mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
2a2d0f0992
commit
d3468c076a
@ -52,31 +52,61 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "SuSE-SA:2004:006",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2004_06_xf86.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11111",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11111"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2004:060",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-060.html"
|
||||
},
|
||||
{
|
||||
"name": "CLA-2004:821",
|
||||
"refsource": "CONECTIVA",
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000821"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-443",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2004/dsa-443"
|
||||
"name": "oval:org.mitre.oval:def:809",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A809"
|
||||
},
|
||||
{
|
||||
"name": "xfree86-multiple-font-improper-handling(15206)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15206"
|
||||
},
|
||||
{
|
||||
"name": "FLSA:2314",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://marc.info/?l=bugtraq&m=110979666528890&w=2"
|
||||
},
|
||||
{
|
||||
"name": "DSA-443",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-443"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2004:012",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:012"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:832",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A832"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2004:059",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-059.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:060",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2004-060.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2004:061",
|
||||
"refsource": "REDHAT",
|
||||
@ -86,36 +116,6 @@
|
||||
"name": "SSA:2004-043",
|
||||
"refsource": "SLACKWARE",
|
||||
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053"
|
||||
},
|
||||
{
|
||||
"name" : "SuSE-SA:2004:006",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2004_06_xf86.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2004:012",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:012"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11111",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11111"
|
||||
},
|
||||
{
|
||||
"name" : "xfree86-multiple-font-improper-handling(15206)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15206"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:809",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A809"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:832",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A832"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040215 problems with database files in 'SignatureDB'",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=107695113832648&w=2"
|
||||
},
|
||||
{
|
||||
"name": "9661",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "signaturedb-sdbscan-bo(15217)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15217"
|
||||
},
|
||||
{
|
||||
"name": "20040215 problems with database files in 'SignatureDB'",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=107695113832648&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://issues.apache.org/bugzilla/show_bug.cgi?id=30134",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://issues.apache.org/bugzilla/show_bug.cgi?id=30134"
|
||||
},
|
||||
{
|
||||
"name" : "20040911 Remote buffer overflow in Apache mod_ssl when reverse proxying SSL",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2004-09/0096.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200409-21",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2004:096",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2004:463",
|
||||
"refsource": "REDHAT",
|
||||
@ -82,20 +62,40 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2004_30_apache2.html"
|
||||
},
|
||||
{
|
||||
"name": "apache-modssl-speculative-dos(17273)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17273"
|
||||
},
|
||||
{
|
||||
"name": "http://issues.apache.org/bugzilla/show_bug.cgi?id=30134",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=30134"
|
||||
},
|
||||
{
|
||||
"name": "2004-0047",
|
||||
"refsource": "TRUSTIX",
|
||||
"url": "http://www.trustix.org/errata/2004/0047/"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2004:096",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200409-21",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11864",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11864"
|
||||
},
|
||||
{
|
||||
"name" : "apache-modssl-speculative-dos(17273)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17273"
|
||||
"name": "20040911 Remote buffer overflow in Apache mod_ssl when reverse proxying SSL",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-09/0096.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,70 +53,25 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://bugzilla.remotesensing.org/show_bug.cgi?id=111",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://bugzilla.remotesensing.org/show_bug.cgi?id=111"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kde.org/info/security/advisory-20041209-2.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kde.org/info/security/advisory-20041209-2.txt"
|
||||
},
|
||||
{
|
||||
"name" : "CLA-2004:888",
|
||||
"refsource" : "CONECTIVA",
|
||||
"url" : "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-567",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2004/dsa-567"
|
||||
"name": "RHSA-2004:577",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-577.html"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2004:109",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:109"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2005:052",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:577",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2004-577.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2005:354",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-354.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2005:021",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-021.html"
|
||||
},
|
||||
{
|
||||
"name" : "101677",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1"
|
||||
},
|
||||
{
|
||||
"name": "201072",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2004:038",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#555304",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/555304"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:100115",
|
||||
"refsource": "OVAL",
|
||||
@ -127,10 +82,55 @@
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11711"
|
||||
},
|
||||
{
|
||||
"name": "101677",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2004:038",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html"
|
||||
},
|
||||
{
|
||||
"name": "CLA-2004:888",
|
||||
"refsource": "CONECTIVA",
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2005:052",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kde.org/info/security/advisory-20041209-2.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kde.org/info/security/advisory-20041209-2.txt"
|
||||
},
|
||||
{
|
||||
