"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:47:01 +00:00
parent 88ee9bf0b6
commit e465c0f94d
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
49 changed files with 3456 additions and 3456 deletions

View File

@ -52,66 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080213 rPSA-2008-0063-1 boost",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488102/100/0/threaded"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=205955",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=205955"
},
{
"name" : "http://svn.boost.org/trac/boost/changeset/42674",
"refsource" : "CONFIRM",
"url" : "http://svn.boost.org/trac/boost/changeset/42674"
},
{
"name" : "http://svn.boost.org/trac/boost/changeset/42745",
"refsource" : "CONFIRM",
"url" : "http://svn.boost.org/trac/boost/changeset/42745"
},
{
"name" : "https://issues.rpath.com/browse/RPL-2143",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-2143"
},
{ {
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0063", "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0063",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0063" "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0063"
}, },
{
"name" : "FEDORA-2008-0880",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html"
},
{
"name" : "GLSA-200802-08",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml"
},
{
"name" : "MDVSA-2008:032",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032"
},
{
"name" : "SUSE-SR:2008:006",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
},
{
"name" : "USN-570-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-570-1"
},
{
"name" : "27325",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27325"
},
{ {
"name": "48099", "name": "48099",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -123,39 +68,94 @@
"url": "http://www.vupen.com/english/advisories/2008/0249" "url": "http://www.vupen.com/english/advisories/2008/0249"
}, },
{ {
"name" : "28545", "name": "27325",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/28545" "url": "http://www.securityfocus.com/bid/27325"
},
{
"name" : "28705",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28705"
},
{
"name" : "28511",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28511"
},
{
"name" : "28527",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28527"
},
{
"name" : "28943",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28943"
}, },
{ {
"name": "28860", "name": "28860",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28860" "url": "http://secunia.com/advisories/28860"
}, },
{
"name": "http://svn.boost.org/trac/boost/changeset/42745",
"refsource": "CONFIRM",
"url": "http://svn.boost.org/trac/boost/changeset/42745"
},
{
"name": "28943",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28943"
},
{
"name": "http://svn.boost.org/trac/boost/changeset/42674",
"refsource": "CONFIRM",
"url": "http://svn.boost.org/trac/boost/changeset/42674"
},
{
"name": "https://issues.rpath.com/browse/RPL-2143",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2143"
},
{
"name": "FEDORA-2008-0880",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html"
},
{
"name": "28511",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28511"
},
{
"name": "20080213 rPSA-2008-0063-1 boost",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488102/100/0/threaded"
},
{
"name": "28705",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28705"
},
{
"name": "28545",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28545"
},
{
"name": "SUSE-SR:2008:006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
},
{
"name": "GLSA-200802-08",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml"
},
{
"name": "28527",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28527"
},
{
"name": "USN-570-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-570-1"
},
{ {
"name": "29323", "name": "29323",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29323" "url": "http://secunia.com/advisories/29323"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=205955",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=205955"
},
{
"name": "MDVSA-2008:032",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://drupal.org/node/227608" "url": "http://drupal.org/node/227608"
}, },
{
"name" : "28026",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28026"
},
{ {
"name": "29118", "name": "29118",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29118" "url": "http://secunia.com/advisories/29118"
},
{
"name": "28026",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28026"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080305 Multiple vulnerabilities in Perforce Server 2007.3/143793",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/489179/100/0/threaded"
},
{
"name" : "http://aluigi.altervista.org/adv/perforces-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/perforces-adv.txt"
},
{ {
"name": "http://aluigi.org/poc/perforces.zip", "name": "http://aluigi.org/poc/perforces.zip",
"refsource": "MISC", "refsource": "MISC",
@ -72,11 +62,26 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/28108" "url": "http://www.securityfocus.com/bid/28108"
}, },
{
"name": "20080305 Multiple vulnerabilities in Perforce Server 2007.3/143793",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489179/100/0/threaded"
},
{ {
"name": "29231", "name": "29231",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29231" "url": "http://secunia.com/advisories/29231"
}, },
{
"name": "perforceserver-invalid-memory-dos(41016)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41016"
},
{
"name": "http://aluigi.altervista.org/adv/perforces-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/perforces-adv.txt"
},
{ {
"name": "3735", "name": "3735",
"refsource": "SREASON", "refsource": "SREASON",
@ -86,11 +91,6 @@
