"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:44:12 +00:00
parent 263d20b368
commit da65f348cd
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 3088 additions and 3137 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-0115",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "HPSBST02320",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
},
{
"name" : "SSRT080028",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
},
{
"name" : "MS08-014",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014"
"name": "28167",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28167"
},
{
"name": "TA08-071A",
@ -73,20 +63,30 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA08-071A.html"
},
{
"name" : "28167",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28167"
"name": "oval:org.mitre.oval:def:5512",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5512"
},
{
"name": "MS08-014",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014"
},
{
"name": "SSRT080028",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
},
{
"name": "HPSBST02320",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
},
{
"name": "ADV-2008-0846",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0846/references"
},
{
"name" : "oval:org.mitre.oval:def:5512",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5512"
},
{
"name": "1019585",
"refsource": "SECTRACK",

View File

@ -53,30 +53,20 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html"
},
{
"name" : "HPSBMA02133",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
},
{
"name" : "SSRT061201",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
},
{
"name" : "TA08-017A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
"name": "1019218",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019218"
},
{
"name": "27229",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27229"
},
{
"name": "TA08-017A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
},
{
"name": "ADV-2008-0150",
"refsource": "VUPEN",
@ -88,19 +78,29 @@
"url": "http://www.vupen.com/english/advisories/2008/0180"
},
{
"name" : "1019218",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019218"
"name": "SSRT061201",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
},
{
"name" : "28518",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28518"
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html"
},
{
"name": "HPSBMA02133",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
},
{
"name": "28556",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28556"
},
{
"name": "28518",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28518"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "clansphere-index-xss(41190)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41190"
},
{
"name": "28224",
"refsource": "BID",
@ -61,11 +66,6 @@
"name": "29534",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29534"
},
{
"name" : "clansphere-index-xss(41190)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41190"
}
]
}

View File

@ -57,25 +57,25 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5260"
},
{
"name" : "http://irk4z.wordpress.com/2008/03/15/fuzzylime-cms-301-remote-file-inclusion-vulnerability/",
"refsource" : "MISC",
"url" : "http://irk4z.wordpress.com/2008/03/15/fuzzylime-cms-301-remote-file-inclusion-vulnerability/"
},
{
"name": "ADV-2008-0912",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0912/references"
},
{
"name" : "29417",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29417"
"name": "http://irk4z.wordpress.com/2008/03/15/fuzzylime-cms-301-remote-file-inclusion-vulnerability/",
"refsource": "MISC",
"url": "http://irk4z.wordpress.com/2008/03/15/fuzzylime-cms-301-remote-file-inclusion-vulnerability/"
},
{
"name": "fuzzylime-display-file-include(41221)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41221"
},
{
"name": "29417",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29417"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476321"
},
{
"name" : "28805",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28805"
},
{
"name": "29832",
"refsource": "SECUNIA",
@ -71,6 +66,11 @@
"name": "cecilia-locatecsound-symlink(41837)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41837"
},
{
"name": "28805",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28805"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.opera.com/support/search/view/907/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/support/search/view/907/"
},
{
"name" : "GLSA-200811-01",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200811-01.xml"
},
{
"name" : "SUSE-SR:2008:023",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html"
},
{
"name" : "31991",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31991"
"name": "32538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32538"
},
{
"name": "1021127",
@ -78,14 +63,29 @@
"url": "http://www.securitytracker.com/id?1021127"
},
{
"name" : "32538",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32538"
"name": "SUSE-SR:2008:023",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html"
},
{
"name": "http://www.opera.com/support/search/view/907/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/support/search/view/907/"
},
{
"name": "opera-linkspanel-xss(46220)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46220"
},
{
"name": "31991",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31991"
},
{
"name": "GLSA-200811-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=646897",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=646897"
},
{
"name": "32843",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32843"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=646897",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=646897"
},
{
"name": "33161",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2221",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130630 Re: CVE request: Multiple issues in GNU ZRTPCPP",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2013/q2/638"
},
{
"name" : "http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html",
"refsource" : "MISC",
"url" : "http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html"
"name": "openSUSE-SU-2013:1600",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00053.html"
},
{
"name": "https://github.com/wernerd/ZRTPCPP/commit/4654f330317c9948bb61d138eb24d49690ca4637",
@ -68,9 +63,14 @@
"url": "https://github.com/wernerd/ZRTPCPP/commit/4654f330317c9948bb61d138eb24d49690ca4637"
},
{
"name" : "GLSA-201309-13",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201309-13.xml"
"name": "http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html",
"refsource": "MISC",
"url": "http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html"
},
{
"name": "54998",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54998"
},
{
"name": "openSUSE-SU-2013:1599",
@ -78,19 +78,19 @@
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00052.html"
},
{
"name" : "openSUSE-SU-2013:1600",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-10/msg00053.html"
"name": "GLSA-201309-13",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201309-13.xml"
},
{
"name": "[oss-security] 20130630 Re: CVE request: Multiple issues in GNU ZRTPCPP",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q2/638"
},
{
"name": "53818",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53818"
},
{
"name" : "54998",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54998"
}
]
}