"name": "VU#555304",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/555304"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2005:354",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-354.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-567",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-567"
|
||||
},
|
||||
{
|
||||
"name": "libtiff-dos(17755)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17755"
|
||||
},
|
||||
{
|
||||
"name": "http://bugzilla.remotesensing.org/show_bug.cgi?id=111",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugzilla.remotesensing.org/show_bug.cgi?id=111"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2004-0818",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20041223 SHOUTcast remote format string vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=110382975516003&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20050219 exwormshoucast part of PTjob project: SHOUTcast v1.9.4 remote",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=110886444014745&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200501-04",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200501-04.xml"
|
||||
"name": "shoutcast-format-string(18669)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18669"
|
||||
},
|
||||
{
|
||||
"name": "12096",
|
||||
@ -78,9 +68,19 @@
|
||||
"url": "http://securitytracker.com/id?1012675"
|
||||
},
|
||||
{
|
||||
"name" : "shoutcast-format-string(18669)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18669"
|
||||
"name": "GLSA-200501-04",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200501-04.xml"
|
||||
},
|
||||
{
|
||||
"name": "20041223 SHOUTcast remote format string vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=110382975516003&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20050219 exwormshoucast part of PTjob project: SHOUTcast v1.9.4 remote",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=110886444014745&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/361300/2004-04-21/2004-04-27/0"
|
||||
},
|
||||
{
|
||||
"name": "10206",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/10206"
|
||||
},
|
||||
{
|
||||
"name": "http://www.waraxe.us/index.php?modname=sa&id=25",
|
||||
"refsource": "MISC",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "http://protector.warcenter.se/article-53--0-0.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://protector.warcenter.se/article-53--0-0.html"
|
||||
},
|
||||
{
|
||||
"name" : "10206",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/10206"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040121 [SuSE 9.0] possible symlink attacks in some scripts",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=107461582413923&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20040122 Re: [SuSE 9.0] possible symlink attacks in some scripts",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=107478920006258&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "9457",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/9457"
|
||||
"name": "20040121 [SuSE 9.0] possible symlink attacks in some scripts",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=107461582413923&w=2"
|
||||
},
|
||||
{
|
||||
"name": "1008781",
|
||||
@ -76,6 +71,11 @@
|
||||
"name": "suse-multiple-symlink-attack(14963)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14963"
|
||||
},
|
||||
{
|
||||
"name": "9457",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/9457"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm"
|
||||
"name": "netware-installation-file-disclosure(15600)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15600"
|
||||
},
|
||||
{
|
||||
"name": "9934",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/9934"
|
||||
},
|
||||
{
|
||||
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm"
|
||||
},
|
||||
{
|
||||
"name": "11188",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/11188"
|
||||
},
|
||||
{
|
||||
"name" : "netware-installation-file-disclosure(15600)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15600"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "SUSE-SA:2008:041",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "30694",
|
||||
"refsource": "BID",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2397"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2008:041",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "31429",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2008-2251",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,34 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBST02379",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=122479227205998&w=2"
|
||||
"name": "oval:org.mitre.oval:def:6010",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6010"
|
||||
},
|
||||
{
|
||||
"name": "win-kernel-system-calls-privilege-escalation(45542)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45542"
|
||||
},
|
||||
{
|
||||
"name": "SSRT080143",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=122479227205998&w=2"
|
||||
},
|
||||
{
|
||||
"name": "32247",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32247"
|
||||
},
|
||||
{
|
||||
"name": "MS08-061",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061"
|
||||
},
|
||||
{
|
||||
"name" : "TA08-288A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-288A.html"
|
||||
},
|
||||
{
|
||||
"name": "31653",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31653"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:6010",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6010"
|
||||
"name": "win-ms08kb954211-update(45544)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45544"
|
||||
},
|
||||
{
|
||||
"name": "HPSBST02379",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=122479227205998&w=2"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2812",
|
||||
@ -93,19 +103,9 @@
|
||||
"url": "http://www.securitytracker.com/id?1021046"
|
||||
},
|
||||
{
|
||||
"name" : "32247",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32247"
|
||||
},
|
||||
{
|
||||
"name" : "win-kernel-system-calls-privilege-escalation(45542)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45542"
|
||||
},
|
||||
{
|
||||
"name" : "win-ms08kb954211-update(45544)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45544"
|
||||
"name": "TA08-288A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-288A.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "phpfix-browse-sql-injection(42636)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42636"
|
||||
},
|
||||
{
|
||||
"name": "20080526 phpFix v2 Multiple SQL Injection Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/492582/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "29371",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29371"
|
||||
},
|
||||
{
|
||||
"name": "30397",
|
||||
"refsource": "SECUNIA",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42637"
|
||||
},
|
||||
{
|
||||
"name" : "phpfix-browse-sql-injection(42636)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42636"
|
||||