"name": "perforce-server-p4sexe-dos(41363)", "name": "perforce-server-p4sexe-dos(41363)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41363" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41363"
},
{
"name" : "perforceserver-invalid-memory-dos(41016)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41016"
} }
] ]
} }

View File

@ -53,44 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire", "name": "gpsdrive-geocode-symlink(44759)",
"refsource" : "MLIST", "refsource": "XF",
"url" : "http://www.openwall.com/lists/oss-security/2008/10/30/2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44759"
},
{
"name" : "http://uvw.ru/report.lenny.txt",
"refsource" : "MISC",
"url" : "http://uvw.ru/report.lenny.txt"
},
{
"name" : "http://bugs.debian.org/496436",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/496436"
},
{
"name" : "http://dev.gentoo.org/~rbu/security/debiantemp/gpsdrive-scripts",
"refsource" : "CONFIRM",
"url" : "http://dev.gentoo.org/~rbu/security/debiantemp/gpsdrive-scripts"
},
{
"name" : "https://bugs.gentoo.org/show_bug.cgi?id=235770",
"refsource" : "CONFIRM",
"url" : "https://bugs.gentoo.org/show_bug.cgi?id=235770"
}, },
{ {
"name": "FEDORA-2009-1366", "name": "FEDORA-2009-1366",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00187.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00187.html"
}, },
{
"name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
},
{
"name": "https://bugs.gentoo.org/show_bug.cgi?id=235770",
"refsource": "CONFIRM",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
},
{
"name": "http://bugs.debian.org/496436",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/496436"
},
{ {
"name": "30905", "name": "30905",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/30905" "url": "http://www.securityfocus.com/bid/30905"
}, },
{ {
"name" : "33825", "name": "http://uvw.ru/report.lenny.txt",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/33825" "url": "http://uvw.ru/report.lenny.txt"
},
{
"name": "http://dev.gentoo.org/~rbu/security/debiantemp/gpsdrive-scripts",
"refsource": "CONFIRM",
"url": "http://dev.gentoo.org/~rbu/security/debiantemp/gpsdrive-scripts"
}, },
{ {
"name": "31694", "name": "31694",
@ -98,9 +98,9 @@
"url": "http://secunia.com/advisories/31694" "url": "http://secunia.com/advisories/31694"
}, },
{ {
"name" : "gpsdrive-geocode-symlink(44759)", "name": "33825",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44759" "url": "http://secunia.com/advisories/33825"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-5012", "ID": "CVE-2008-5012",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,44 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20081118 Firefox cross-domain image theft (CESA-2008-009)", "name": "ADV-2008-3146",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/498468" "url": "http://www.vupen.com/english/advisories/2008/3146"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=355126",
"refsource" : "MISC",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=355126"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=451619",
"refsource" : "MISC",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=451619"
},
{
"name" : "http://scary.beasts.org/security/CESA-2008-009.html",
"refsource" : "MISC",
"url" : "http://scary.beasts.org/security/CESA-2008-009.html"
},
{
"name" : "http://scarybeastsecurity.blogspot.com/2008/11/firefox-cross-domain-image-theft-and.html",
"refsource" : "MISC",
"url" : "http://scarybeastsecurity.blogspot.com/2008/11/firefox-cross-domain-image-theft-and.html"
},
{
"name" : "http://www.mozilla.org/security/announce/2008/mfsa2008-48.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2008/mfsa2008-48.html"
},
{
"name" : "DSA-1669",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1669"
},
{
"name" : "DSA-1671",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1671"
}, },
{ {
"name": "DSA-1697", "name": "DSA-1697",
@ -98,54 +63,14 @@
"url": "http://www.debian.org/security/2009/dsa-1697" "url": "http://www.debian.org/security/2009/dsa-1697"
}, },
{ {
"name" : "DSA-1696", "name": "1021187",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021187"
},
{
"name": "DSA-1671",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1696" "url": "http://www.debian.org/security/2008/dsa-1671"
},
{
"name" : "FEDORA-2008-9667",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html"
},
{
"name" : "MDVSA-2008:228",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228"
},
{
"name" : "MDVSA-2008:235",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235"
},
{
"name" : "RHSA-2008:0977",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0977.html"
},
{
"name" : "RHSA-2008:0976",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0976.html"
},
{
"name" : "256408",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"
},
{
"name" : "SUSE-SA:2008:055",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html"
},
{
"name" : "USN-667-1",
"refsource" : "UBUNTU",
"url" : "http://ubuntu.com/usn/usn-667-1"
},
{
"name" : "TA08-319A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-319A.html"
}, },
{ {
"name": "32281", "name": "32281",
@ -153,34 +78,29 @@
"url": "http://www.securityfocus.com/bid/32281" "url": "http://www.securityfocus.com/bid/32281"
}, },
{ {
"name" : "32351", "name": "FEDORA-2008-9667",
"refsource" : "BID", "refsource": "FEDORA",
"url" : "http://www.securityfocus.com/bid/32351" "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:10750", "name": "RHSA-2008:0977",
"refsource" : "OVAL", "refsource": "REDHAT",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10750" "url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html"
}, },
{ {
"name" : "1021187", "name": "ADV-2009-0977",
"refsource" : "SECTRACK", "refsource": "VUPEN",
"url" : "http://www.securitytracker.com/id?1021187" "url": "http://www.vupen.com/english/advisories/2009/0977"
}, },
{ {
