mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
263d20b368
commit
da65f348cd
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2008-0115",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBST02320",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT080028",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "MS08-014",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014"
|
||||
"name": "28167",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28167"
|
||||
},
|
||||
{
|
||||
"name": "TA08-071A",
|
||||
@ -73,20 +63,30 @@
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-071A.html"
|
||||
},
|
||||
{
|
||||
"name" : "28167",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28167"
|
||||
"name": "oval:org.mitre.oval:def:5512",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5512"
|
||||
},
|
||||
{
|
||||
"name": "MS08-014",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014"
|
||||
},
|
||||
{
|
||||
"name": "SSRT080028",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
|
||||
},
|
||||
{
|
||||
"name": "HPSBST02320",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0846",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0846/references"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:5512",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5512"
|
||||
},
|
||||
{
|
||||
"name": "1019585",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -53,30 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMA02133",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061201",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "TA08-017A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
|
||||
"name": "1019218",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1019218"
|
||||
},
|
||||
{
|
||||
"name": "27229",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27229"
|
||||
},
|
||||
{
|
||||
"name": "TA08-017A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0150",
|
||||
"refsource": "VUPEN",
|
||||
@ -88,19 +78,29 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0180"
|
||||
},
|
||||
{
|
||||
"name" : "1019218",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1019218"
|
||||
"name": "SSRT061201",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "28518",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28518"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMA02133",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||
},
|
||||
{
|
||||
"name": "28556",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28556"
|
||||
},
|
||||
{
|
||||
"name": "28518",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28518"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "clansphere-index-xss(41190)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41190"
|
||||
},
|
||||
{
|
||||
"name": "28224",
|
||||
"refsource": "BID",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "29534",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29534"
|
||||
},
|
||||
{
|
||||
"name" : "clansphere-index-xss(41190)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41190"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5260"
|
||||
},
|
||||
{
|
||||
"name" : "http://irk4z.wordpress.com/2008/03/15/fuzzylime-cms-301-remote-file-inclusion-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://irk4z.wordpress.com/2008/03/15/fuzzylime-cms-301-remote-file-inclusion-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0912",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0912/references"
|
||||
},
|
||||
{
|
||||
"name" : "29417",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29417"
|
||||
"name": "http://irk4z.wordpress.com/2008/03/15/fuzzylime-cms-301-remote-file-inclusion-vulnerability/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://irk4z.wordpress.com/2008/03/15/fuzzylime-cms-301-remote-file-inclusion-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name": "fuzzylime-display-file-include(41221)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41221"
|
||||
},
|
||||
{
|
||||
"name": "29417",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29417"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476321"
|
||||
},
|
||||
{
|
||||
"name" : "28805",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28805"
|
||||
},
|
||||
{
|
||||
"name": "29832",
|
||||
"refsource": "SECUNIA",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "cecilia-locatecsound-symlink(41837)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41837"
|
||||
},
|
||||
{
|
||||
"name": "28805",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28805"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.opera.com/support/search/view/907/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/support/search/view/907/"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200811-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200811-01.xml"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2008:023",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name" : "31991",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31991"
|
||||
"name": "32538",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32538"
|
||||
},
|
||||
{
|
||||
"name": "1021127",
|
||||
@ -78,14 +63,29 @@
|
||||
"url": "http://www.securitytracker.com/id?1021127"
|
||||
},
|
||||
{
|
||||
"name" : "32538",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32538"
|
||||
"name": "SUSE-SR:2008:023",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/support/search/view/907/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/support/search/view/907/"
|
||||
},
|
||||
{
|
||||
"name": "opera-linkspanel-xss(46220)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46220"
|
||||
},
|
||||
{
|
||||
"name": "31991",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31991"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200811-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=646897",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=646897"
|
||||
},
|
||||
{
|
||||
"name": "32843",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32843"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=646897",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=646897"
|
||||
},
|
||||
{
|
||||
"name": "33161",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-2221",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20130630 Re: CVE request: Multiple issues in GNU ZRTPCPP",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2013/q2/638"
|
||||
},
|
||||
{
|
||||
"name" : "http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html"
|
||||
"name": "openSUSE-SU-2013:1600",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00053.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/wernerd/ZRTPCPP/commit/4654f330317c9948bb61d138eb24d49690ca4637",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "https://github.com/wernerd/ZRTPCPP/commit/4654f330317c9948bb61d138eb24d49690ca4637"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201309-13",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201309-13.xml"
|
||||
"name": "http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html"
|
||||
},
|
||||
{
|
||||
"name": "54998",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/54998"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1599",