View File

@ -57,25 +57,25 @@
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Mar/123"
},
{
"name" : "[oss-security] 20130319 Fwd: CVE requests",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/03/19/9"
},
{
"name": "http://packetstormsecurity.com/files/120777/Ruby-Gem-Minimagic-Command-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/120777/Ruby-Gem-Minimagic-Command-Execution.html"
},
{
"name": "91231",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/91231"
},
{
"name": "58448",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/58448"
},
{
"name" : "91231",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/91231"
"name": "[oss-security] 20130319 Fwd: CVE requests",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/19/9"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4234",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130809 Re: CVE Request - LibModPlug <=0.8.8.4 multiple heap overflow",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/08/10/3"
"name": "DSA-2751",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2751"
},
{
"name": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/",
@ -63,20 +63,20 @@
"url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
},
{
"name" : "DSA-2751",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2751"
"name": "54388",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54388"
},
{
"name": "[oss-security] 20130809 Re: CVE Request - LibModPlug <=0.8.8.4 multiple heap overflow",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
},
{
"name": "61714",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61714"
},
{
"name" : "54388",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54388"
},
{
"name": "54695",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4294",
"STATE": "PUBLIC"
},
@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "97237",
"refsource": "OSVDB",
"url": "http://osvdb.org/97237"
},
{
"name": "USN-2002-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2002-1"
},
{
"name": "54706",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54706"
},
{
"name": "[oss-security] 20130911 [OSSA 2013-025] Token revocation failure using Keystone memcache/KVS backends (CVE-2013-4294)",
"refsource": "MLIST",
@ -66,21 +81,6 @@
"name": "RHSA-2013:1285",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1285.html"
},
{
"name" : "USN-2002-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2002-1"
},
{
"name" : "97237",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/97237"
},
{
"name" : "54706",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54706"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4321",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2013-4801",
"STATE": "PUBLIC"
},
@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "HPSBGN02905",
"refsource" : "HP",
"url" : "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03862772"
},
{
"name": "SSRT101085",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03862772"
},
{
"name" : "61445",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/61445"
"name": "hp-loadrunner-cve20134801-code-exec(85961)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85961"
},
{
"name": "95645",
@ -73,9 +68,14 @@
"url": "http://osvdb.org/95645"
},
{
"name" : "hp-loadrunner-cve20134801-code-exec(85961)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85961"
"name": "HPSBGN02905",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03862772"
},
{
"name": "61445",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61445"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2013-6218",
"STATE": "PUBLIC"
},
@ -53,12 +53,12 @@
"references": {
"reference_data": [
{
"name" : "HPSBMU02996",
"name": "SSRT101374",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04026039"
},
{
"name" : "SSRT101374",
"name": "HPSBMU02996",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04026039"
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "29544",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/29544"
},
{
"name": "http://www.senseofsecurity.com.au/advisories/SOS-13-003",
"refsource": "MISC",
@ -68,24 +63,29 @@
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10560"
},
{
"name" : "62305",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/62305"
},
{
"name" : "1029016",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029016"
"name": "29544",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/29544"
},
{
"name": "54731",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54731"
},
{
"name": "62305",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/62305"
},
{
"name": "juniper-port-command-execution(87011)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87011"
},
{
"name": "1029016",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029016"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-6953",
"STATE": "PUBLIC"
},

View File

@ -58,9 +58,14 @@
"references": {
"reference_data": [
{
"name" : "43103",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/43103/"
"name": "101328",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101328"
},
{
"name": "RHSA-2017:3267",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3267"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
@ -68,9 +73,14 @@
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20171019-0001/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20171019-0001/"
"name": "1039596",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039596"
},
{
"name": "43103",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43103/"
},
{
"name": "GLSA-201710-31",
@ -82,30 +92,20 @@
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3264"
},
{
"name" : "RHSA-2017:3267",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3267"
},
{
"name" : "RHSA-2017:2999",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2999"
},
{
"name": "RHSA-2017:3453",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3453"
},
{
"name" : "101328",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101328"
"name": "https://security.netapp.com/advisory/ntap-20171019-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
},
{
"name" : "1039596",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039596"
"name": "RHSA-2017:2999",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2999"
}
]
}