"name" : "34501", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=451619",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/34501" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=451619"
}, },
{ {
"name" : "32684", "name": "DSA-1669",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/32684" "url": "http://www.debian.org/security/2008/dsa-1669"
},
{
"name" : "32798",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32798"
}, },
{ {
"name": "32778", "name": "32778",
@ -188,54 +108,134 @@
"url": "http://secunia.com/advisories/32778" "url": "http://secunia.com/advisories/32778"
}, },
{ {
"name" : "32853", "name": "20081118 Firefox cross-domain image theft (CESA-2008-009)",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/32853" "url": "http://www.securityfocus.com/archive/1/498468"
}, },
{ {
"name" : "ADV-2008-3146", "name": "RHSA-2008:0976",
"refsource" : "VUPEN", "refsource": "REDHAT",
"url" : "http://www.vupen.com/english/advisories/2008/3146" "url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html"
}, },
{ {
"name" : "32845", "name": "32351",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/32845" "url": "http://www.securityfocus.com/bid/32351"
},
{
"name" : "32693",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32693"
},
{
"name" : "32694",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32694"
},
{
"name" : "32714",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32714"
},
{
"name" : "32715",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32715"
}, },
{ {
"name": "33433", "name": "33433",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33433" "url": "http://secunia.com/advisories/33433"
}, },
{
"name": "256408",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"
},
{
"name": "http://scary.beasts.org/security/CESA-2008-009.html",
"refsource": "MISC",
"url": "http://scary.beasts.org/security/CESA-2008-009.html"
},
{
"name": "SUSE-SA:2008:055",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html"
},
{
"name": "32694",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32694"
},
{
"name": "TA08-319A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html"
},
{
"name": "32853",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32853"
},
{
"name": "DSA-1696",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1696"
},
{
"name": "oval:org.mitre.oval:def:10750",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10750"
},
{
"name": "http://www.mozilla.org/security/announce/2008/mfsa2008-48.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2008/mfsa2008-48.html"
},
{
"name": "32715",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32715"
},
{
"name": "32693",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32693"
},
{
"name": "http://scarybeastsecurity.blogspot.com/2008/11/firefox-cross-domain-image-theft-and.html",
"refsource": "MISC",
"url": "http://scarybeastsecurity.blogspot.com/2008/11/firefox-cross-domain-image-theft-and.html"
},
{
"name": "MDVSA-2008:228",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228"
},
{
"name": "32845",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32845"
},
{
"name": "MDVSA-2008:235",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235"
},
{ {
"name": "33434", "name": "33434",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33434" "url": "http://secunia.com/advisories/33434"
}, },
{ {
"name" : "ADV-2009-0977", "name": "32798",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2009/0977" "url": "http://secunia.com/advisories/32798"
},
{
"name": "32684",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32684"
},
{
"name": "USN-667-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-667-1"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=355126",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=355126"
},
{
"name": "32714",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32714"
},
{
"name": "34501",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34501"
} }
] ]
} }

View File

@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014463"
},
{
"name" : "PK67282",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1PK67282"
},
{
"name" : "32679",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32679"
},
{
"name" : "ADV-2008-3370",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3370"
},
{ {
"name": "33022", "name": "33022",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +61,26 @@
"name": "websphere-usernametoken-unspecified(47136)", "name": "websphere-usernametoken-unspecified(47136)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47136" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47136"
},
{
"name": "ADV-2008-3370",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3370"
},
{
"name": "32679",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32679"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463"
},
{
"name": "PK67282",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK67282"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-5508", "ID": "CVE-2008-5508",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=425046", "name": "32882",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=425046" "url": "http://www.securityfocus.com/bid/32882"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=460803", "name": "33408",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=460803" "url": "http://secunia.com/advisories/33408"
},
{
"name" : "http://www.mozilla.org/security/announce/2008/mfsa2008-66.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2008/mfsa2008-66.html"
}, },
{ {
"name": "DSA-1697", "name": "DSA-1697",
@ -73,84 +68,9 @@
"url": "http://www.debian.org/security/2009/dsa-1697" "url": "http://www.debian.org/security/2009/dsa-1697"
}, },
{ {
"name" : "DSA-1704", "name": "mozilla-urlparsing-weak-security(47414)",
"refsource" : "DEBIAN", "refsource": "XF",
"url" : "http://www.debian.org/security/2009/dsa-1704" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47414"
},
{
