mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5333b1fb5d
commit
e9169ab025
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040524 SSH URI handler remote arbitrary code execution",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021871.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.insecure.ws/article.php?story=200405222251133",
|
||||
"refsource": "MISC",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "macos-ssh-code-execution(16242)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16242"
|
||||
},
|
||||
{
|
||||
"name": "20040524 SSH URI handler remote arbitrary code execution",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021871.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20041006 MySQL MaxDB Web Agent WebDBMServer Name Denial of Service Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://www.idefense.com/application/poi/display?id=150&type=vulnerabilities&flashstatus=false"
|
||||
},
|
||||
{
|
||||
"name" : "11346",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/11346"
|
||||
},
|
||||
{
|
||||
"name": "10532",
|
||||
"refsource": "OSVDB",
|
||||
@ -72,6 +62,16 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://www.secunia.com/advisories/12756"
|
||||
},
|
||||
{
|
||||
"name": "11346",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11346"
|
||||
},
|
||||
{
|
||||
"name": "20041006 MySQL MaxDB Web Agent WebDBMServer Name Denial of Service Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://www.idefense.com/application/poi/display?id=150&type=vulnerabilities&flashstatus=false"
|
||||
},
|
||||
{
|
||||
"name": "maxdb-isascii7dos(17633)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "SSRT4699",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=110384155209555&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "P-085",
|
||||
"refsource" : "CIAC",
|
||||
"url" : "http://www.ciac.org/ciac/bulletins/p-085.shtml"
|
||||
},
|
||||
{
|
||||
"name": "12098",
|
||||
"refsource": "BID",
|
||||
@ -72,6 +62,16 @@
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5435"
|
||||
},
|
||||
{
|
||||
"name": "SSRT4699",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=110384155209555&w=2"
|
||||
},
|
||||
{
|
||||
"name": "P-085",
|
||||
"refsource": "CIAC",
|
||||
"url": "http://www.ciac.org/ciac/bulletins/p-085.shtml"
|
||||
},
|
||||
{
|
||||
"name": "hp-sam-gain-privileges(18674)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040912 Posible Inclusion File in Perl Desk",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=109509026406554&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "11160",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/11160"
|
||||
},
|
||||
{
|
||||
"name": "12512",
|
||||
"refsource": "SECUNIA",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "perldesk-directory-traversal(19712)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19712"
|
||||
},
|
||||
{
|
||||
"name": "11160",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11160"
|
||||
},
|
||||
{
|
||||
"name": "20040912 Posible Inclusion File in Perl Desk",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=109509026406554&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040502 Vulnerability in YaBB forum (Perl version without SQL)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=108360430703935&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.yabbforum.com/community/YaBB.pl?board=general;action=display;num=1093133233",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.yabbforum.com/community/YaBB.pl?board=general;action=display;num=1093133233"
|
||||
},
|
||||
{
|
||||
"name" : "10263",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/10263"
|
||||
"name": "yabb-subject-modify-file(16050)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16050"
|
||||
},
|
||||
{
|
||||
"name": "12609",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://secunia.com/advisories/12609"
|
||||
},
|
||||
{
|
||||
"name" : "yabb-subject-modify-file(16050)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/16050"
|
||||
"name": "10263",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/10263"
|
||||
},
|
||||
{
|
||||
"name": "20040502 Vulnerability in YaBB forum (Perl version without SQL)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=108360430703935&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2008-2262",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,31 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "29538",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29538"
|
||||
},
|
||||
{
|
||||
"name": "20080603 Sun Java System Active Server Pages Multiple Directory Traversal Vulnerabilities",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=707"
|
||||
},
|
||||
{
|
||||
"name": "1020188",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020188"
|
||||
},
|
||||
{
|
||||
"name": "238184",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238184-1"
|
||||
},
|
||||
{
|
||||
"name" : "29538",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29538"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1742",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1742/references"
|
||||
},
|
||||
{
|
||||
"name" : "1020188",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020188"
|
||||
},
|
||||
{
|
||||
"name": "30523",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "30217",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30217"
|
||||
},
|
||||
{
|
||||
"name": "http://typo3.org/teams/security/security-bulletins/typo3-20080513-1/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29182"
|
||||
},
|
||||
{
|
||||
"name" : "30217",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30217"
|
||||
},
|
||||
{
|
||||
"name": "wtgallery-unspecified-xss(42363)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6073",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6073"
|
||||
},
|
||||
{
|
||||
"name": "31054",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31054"
|
||||
},
|
||||
{
|
||||
"name" : "4036",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4036"
|
||||
},
|
||||
{
|
||||
"name": "bilboblog-delete-sql-injection(43765)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43765"
|
||||
},
|
||||
{
|
||||
"name": "6073",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6073"
|
||||
},
|
||||
{
|
||||
"name": "4036",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4036"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "jobbexjobsite-searchresult-sql-injection(43914)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43914"
|
||||
},
|
||||
{
|
||||
"name": "http://holisticinfosec.org/content/view/78/45/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://holisticinfosec.org/content/view/78/45/"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avidwebtech.com/index.php?_m=news&_a=viewnews&newsid=4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avidwebtech.com/index.php?_m=news&_a=viewnews&newsid=4"
|
||||
},
|
||||
{
|
||||
"name": "30302",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30302"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avidwebtech.com/index.php?_m=news&_a=viewnews&newsid=4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avidwebtech.com/index.php?_m=news&_a=viewnews&newsid=4"
|
||||
},
|
||||
{
|
||||
"name": "31089",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31089"
|
||||
},
|
||||
{
|
||||
"name" : "jobbexjobsite-searchresult-sql-injection(43914)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43914"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2008-3518",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,12 +53,22 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBMA02373",
|
||||
