "https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516"
},
{
"name": "https://bugs.torproject.org/24333",
"refsource": "CONFIRM",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2/11/2018 18:32:45",
"ID": "CVE-2018-1000093",
"REQUESTER": "terrycwk1994@gmail.com",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "CryptoNote",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "version 0.8.9 and possibly later"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "CryptoNote"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Unauthenticated JSON RPC server"
"value": "n/a"
}
]
}
@ -55,9 +55,9 @@
"references": {
"reference_data": [
{
"name" : "https://github.com/amjuarez/bytecoin/issues/217",
"name": "https://www.ayrx.me/cryptonote-unauthenticated-json-rpc",
"refsource": "MISC",
"url" : "https://github.com/amjuarez/bytecoin/issues/217"
"url": "https://www.ayrx.me/cryptonote-unauthenticated-json-rpc"
},
{
"name": "https://github.com/cryptonotefoundation/cryptonote/issues/172",
@ -65,9 +65,9 @@
"url": "https://github.com/cryptonotefoundation/cryptonote/issues/172"
},
{
"name" : "https://www.ayrx.me/cryptonote-unauthenticated-json-rpc",
"name": "https://github.com/amjuarez/bytecoin/issues/217",
"refsource": "MISC",
"url" : "https://www.ayrx.me/cryptonote-unauthenticated-json-rpc"
"url": "https://github.com/amjuarez/bytecoin/issues/217"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-09-03T16:07:16.974886",
"DATE_REQUESTED": "2018-08-22T22:28:15",
"ID": "CVE-2018-1000665",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "Dojo Objective Harness (DOH)",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "prior to version 1.14"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Dojo"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "Cross Site Scripting (XSS)"
"value": "n/a"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028",
"refsource" : "MISC",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028"
},
{
"name": "https://security.netapp.com/advisory/ntap-20181112-0001/",
"refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "105841",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105841"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028",
"refsource": "MISC",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028"
}
]
}

View File

@ -65,40 +65,35 @@
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523"
"name": "DSA-4324",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4324"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2018-26/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2018-26/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-27/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-27/"
},
{
"name" : "DSA-4324",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4324"
},
{
"name": "GLSA-201811-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-04"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2018-27/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2018-27/"
},
{
"name": "RHSA-2018:3005",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3005"
},
{
"name": "105718",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105718"
},
{
"name": "RHSA-2018:3006",
"refsource": "REDHAT",
@ -110,14 +105,19 @@
"url": "https://usn.ubuntu.com/3801-1/"
},
{
"name" : "105718",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/105718"
"name": "[debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html"
},
{
"name": "1041944",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041944"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523"
}
]
}

View File

@ -58,35 +58,35 @@
"url": "http://www.openwall.com/lists/oss-security/2018/06/27/11"
},
{
"name" : "[debian-lts-announce] 20181112 [SECURITY] [DLA 1577-1] xen security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html"
},
{
"name" : "http://xenbits.xen.org/xsa/advisory-265.html",
"refsource" : "CONFIRM",
"url" : "http://xenbits.xen.org/xsa/advisory-265.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1590979",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1590979"
"name": "DSA-4236",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4236"
},
{
"name": "https://support.citrix.com/article/CTX235748",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX235748"
},
{
"name" : "DSA-4236",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4236"
},
{
"name": "GLSA-201810-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"name": "[debian-lts-announce] 20181112 [SECURITY] [DLA 1577-1] xen security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1590979",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590979"
},
{
"name": "http://xenbits.xen.org/xsa/advisory-265.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-265.html"
},
{
"name": "104572",
"refsource": "BID",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
"refsource" : "MISC",
"url" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
},
{
"name": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/hentaisolo",
"refsource": "MISC",
"url": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/hentaisolo"
},
{
"name": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
"refsource": "MISC",
"url": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-13277",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md",
"refsource": "CONFIRM",
"url": "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md"
},
{
"name": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/",
"refsource": "MISC",
"url": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/"
},
{
"name" : "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md",
"refsource" : "CONFIRM",
"url" : "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "45916",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45916/"
},
{
"name" : "https://support.apple.com/HT208848",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208848"
},
{
"name" : "https://support.apple.com/HT208849",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208849"
},
{
"name": "https://support.apple.com/HT208850",
"refsource": "CONFIRM",
@ -81,6 +66,21 @@
"name": "1041027",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041027"
},
{
"name": "https://support.apple.com/HT208848",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208848"
},
{
"name": "https://support.apple.com/HT208849",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208849"
},
{
"name": "45916",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45916/"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-9856",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}