"name" : "DSA-1707",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1707"
},
{
"name" : "DSA-1696",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1696"
},
{
"name" : "MDVSA-2008:245",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"
},
{
"name" : "MDVSA-2009:012",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"
},
{
"name" : "MDVSA-2008:244",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"
},
{
"name" : "RHSA-2008:1036",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-1036.html"
},
{
"name" : "RHSA-2008:1037",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-1037.html"
},
{
"name" : "RHSA-2009:0002",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0002.html"
},
{
"name" : "256408",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"
},
{
"name" : "258748",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"
},
{
"name" : "USN-690-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/690-1/"
},
{
"name" : "USN-690-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-690-2"
},
{
"name" : "USN-701-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-701-1"
},
{
"name" : "USN-701-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-701-2"
},
{
"name" : "32882",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32882"
}, },
{ {
"name": "oval:org.mitre.oval:def:11040", "name": "oval:org.mitre.oval:def:11040",
@ -162,56 +82,6 @@
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021426" "url": "http://www.securitytracker.com/id?1021426"
}, },
{
"name" : "33231",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33231"
},
{
"name" : "33433",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33433"
},
{
"name" : "33216",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33216"
},
{
"name" : "33523",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33523"
},
{
"name" : "33547",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33547"
},
{
"name" : "33184",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33184"
},
{
"name" : "33188",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33188"
},
{
"name" : "33189",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33189"
},
{
"name" : "33203",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33203"
},
{
"name" : "33204",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33204"
},
{ {
"name": "33205", "name": "33205",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -223,29 +93,9 @@
"url": "http://secunia.com/advisories/33421" "url": "http://secunia.com/advisories/33421"
}, },
{ {
"name" : "33434", "name": "RHSA-2008:1036",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/33434" "url": "http://www.redhat.com/support/errata/RHSA-2008-1036.html"
},
{
"name" : "34501",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34501"
},
{
"name" : "35080",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35080"
},
{
"name" : "33408",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33408"
},
{
"name" : "33415",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33415"
}, },
{ {
"name": "ADV-2009-0977", "name": "ADV-2009-0977",
@ -253,9 +103,159 @@
"url": "http://www.vupen.com/english/advisories/2009/0977" "url": "http://www.vupen.com/english/advisories/2009/0977"
}, },
{ {
"name" : "mozilla-urlparsing-weak-security(47414)", "name": "USN-690-2",
"refsource" : "XF", "refsource": "UBUNTU",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47414" "url": "http://www.ubuntu.com/usn/usn-690-2"
},
{
"name": "http://www.mozilla.org/security/announce/2008/mfsa2008-66.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2008/mfsa2008-66.html"
},
{
"name": "USN-701-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-701-1"
},
{
"name": "33231",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33231"
},
{
"name": "MDVSA-2008:245",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"
},
{
"name": "USN-690-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/690-1/"
},
{
"name": "MDVSA-2009:012",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"
},
{
"name": "33203",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33203"
},
{
"name": "33433",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33433"
},
{
"name": "DSA-1707",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1707"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=425046",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=425046"
},
{
"name": "33216",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33216"
},
{
"name": "256408",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"
},
{
"name": "RHSA-2008:1037",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-1037.html"
},
{
"name": "DSA-1704",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1704"
},
{
"name": "DSA-1696",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1696"
},
{
"name": "33204",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33204"
},
{
"name": "USN-701-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-701-2"
},
{
"name": "33184",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33184"
},
{
"name": "RHSA-2009:0002",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0002.html"
},
{
"name": "258748",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"
},
{
"name": "MDVSA-2008:244",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=460803",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=460803"
},
{
"name": "33415",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33415"
},
{
"name": "33188",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33188"
},
{
"name": "33523",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33523"
},
{
"name": "35080",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35080"
},
{
"name": "33547",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33547"
},
{
"name": "33434",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33434"
},
{