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03782en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03782en_us"
},
{
"name": "1039495",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039495"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03782en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03782en_us"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-17079",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,34 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://lkml.org/lkml/2017/12/5/982",
"refsource" : "MISC",
"url" : "https://lkml.org/lkml/2017/12/5/982"
},
{
"name" : "DSA-4073",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2017/dsa-4073"
},
{
"name" : "DSA-4082",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4082"
},
{
"name" : "SUSE-SU-2018:0011",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
},
{
"name" : "USN-3583-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3583-1/"
},
{
"name" : "USN-3583-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3583-2/"
"name": "102110",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102110"
},
{
"name": "USN-3617-1",
@ -88,9 +63,14 @@
"url": "https://usn.ubuntu.com/3617-1/"
},
{
"name" : "USN-3617-2",
"name": "USN-3619-2",
"refsource": "UBUNTU",
"url" : "https://usn.ubuntu.com/3617-2/"
"url": "https://usn.ubuntu.com/3619-2/"
},
{
"name": "DSA-4082",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4082"
},
{
"name": "USN-3617-3",
@ -98,14 +78,19 @@
"url": "https://usn.ubuntu.com/3617-3/"
},
{
"name" : "USN-3619-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3619-1/"
"name": "https://lkml.org/lkml/2017/12/5/982",
"refsource": "MISC",
"url": "https://lkml.org/lkml/2017/12/5/982"
},
{
"name" : "USN-3619-2",
"name": "USN-3583-2",
"refsource": "UBUNTU",
"url" : "https://usn.ubuntu.com/3619-2/"
"url": "https://usn.ubuntu.com/3583-2/"
},
{
"name": "SUSE-SU-2018:0011",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
},
{
"name": "USN-3632-1",
@ -113,9 +98,24 @@
"url": "https://usn.ubuntu.com/3632-1/"
},
{
"name" : "102110",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102110"
"name": "USN-3583-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3583-1/"
},
{
"name": "DSA-4073",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4073"
},
{
"name": "USN-3617-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3617-2/"
},
{
"name": "USN-3619-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3619-1/"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "43270",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/43270/"
},
{
"name": "https://packetstormsecurity.com/files/145295/Chartered-Accountant-Booking-Script-1.0-SQL-Injection.html",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/145295/Chartered-Accountant-Booking-Script-1.0-SQL-Injection.html"
},
{
"name": "43270",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43270/"
}
]
}

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "[www-announce] 20170918 CVE-2017-9803: Security vulnerability in kerberos delegation token functionality",
"refsource" : "MLIST",
"url" : "http://mail-archives.us.apache.org/mod_mbox/www-announce/201709.mbox/%3CCAOOKt53AOScg04zUh0%2BR_fcXD0C9s5mQ-OzdgYdnHz49u1KmXw@mail.gmail.com%3E"
},
{
"name": "100870",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100870"
},
{
"name": "[www-announce] 20170918 CVE-2017-9803: Security vulnerability in kerberos delegation token functionality",
"refsource": "MLIST",
"url": "http://mail-archives.us.apache.org/mod_mbox/www-announce/201709.mbox/%3CCAOOKt53AOScg04zUh0%2BR_fcXD0C9s5mQ-OzdgYdnHz49u1KmXw@mail.gmail.com%3E"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf1",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf1"
"name": "1040406",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040406"
},
{
"name": "103133",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/103133"
},
{
"name" : "1040406",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040406"
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf1",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf1"
}
]
}

View File

@ -57,16 +57,16 @@
"refsource": "MLIST",
"url": "https://mail.python.org/pipermail/mailman-announce/2018-June/000236.html"
},
{
"name" : "[debian-lts-announce] 20180724 [SECURITY] [DLA 1442-1] mailman security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html"
},
{
"name": "DSA-4246",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4246"
},
{
"name": "[debian-lts-announce] 20180724 [SECURITY] [DLA 1442-1] mailman security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html"
},
{
"name": "JVN#00846677",
"refsource": "JVN",

View File

@ -2,30 +2,7 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-18762",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
@ -34,33 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "SaltOS 3.1 r8126 allows CSRF."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://packetstormsecurity.com/files/150005/SaltOS-Erp-Crm-3.1-r8126-Database-Download.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/150005/SaltOS-Erp-Crm-3.1-r8126-Database-Download.html"
},
{
"refsource": "EXPLOIT-DB",
"name": "45734",
"url": "https://www.exploit-db.com/exploits/45734/"
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -83,9 +83,9 @@
"references": {
"reference_data": [
{
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10730699",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10730699"
"name": "ibm-websphere-cve20181797-file-write(149427)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/149427"
},
{
"name": "105982",
@ -98,9 +98,9 @@
"url": "http://www.securitytracker.com/id/1042146"
},
{
"name" : "ibm-websphere-cve20181797-file-write(149427)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/149427"
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10730699",
"refsource": "CONFIRM",
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10730699"
}
]
}