"name": "29371",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29371"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080730 HIOX Random Ad 1.3 (hioxRandomAd.php hm) RFI Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/494927/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "6161",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6161"
|
||||
},
|
||||
{
|
||||
"name": "hioxrandomad-hm-file-include(44061)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44061"
|
||||
},
|
||||
{
|
||||
"name": "20080730 HIOX Random Ad 1.3 (hioxRandomAd.php hm) RFI Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/494927/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "30435",
|
||||
"refsource": "BID",
|
||||
@ -76,11 +81,6 @@
|
||||
"name": "4082",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4082"
|
||||
},
|
||||
{
|
||||
"name" : "hioxrandomad-hm-file-include(44061)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44061"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "flipscms-neu-sql-injection(44522)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44522"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securityfocus.com/bid/30712/exploit",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "30712",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30712"
|
||||
},
|
||||
{
|
||||
"name" : "flipscms-neu-sql-injection(44522)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44522"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081012 NewLife Blogger <= v3.0 / Insecure Cookie Handling & SQL Injection Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/497283/100/0/threaded"
|
||||
"name": "31728",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31728"
|
||||
},
|
||||
{
|
||||
"name": "32214",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32214"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2797",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2797"
|
||||
},
|
||||
{
|
||||
"name": "6739",
|
||||
@ -67,21 +77,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.pepelux.org/exploits/newlife-es.txt"
|
||||
},
|
||||
{
|
||||
"name" : "31728",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31728"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2797",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2797"
|
||||
},
|
||||
{
|
||||
"name" : "32214",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32214"
|
||||
},
|
||||
{
|
||||
"name": "newlifeblogger-nlbuserclass-sql-injection(45820)",
|
||||
"refsource": "XF",
|
||||
@ -91,6 +86,11 @@
|
||||
"name": "newlifeblogger-nlbuserclass-security-bypass(45821)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45821"
|
||||
},
|
||||
{
|
||||
"name": "20081012 NewLife Blogger <= v3.0 / Insecure Cookie Handling & SQL Injection Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/497283/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://freshmeat.net/projects/octopussy/releases/275561",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://freshmeat.net/projects/octopussy/releases/275561"
|
||||
},
|
||||
{
|
||||
"name": "48839",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/48839"
|
||||
},
|
||||
{
|
||||
"name": "http://freshmeat.net/projects/octopussy/releases/275561",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://freshmeat.net/projects/octopussy/releases/275561"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7306",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7306"
|
||||
},
|
||||
{
|
||||
"name": "32537",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32537"
|
||||
},
|
||||
{
|
||||
"name" : "32886",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32886"
|
||||
"name": "7306",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7306"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-3291",
|
||||
@ -76,6 +71,11 @@
|
||||
"name": "minimalablog-uploader-file-upload(46964)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46964"
|
||||
},
|
||||
{
|
||||
"name": "32886",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32886"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "krate-index-sql-injection(44670)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44670"
|
||||
},
|
||||
{
|
||||
"name": "6312",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -62,20 +67,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30842"
|
||||
},
|
||||
{
|
||||
"name" : "48338",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/48338"
|
||||
},
|
||||
{
|
||||
"name": "31548",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31548"
|
||||
},
|
||||
{
|
||||
"name" : "krate-index-sql-injection(44670)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44670"
|
||||
"name": "48338",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/48338"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/868705",
|
||||
"refsource": "MISC",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/gnome-exe-thumbnailer/gnome-exe-thumbnailer/commit/1d8e3102dd8fd23431ae6127d14a236da6b4a4a5"
|
||||
},
|
||||
{
|
||||
"name": "http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html"
|
||||
},
|
||||
{
|
||||
"name": "99922",
|
||||
"refsource": "BID",
|
||||
|
@ -54,9 +54,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11767",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11767"
|
||||
"name": "1039369",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039369"
|
||||
},
|
||||
{
|
||||
"name": "100838",
|
||||
@ -64,9 +64,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/100838"
|
||||
},
|
||||
{
|
||||
"name" : "1039369",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039369"
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11767",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11767"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://seclists.org/fulldisclosure/2018/Jan/17",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://seclists.org/fulldisclosure/2018/Jan/17"
|
||||
"name": "1040070",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040070"
|
||||
},
|
||||
{
|
||||
"name": "102363",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/102363"
|
||||
},
|
||||
{
|
||||
"name" : "1040070",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040070"
|
||||
"name": "http://seclists.org/fulldisclosure/2018/Jan/17",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://seclists.org/fulldisclosure/2018/Jan/17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html",
|
||||
"name": "https://wpvulndb.com/vulnerabilities/8930",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html"
|
||||
"url": "https://wpvulndb.com/vulnerabilities/8930"
|
||||
},
|
||||
{
|
||||
"name": "https://plugins.trac.wordpress.org/changeset/1745805/pootle-button/tags/",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/1745805/pootle-button/tags/"
|
||||
},
|
||||
{
|
||||
"name" : "https://wpvulndb.com/vulnerabilities/8930",
|
||||
"name": "https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://wpvulndb.com/vulnerabilities/8930"
|
||||
"url": "https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "43099",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/43099/"
|
||||
},
|
||||
{
|
||||
"name": "https://packetstormsecurity.com/files/144429/Article-Directory-Script-3.0-SQL-Injection.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://packetstormsecurity.com/files/144429/Article-Directory-Script-3.0-SQL-Injection.html"