"name": "33189",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33189"
},
{
"name": "34501",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34501"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20081219 SEC Consult SA-20081219-0 :: Fujitsu-Siemens WebTransactionsremote command injection vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/499417/100/0/threaded"
},
{ {
"name": "http://www.sec-consult.com/files/20081219-0_fujitsu-siemens_webta_cmdexec.txt", "name": "http://www.sec-consult.com/files/20081219-0_fujitsu-siemens_webta_cmdexec.txt",
"refsource": "MISC", "refsource": "MISC",
@ -68,34 +63,39 @@
"url": "http://bs2www.fujitsu-siemens.de/update/securitypatch.htm#english" "url": "http://bs2www.fujitsu-siemens.de/update/securitypatch.htm#english"
}, },
{ {
"name" : "32927", "name": "webtransactions-wbpublish-command-injection(47495)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/32927" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47495"
},
{
"name" : "ADV-2008-3462",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3462"
}, },
{ {
"name": "1021475", "name": "1021475",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021475" "url": "http://www.securitytracker.com/id?1021475"
}, },
{
"name" : "33168",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33168"
},
{ {
"name": "4856", "name": "4856",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4856" "url": "http://securityreason.com/securityalert/4856"
}, },
{ {
"name" : "webtransactions-wbpublish-command-injection(47495)", "name": "ADV-2008-3462",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47495" "url": "http://www.vupen.com/english/advisories/2008/3462"
},
{
"name": "32927",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32927"
},
{
"name": "20081219 SEC Consult SA-20081219-0 :: Fujitsu-Siemens WebTransactionsremote command injection vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499417/100/0/threaded"
},
{
"name": "33168",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33168"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/c8c499175f7d295ef867335bceb9a76a2c3cdc38",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/c8c499175f7d295ef867335bceb9a76a2c3cdc38"
},
{
"name": "USN-1837-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1837-1"
},
{ {
"name": "[linux-kernel] 20130414 Linux 3.9-rc7", "name": "[linux-kernel] 20130414 Linux 3.9-rc7",
"refsource": "MLIST", "refsource": "MLIST",
@ -62,25 +72,15 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/14/3" "url": "http://www.openwall.com/lists/oss-security/2013/04/14/3"
}, },
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c8c499175f7d295ef867335bceb9a76a2c3cdc38",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c8c499175f7d295ef867335bceb9a76a2c3cdc38"
},
{
"name" : "https://github.com/torvalds/linux/commit/c8c499175f7d295ef867335bceb9a76a2c3cdc38",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/c8c499175f7d295ef867335bceb9a76a2c3cdc38"
},
{ {
"name": "openSUSE-SU-2013:1971", "name": "openSUSE-SU-2013:1971",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html"
}, },
{ {
"name" : "USN-1837-1", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c8c499175f7d295ef867335bceb9a76a2c3cdc38",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-1837-1" "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c8c499175f7d295ef867335bceb9a76a2c3cdc38"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.com/files/121290/Todoo-Forum-2.0-Cross-Site-Scripting-SQL-Injection.html", "name": "92319",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://packetstormsecurity.com/files/121290/Todoo-Forum-2.0-Cross-Site-Scripting-SQL-Injection.html" "url": "http://osvdb.org/92319"
}, },
{ {
"name": "59069", "name": "59069",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/59069" "url": "http://www.securityfocus.com/bid/59069"
}, },
{
"name" : "92319",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/92319"
},
{ {
"name": "todooforum-todooforum-idpost-pg-xss(83600)", "name": "todooforum-todooforum-idpost-pg-xss(83600)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83600" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83600"
},
{
"name": "http://packetstormsecurity.com/files/121290/Todoo-Forum-2.0-Cross-Site-Scripting-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/121290/Todoo-Forum-2.0-Cross-Site-Scripting-SQL-Injection.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3906", "ID": "CVE-2013-3906",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "MS13-096",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-096"
},
{ {
"name": "30011", "name": "30011",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/30011" "url": "http://www.exploit-db.com/exploits/30011"
}, },
{
"name" : "http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting-microsoft-office-2",
"refsource" : "MISC",
"url" : "http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting-microsoft-office-2"
},
{
"name" : "http://blogs.technet.com/b/srd/archive/2013/11/05/cve-2013-3906-a-graphics-vulnerability-exploited-through-word-documents.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.technet.com/b/srd/archive/2013/11/05/cve-2013-3906-a-graphics-vulnerability-exploited-through-word-documents.aspx"
},
{ {
"name": "http://technet.microsoft.com/security/advisory/2896666", "name": "http://technet.microsoft.com/security/advisory/2896666",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://technet.microsoft.com/security/advisory/2896666" "url": "http://technet.microsoft.com/security/advisory/2896666"
}, },
{ {
"name" : "MS13-096", "name": "http://blogs.technet.com/b/srd/archive/2013/11/05/cve-2013-3906-a-graphics-vulnerability-exploited-through-word-documents.aspx",
"refsource" : "MS", "refsource": "CONFIRM",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-096" "url": "http://blogs.technet.com/b/srd/archive/2013/11/05/cve-2013-3906-a-graphics-vulnerability-exploited-through-word-documents.aspx"