|
||||
@ -78,19 +78,19 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00052.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:1600",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-10/msg00053.html"
|
||||
"name": "GLSA-201309-13",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201309-13.xml"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130630 Re: CVE request: Multiple issues in GNU ZRTPCPP",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2013/q2/638"
|
||||
},
|
||||
{
|
||||
"name": "53818",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/53818"
|
||||
},
|
||||
{
|
||||
"name" : "54998",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/54998"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2013/Mar/123"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20130319 Fwd: CVE requests",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/03/19/9"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/120777/Ruby-Gem-Minimagic-Command-Execution.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/120777/Ruby-Gem-Minimagic-Command-Execution.html"
|
||||
},
|
||||
{
|
||||
"name": "91231",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/91231"
|
||||
},
|
||||
{
|
||||
"name": "58448",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/58448"
|
||||
},
|
||||
{
|
||||
"name" : "91231",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/91231"
|
||||
"name": "[oss-security] 20130319 Fwd: CVE requests",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/19/9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4234",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20130809 Re: CVE Request - LibModPlug <=0.8.8.4 multiple heap overflow",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/08/10/3"
|
||||
"name": "DSA-2751",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2751"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/",
|
||||
@ -63,20 +63,20 @@
|
||||
"url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2751",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2013/dsa-2751"
|
||||
"name": "54388",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/54388"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130809 Re: CVE Request - LibModPlug <=0.8.8.4 multiple heap overflow",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
|
||||
},
|
||||
{
|
||||
"name": "61714",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/61714"
|
||||
},
|
||||
{
|
||||
"name" : "54388",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/54388"
|
||||
},
|
||||
{
|
||||
"name": "54695",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4294",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "97237",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/97237"
|
||||
},
|
||||
{
|
||||
"name": "USN-2002-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2002-1"
|
||||
},
|
||||
{
|
||||
"name": "54706",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/54706"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130911 [OSSA 2013-025] Token revocation failure using Keystone memcache/KVS backends (CVE-2013-4294)",
|
||||
"refsource": "MLIST",
|
||||
@ -66,21 +81,6 @@
|
||||
"name": "RHSA-2013:1285",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1285.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2002-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2002-1"
|
||||
},
|
||||
{
|
||||
"name" : "97237",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/97237"
|
||||
},
|
||||
{
|
||||
"name" : "54706",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/54706"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4321",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2013-4801",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBGN02905",
|
||||
"refsource" : "HP",
|
||||
"url" : "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03862772"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101085",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03862772"
|
||||
},
|
||||
{
|
||||
"name" : "61445",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/61445"
|
||||
"name": "hp-loadrunner-cve20134801-code-exec(85961)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85961"
|
||||
},
|
||||
{
|
||||
"name": "95645",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://osvdb.org/95645"
|
||||
},
|
||||
{
|
||||
"name" : "hp-loadrunner-cve20134801-code-exec(85961)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85961"
|
||||
"name": "HPSBGN02905",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03862772"
|
||||
},
|
||||
{
|
||||
"name": "61445",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/61445"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2013-6218",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,12 +53,12 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBMU02996",
|
||||
"name": "SSRT101374",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04026039"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101374",
|
||||
"name": "HPSBMU02996",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04026039"
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "29544",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/29544"
|
||||
},
|
||||
{
|
||||
"name": "http://www.senseofsecurity.com.au/advisories/SOS-13-003",
|
||||
"refsource": "MISC",
|
||||
@ -68,24 +63,29 @@
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10560"
|
||||
},
|
||||
{
|
||||
"name" : "62305",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/62305"
|
||||
},
|
||||
{
|
||||
"name" : "1029016",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1029016"
|
||||
"name": "29544",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/29544"
|
||||
},
|
||||
{
|
||||
"name": "54731",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/54731"
|
||||
},
|
||||
{
|
||||
"name": "62305",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/62305"
|
||||
},
|
||||
{
|
||||
"name": "juniper-port-command-execution(87011)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87011"
|
||||
},
|
||||
{
|
||||
"name": "1029016",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029016"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2013-6953",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -58,9 +58,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "43103",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/43103/"
|
||||
"name": "101328",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101328"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:3267",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3267"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
@ -68,9 +73,14 @@
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://security.netapp.com/advisory/ntap-20171019-0001/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171019-0001/"
|
||||
"name": "1039596",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039596"
|
||||
},
|
||||
{
|
||||
"name": "43103",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/43103/"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201710-31",
|
||||