|
||||
},
|
||||
{
|
||||
"name": "43099",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/43099/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1039812",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039812"
|
||||
},
|
||||
{
|
||||
"name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "DSA-4036",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2017/dsa-4036"
|
||||
},
|
||||
{
|
||||
"name" : "1039812",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039812"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.torproject.org/21534",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.torproject.org/21534"
|
||||
},
|
||||
{
|
||||
"name": "https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.torproject.org/24333",
|
||||
"refsource": "CONFIRM",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2/11/2018 18:32:45",
|
||||
"ID": "CVE-2018-1000093",
|
||||
"REQUESTER": "terrycwk1994@gmail.com",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "CryptoNote",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "version 0.8.9 and possibly later"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "CryptoNote"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Unauthenticated JSON RPC server"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -55,9 +55,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/amjuarez/bytecoin/issues/217",
|
||||
"name": "https://www.ayrx.me/cryptonote-unauthenticated-json-rpc",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://github.com/amjuarez/bytecoin/issues/217"
|
||||
"url": "https://www.ayrx.me/cryptonote-unauthenticated-json-rpc"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/cryptonotefoundation/cryptonote/issues/172",
|
||||
@ -65,9 +65,9 @@
|
||||
"url": "https://github.com/cryptonotefoundation/cryptonote/issues/172"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.ayrx.me/cryptonote-unauthenticated-json-rpc",
|
||||
"name": "https://github.com/amjuarez/bytecoin/issues/217",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://www.ayrx.me/cryptonote-unauthenticated-json-rpc"
|
||||
"url": "https://github.com/amjuarez/bytecoin/issues/217"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-09-03T16:07:16.974886",
|
||||
"DATE_REQUESTED": "2018-08-22T22:28:15",
|
||||
"ID": "CVE-2018-1000665",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Dojo Objective Harness (DOH)",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "prior to version 1.14"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Dojo"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Cross Site Scripting (XSS)"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20181112-0001/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "105841",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105841"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028",
|
||||
"refsource": "MISC",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -65,40 +65,35 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523"
|
||||
"name": "DSA-4324",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4324"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2018-26/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2018-26/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-27/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-27/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4324",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4324"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201811-04",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201811-04"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2018-27/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2018-27/"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:3005",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3005"
|
||||
},
|
||||
{
|
||||
"name": "105718",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105718"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:3006",
|
||||
"refsource": "REDHAT",
|
||||
@ -110,14 +105,19 @@
|
||||
"url": "https://usn.ubuntu.com/3801-1/"
|
||||
},
|
||||
{
|
||||
"name" : "105718",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/105718"
|
||||
"name": "[debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "1041944",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041944"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,35 +58,35 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2018/06/27/11"
|
||||
},
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20181112 [SECURITY] [DLA 1577-1] xen security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://xenbits.xen.org/xsa/advisory-265.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://xenbits.xen.org/xsa/advisory-265.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1590979",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1590979"
|
||||
"name": "DSA-4236",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4236"
|
||||
},
|
||||
{
|
||||
"name": "https://support.citrix.com/article/CTX235748",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.citrix.com/article/CTX235748"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4236",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4236"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201810-06",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201810-06"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20181112 [SECURITY] [DLA 1577-1] xen security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1590979",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590979"
|
||||
},
|
||||
{
|
||||
"name": "http://xenbits.xen.org/xsa/advisory-265.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://xenbits.xen.org/xsa/advisory-265.html"
|
||||
},
|
||||
{
|
||||
"name": "104572",
|
||||
"refsource": "BID",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/hentaisolo",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/hentaisolo"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-13277",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md"
|
||||
},
|
||||
{
|
||||
"name": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "45916",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/45916/"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT208848",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT208848"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT208849",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT208849"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208850",
|
||||
"refsource": "CONFIRM",
|
||||
@ -81,6 +66,21 @@
|
||||
"name": "1041027",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041027"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208848",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT208848"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208849",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT208849"
|
||||
},
|
||||
{
|
||||
"name": "45916",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45916/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2019/9xxx/CVE-2019-9856.json
Normal file
18
2019/9xxx/CVE-2019-9856.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-9856",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user