},
{
"name": "http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting-microsoft-office-2",
"refsource": "MISC",
"url": "http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting-microsoft-office-2"
} }
] ]
} }

View File

@ -53,9 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "26136", "name": "94141",
"refsource" : "EXPLOIT-DB", "refsource": "OSVDB",
"url" : "http://www.exploit-db.com/exploits/26136" "url": "http://osvdb.org/94141"
},
{
"name": "60481",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/60481"
},
{
"name": "http://www.webera.fr/advisory-02-php-agenda-isql-exploit",
"refsource": "MISC",
"url": "http://www.webera.fr/advisory-02-php-agenda-isql-exploit"
},
{
"name": "simplephp-cve20133961-eventid-sql-injection(84938)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84938"
}, },
{ {
"name": "20130611 [CVE-2013-3961] iSQL in php-agenda <= 2.2.8", "name": "20130611 [CVE-2013-3961] iSQL in php-agenda <= 2.2.8",
@ -68,24 +83,9 @@
"url": "http://packetstormsecurity.com/files/121978/Simple-PHP-Agenda-2.2.8-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/121978/Simple-PHP-Agenda-2.2.8-SQL-Injection.html"
}, },
{ {
"name" : "http://www.webera.fr/advisory-02-php-agenda-isql-exploit", "name": "26136",
"refsource" : "MISC", "refsource": "EXPLOIT-DB",
"url" : "http://www.webera.fr/advisory-02-php-agenda-isql-exploit" "url": "http://www.exploit-db.com/exploits/26136"
},
{
"name" : "60481",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/60481"
},
{
"name" : "94141",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/94141"
},
{
"name" : "simplephp-cve20133961-eventid-sql-injection(84938)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/84938"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-4019", "ID": "CVE-2013-4019",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21651085", "name": "55070",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21651085" "url": "http://secunia.com/advisories/55070"
},
{
"name": "maximo-cve20134019-xss(85796)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85796"
}, },
{ {
"name": "IV42664", "name": "IV42664",
@ -68,14 +73,9 @@
"url": "http://secunia.com/advisories/55068" "url": "http://secunia.com/advisories/55068"
}, },
{ {
"name" : "55070", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21651085",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/55070" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21651085"
},
{
"name" : "maximo-cve20134019-xss(85796)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85796"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4293", "ID": "CVE-2013-4293",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4474", "ID": "CVE-2013-4474",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20131028 Re: CVE request: 3 vulnerabilities in poppler and 1 in Xpdf",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/10/29/1"
},
{ {
"name": "http://bugs.debian.org/723124", "name": "http://bugs.debian.org/723124",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -68,29 +63,34 @@
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75" "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75"
}, },
{ {
"name" : "https://bugs.freedesktop.org/show_bug.cgi?id=69434", "name": "56567",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugs.freedesktop.org/show_bug.cgi?id=69434" "url": "http://secunia.com/advisories/56567"
}, },
{ {
"name": "GLSA-201401-21", "name": "GLSA-201401-21",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201401-21.xml" "url": "http://security.gentoo.org/glsa/glsa-201401-21.xml"
}, },
{
"name" : "USN-2958-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2958-1"
},
{ {
"name": "63374", "name": "63374",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/63374" "url": "http://www.securityfocus.com/bid/63374"
}, },
{ {
"name" : "56567", "name": "https://bugs.freedesktop.org/show_bug.cgi?id=69434",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/56567" "url": "https://bugs.freedesktop.org/show_bug.cgi?id=69434"
},
{
"name": "USN-2958-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2958-1"
},
{
"name": "[oss-security] 20131028 Re: CVE request: 3 vulnerabilities in poppler and 1 in Xpdf",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/10/29/1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4496", "ID": "CVE-2013-4496",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,95 +52,95 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.samba.org/samba/history/samba-3.6.23.html",
"refsource" : "CONFIRM",
"url" : "http://www.samba.org/samba/history/samba-3.6.23.html"
},
{
"name" : "http://www.samba.org/samba/history/samba-4.0.16.html",
"refsource" : "CONFIRM",
"url" : "http://www.samba.org/samba/history/samba-4.0.16.html"
},
{ {
"name": "http://www.samba.org/samba/history/samba-4.1.6.html", "name": "http://www.samba.org/samba/history/samba-4.1.6.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.samba.org/samba/history/samba-4.1.6.html" "url": "http://www.samba.org/samba/history/samba-4.1.6.html"
}, },
{
"name" : "http://www.samba.org/samba/security/CVE-2013-4496",
"refsource" : "CONFIRM",
"url" : "http://www.samba.org/samba/security/CVE-2013-4496"
},
{
"name" : "https://bugzilla.samba.org/show_bug.cgi?id=10245",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.samba.org/show_bug.cgi?id=10245"
},
{
"name" : "http://advisories.mageia.org/MGASA-2014-0138.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2014-0138.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
},
{ {
"name": "FEDORA-2014-9132", "name": "FEDORA-2014-9132",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
}, },
{ {
"name" : "FEDORA-2014-7672", "name": "https://bugzilla.samba.org/show_bug.cgi?id=10245",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" "url": "https://bugzilla.samba.org/show_bug.cgi?id=10245"