@ -82,30 +92,20 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3264"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:3267",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3267"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2999",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2999"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:3453",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3453"
|
||||
},
|
||||
{
|
||||
"name" : "101328",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/101328"
|
||||
"name": "https://security.netapp.com/advisory/ntap-20171019-0001/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
|
||||
},
|
||||
{
|
||||
"name" : "1039596",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039596"
|
||||
"name": "RHSA-2017:2999",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2999"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03782en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03782en_us"
|
||||
},
|
||||
{
|
||||
"name": "1039495",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039495"
|
||||
},
|
||||
{
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03782en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03782en_us"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-17079",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,34 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://lkml.org/lkml/2017/12/5/982",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://lkml.org/lkml/2017/12/5/982"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4073",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2017/dsa-4073"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4082",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4082"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2018:0011",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3583-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3583-1/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3583-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3583-2/"
|
||||
"name": "102110",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102110"
|
||||
},
|
||||
{
|
||||
"name": "USN-3617-1",
|
||||
@ -88,9 +63,14 @@
|
||||
"url": "https://usn.ubuntu.com/3617-1/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3617-2",
|
||||
"name": "USN-3619-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3617-2/"
|
||||
"url": "https://usn.ubuntu.com/3619-2/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4082",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4082"
|
||||
},
|
||||
{
|
||||
"name": "USN-3617-3",
|
||||
@ -98,14 +78,19 @@
|
||||
"url": "https://usn.ubuntu.com/3617-3/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3619-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3619-1/"
|
||||
"name": "https://lkml.org/lkml/2017/12/5/982",
|
||||
"refsource": "MISC",
|
||||
"url": "https://lkml.org/lkml/2017/12/5/982"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3619-2",
|
||||
"name": "USN-3583-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3619-2/"
|
||||
"url": "https://usn.ubuntu.com/3583-2/"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2018:0011",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-3632-1",
|
||||
@ -113,9 +98,24 @@
|
||||
"url": "https://usn.ubuntu.com/3632-1/"
|
||||
},
|
||||
{
|
||||
"name" : "102110",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/102110"
|
||||
"name": "USN-3583-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3583-1/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4073",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2017/dsa-4073"
|
||||
},
|
||||
{
|
||||
"name": "USN-3617-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3617-2/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3619-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3619-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "43270",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/43270/"
|
||||
},
|
||||
{
|
||||
"name": "https://packetstormsecurity.com/files/145295/Chartered-Accountant-Booking-Script-1.0-SQL-Injection.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://packetstormsecurity.com/files/145295/Chartered-Accountant-Booking-Script-1.0-SQL-Injection.html"
|
||||
},
|
||||
{
|
||||
"name": "43270",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/43270/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[www-announce] 20170918 CVE-2017-9803: Security vulnerability in kerberos delegation token functionality",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://mail-archives.us.apache.org/mod_mbox/www-announce/201709.mbox/%3CCAOOKt53AOScg04zUh0%2BR_fcXD0C9s5mQ-OzdgYdnHz49u1KmXw@mail.gmail.com%3E"
|
||||
},
|
||||
{
|
||||
"name": "100870",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/100870"
|
||||
},
|
||||
{
|
||||
"name": "[www-announce] 20170918 CVE-2017-9803: Security vulnerability in kerberos delegation token functionality",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://mail-archives.us.apache.org/mod_mbox/www-announce/201709.mbox/%3CCAOOKt53AOScg04zUh0%2BR_fcXD0C9s5mQ-OzdgYdnHz49u1KmXw@mail.gmail.com%3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf1"
|
||||
"name": "1040406",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040406"
|
||||
},
|
||||
{
|
||||
"name": "103133",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/103133"
|
||||
},
|
||||
{
|
||||
"name" : "1040406",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040406"
|
||||
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "https://mail.python.org/pipermail/mailman-announce/2018-June/000236.html"
|
||||
},
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180724 [SECURITY] [DLA 1442-1] mailman security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4246",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4246"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180724 [SECURITY] [DLA 1442-1] mailman security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html"
|
||||
},
|
||||
{
|
||||
"name": "JVN#00846677",
|
||||
"refsource": "JVN",
|
||||
|
@ -2,30 +2,7 @@
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2018-18762",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
@ -34,33 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "SaltOS 3.1 r8126 allows CSRF."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/150005/SaltOS-Erp-Crm-3.1-r8126-Database-Download.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/150005/SaltOS-Erp-Crm-3.1-r8126-Database-Download.html"
|
||||
},
|
||||
{
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"name": "45734",
|
||||
"url": "https://www.exploit-db.com/exploits/45734/"
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -83,9 +83,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10730699",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10730699"
|
||||
"name": "ibm-websphere-cve20181797-file-write(149427)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/149427"
|
||||
},
|
||||
{
|
||||
"name": "105982",
|
||||
@ -98,9 +98,9 @@
|
||||
"url": "http://www.securitytracker.com/id/1042146"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-websphere-cve20181797-file-write(149427)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/149427"
|
||||
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10730699",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10730699"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user