}, },
{ {
"name" : "GLSA-201502-15", "name": "http://www.samba.org/samba/security/CVE-2013-4496",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "http://security.gentoo.org/glsa/glsa-201502-15.xml" "url": "http://www.samba.org/samba/security/CVE-2013-4496"
}, },
{ {
"name" : "MDVSA-2015:082", "name": "http://advisories.mageia.org/MGASA-2014-0138.html",
"refsource" : "MANDRIVA", "refsource": "CONFIRM",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" "url": "http://advisories.mageia.org/MGASA-2014-0138.html"
}, },
{ {
"name" : "RHSA-2014:0330", "name": "http://www.samba.org/samba/history/samba-4.0.16.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0330.html" "url": "http://www.samba.org/samba/history/samba-4.0.16.html"
},
{
"name" : "openSUSE-SU-2014:0404",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html"
}, },
{ {
"name": "openSUSE-SU-2014:0405", "name": "openSUSE-SU-2014:0405",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html"
}, },
{
"name": "GLSA-201502-15",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
},
{
"name": "FEDORA-2014-7672",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
},
{
"name": "MDVSA-2015:082",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
},
{ {
"name": "openSUSE-SU-2016:1106", "name": "openSUSE-SU-2016:1106",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
}, },
{
"name": "openSUSE-SU-2014:0404",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
},
{ {
"name": "openSUSE-SU-2016:1107", "name": "openSUSE-SU-2016:1107",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
}, },
{
"name": "66336",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66336"
},
{
"name": "RHSA-2014:0330",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0330.html"
},
{ {
"name": "USN-2156-1", "name": "USN-2156-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2156-1" "url": "http://www.ubuntu.com/usn/USN-2156-1"
}, },
{ {
"name" : "66336", "name": "http://www.samba.org/samba/history/samba-3.6.23.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/66336" "url": "http://www.samba.org/samba/history/samba-3.6.23.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://service.real.com/realplayer/security/08232013_player/en/",
"refsource" : "CONFIRM",
"url" : "http://service.real.com/realplayer/security/08232013_player/en/"
},
{ {
"name": "61990", "name": "61990",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/61990" "url": "http://www.securityfocus.com/bid/61990"
},
{
"name": "http://service.real.com/realplayer/security/08232013_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6154", "ID": "CVE-2013-6154",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6452", "ID": "CVE-2013-6452",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6567", "ID": "CVE-2013-6567",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "opsview-unspecified-xss(89934)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89934"
},
{ {
"name": "http://docs.opsview.com/doku.php?id=opsview4.4:changes", "name": "http://docs.opsview.com/doku.php?id=opsview4.4:changes",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "56096", "name": "56096",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56096" "url": "http://secunia.com/advisories/56096"
},
{
"name" : "opsview-unspecified-xss(89934)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/89934"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ampliasecurity.com/advisories/AMPLIA-ARA050913.txt",
"refsource" : "MISC",
"url" : "http://www.ampliasecurity.com/advisories/AMPLIA-ARA050913.txt"
},
{ {
"name": "http://www.ampliasecurity.com/advisories/nisuta-nswir150ne-nswir300n-wireless-router-remote-management-web-interface-authentication-bypass-vulnerability.html", "name": "http://www.ampliasecurity.com/advisories/nisuta-nswir150ne-nswir300n-wireless-router-remote-management-web-interface-authentication-bypass-vulnerability.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.ampliasecurity.com/advisories/nisuta-nswir150ne-nswir300n-wireless-router-remote-management-web-interface-authentication-bypass-vulnerability.html" "url": "http://www.ampliasecurity.com/advisories/nisuta-nswir150ne-nswir300n-wireless-router-remote-management-web-interface-authentication-bypass-vulnerability.html"
},
{
"name": "http://www.ampliasecurity.com/advisories/AMPLIA-ARA050913.txt",
"refsource": "MISC",
"url": "http://www.ampliasecurity.com/advisories/AMPLIA-ARA050913.txt"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "name": "1038941",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" "url": "http://www.securitytracker.com/id/1038941"
}, },
{ {
"name": "99714", "name": "99714",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/99714" "url": "http://www.securityfocus.com/bid/99714"
}, },
{ {
"name" : "1038941", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1038941" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
} }
] ]
} }

View File

@ -58,9 +58,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "name": "RHSA-2017:1791",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" "url": "https://access.redhat.com/errata/RHSA-2017:1791"
},
{
"name": "RHSA-2017:1790",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1790"
}, },
{ {
"name": "https://security.netapp.com/advisory/ntap-20170720-0001/", "name": "https://security.netapp.com/advisory/ntap-20170720-0001/",
@ -72,30 +77,25 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-4005" "url": "http://www.debian.org/security/2017/dsa-4005"
}, },
{
"name": "1038931",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038931"
},
{ {
"name": "GLSA-201709-22", "name": "GLSA-201709-22",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201709-22" "url": "https://security.gentoo.org/glsa/201709-22"
}, },
{
"name" : "RHSA-2017:1790",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1790"
},
{
"name" : "RHSA-2017:1791",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1791"
},
{ {
"name": "99726", "name": "99726",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/99726" "url": "http://www.securityfocus.com/bid/99726"
}, },
{ {
"name" : "1038931", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1038931" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://support.apple.com/HT208225",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208225"
},
{
"name": "https://support.apple.com/HT208222",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208222"
},
{ {
"name": "43167", "name": "43167",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -62,26 +72,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT208219" "url": "https://support.apple.com/HT208219"
}, },
{
"name" : "https://support.apple.com/HT208222",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208222"
},
{
"name" : "https://support.apple.com/HT208223",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208223"
},
{ {
"name": "https://support.apple.com/HT208224", "name": "https://support.apple.com/HT208224",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT208224" "url": "https://support.apple.com/HT208224"
}, },
{
"name" : "https://support.apple.com/HT208225",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208225"
},
{ {
"name": "GLSA-201712-01", "name": "GLSA-201712-01",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -91,6 +86,11 @@
"name": "1039703", "name": "1039703",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039703" "url": "http://www.securitytracker.com/id/1039703"
},
{
"name": "https://support.apple.com/HT208223",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208223"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c70422f760c120480fee4de6c38804c72aa26bc1",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c70422f760c120480fee4de6c38804c72aa26bc1"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1451386", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1451386",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1451386" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1451386"
}, },
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c70422f760c120480fee4de6c38804c72aa26bc1",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c70422f760c120480fee4de6c38804c72aa26bc1"
},
{ {
"name": "https://github.com/torvalds/linux/commit/c70422f760c120480fee4de6c38804c72aa26bc1", "name": "https://github.com/torvalds/linux/commit/c70422f760c120480fee4de6c38804c72aa26bc1",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -58,15 +58,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0912" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0912"
}, },
{
"name" : "103285",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/103285"
},
{ {
"name": "1040513", "name": "1040513",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040513" "url": "http://www.securitytracker.com/id/1040513"
},
{
"name": "103285",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103285"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://numanozdemir.com/ajenti-xss.txt",
"refsource": "MISC",
"url": "https://numanozdemir.com/ajenti-xss.txt"
},
{ {
"name": "45691", "name": "45691",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "http://packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-Scripting.html"
},
{
"name" : "https://numanozdemir.com/ajenti-xss.txt",
"refsource" : "MISC",
"url" : "https://numanozdemir.com/ajenti-xss.txt"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-19740", "ID": "CVE-2018-19740",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/Dec/20"
},
{ {
"name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html"
},
{
"name": "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Dec/20"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "anemec@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-1056", "ID": "CVE-2018-1056",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -62,35 +62,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20180213 [SECURITY] [DLA 1281-1] advancecomp security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/02/msg00016.html"
},
{ {
"name": "[debian-lts-announce] 20190302 [SECURITY] [DLA 1702-1] advancecomp security update", "name": "[debian-lts-announce] 20190302 [SECURITY] [DLA 1702-1] advancecomp security update",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00004.html" "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00004.html"
}, },
{
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889270",
"refsource" : "CONFIRM",
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889270"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1056", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1056",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1056" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1056"
}, },
{ {
"name" : "https://sourceforge.net/p/advancemame/bugs/259/", "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889270",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://sourceforge.net/p/advancemame/bugs/259/" "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889270"
}, },
{ {
"name": "USN-3570-1", "name": "USN-3570-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3570-1/" "url": "https://usn.ubuntu.com/3570-1/"
},
{
"name": "[debian-lts-announce] 20180213 [SECURITY] [DLA 1281-1] advancecomp security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00016.html"
},
{
"name": "https://sourceforge.net/p/advancemame/bugs/259/",
"refsource": "CONFIRM",
"url": "https://sourceforge.net/p/advancemame/bugs/259/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "secure@dell.com", "ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2018-09-18T04:00:00.000Z", "DATE_PUBLIC": "2018-09-18T04:00:00.000Z",
"ID": "CVE-2018-1250", "ID": "CVE-2018-1250",
"STATE": "PUBLIC" "STATE": "PUBLIC"