"name": "32061",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32061"
|
||||
},
|
||||
{
|
||||
"name": "SSRT071467",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=122271894520640&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT071467",
|
||||
"name": "hp-insight-unspecified-info-disclosure(45506)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45506"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMA02373",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=122271894520640&w=2"
|
||||
},
|
||||
@ -77,20 +87,10 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020953"
|
||||
},
|
||||
{
|
||||
"name" : "32061",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32061"
|
||||
},
|
||||
{
|
||||
"name": "4346",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4346"
|
||||
},
|
||||
{
|
||||
"name" : "hp-insight-unspecified-info-disclosure(45506)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45506"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,26 @@
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=122581539223159&w=2"
|
||||
},
|
||||
{
|
||||
"name": "49521",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/49521"
|
||||
},
|
||||
{
|
||||
"name": "smh-unspecified-priv-escalation(46313)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46313"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2999",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2999"
|
||||
},
|
||||
{
|
||||
"name": "32544",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32544"
|
||||
},
|
||||
{
|
||||
"name": "SSRT080121",
|
||||
"refsource": "HP",
|
||||
@ -67,30 +87,10 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021133"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2999",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2999"
|
||||
},
|
||||
{
|
||||
"name" : "49521",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/49521"
|
||||
},
|
||||
{
|
||||
"name" : "32544",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32544"
|
||||
},
|
||||
{
|
||||
"name": "4545",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4545"
|
||||
},
|
||||
{
|
||||
"name" : "smh-unspecified-priv-escalation(46313)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46313"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080910 Re: E-Php B2B Trading Marketplace(cid) Remote SQL InjectionVulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/496186/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstorm.linuxsecurity.com/0809-exploits/ephpb2b-sql.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstorm.linuxsecurity.com/0809-exploits/ephpb2b-sql.txt"
|
||||
},
|
||||
{
|
||||
"name": "31072",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31072"
|
||||
},
|
||||
{
|
||||
"name": "tradingmarketplace-listings-sql-injection(44975)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44975"
|
||||
},
|
||||
{
|
||||
"name": "20080910 Re: E-Php B2B Trading Marketplace(cid) Remote SQL InjectionVulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/496186/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "31795",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31795"
|
||||
},
|
||||
{
|
||||
"name" : "tradingmarketplace-listings-sql-injection(44975)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44975"
|
||||
"name": "http://packetstorm.linuxsecurity.com/0809-exploits/ephpb2b-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/ephpb2b-sql.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.xt-commerce.com/blog/xtcommerce-news/sicherheitspatch-fuer-version-304-sp21.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.xt-commerce.com/blog/xtcommerce-news/sicherheitspatch-fuer-version-304-sp21.html"
|
||||
"name": "xtcommerce-unspecified-sql-injection(46757)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46757"
|
||||
},
|
||||
{
|
||||
"name": "32398",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://secunia.com/advisories/32830"
|
||||
},
|
||||
{
|
||||
"name" : "xtcommerce-unspecified-sql-injection(46757)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46757"
|
||||
"name": "http://www.xt-commerce.com/blog/xtcommerce-news/sicherheitspatch-fuer-version-304-sp21.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xt-commerce.com/blog/xtcommerce-news/sicherheitspatch-fuer-version-304-sp21.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7456",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7456"
|
||||
},
|
||||
{
|
||||
"name": "32821",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32821"
|
||||
},
|
||||
{
|
||||
"name": "articlescript-addpen-file-upload(47374)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47374"
|
||||
},
|
||||
{
|
||||
"name": "31816",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31816"
|
||||
},
|
||||
{
|
||||
"name" : "articlescript-addpen-file-upload(47374)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47374"
|
||||
"name": "7456",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7456"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugs.launchpad.net/ubuntu/+source/seahorse/+bug/189774",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.launchpad.net/ubuntu/+source/seahorse/+bug/189774"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.launchpad.net/ubuntu/+source/seahorse/+bug/189774/comments/13",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/seahorse/+bug/189774/comments/13"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=551036",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=551036"
|
||||
},
|
||||
{
|
||||
"name": "https://www.bountysource.com/issues/3849352-seahorse-shows-passwords-without-verification",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.bountysource.com/issues/3849352-seahorse-shows-passwords-without-verification"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.launchpad.net/ubuntu/+source/seahorse/+bug/189774",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/seahorse/+bug/189774"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=551036",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=551036"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-2047",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2013-2901",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://crbug.com/257363",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/257363"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/angleproject/issues/detail?id=444",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/angleproject/issues/detail?id=444"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/257363",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/257363"
|
||||
"name": "oval:org.mitre.oval:def:18508",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18508"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://chromium.googlesource.com/external/angle/+/chrome_m29",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://chromium.googlesource.com/external/angle/+/chrome_m29"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2741",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2741"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:18508",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18508"
|
||||
"name": "https://chromium.googlesource.com/external/angle/+/chrome_m29",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://chromium.googlesource.com/external/angle/+/chrome_m29"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-2951",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-6688",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31759",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31759"
|
||||
},
|
||||
{
|
||||
"name": "20131113 Cisco Enterprise License Manager Path Traversal Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6688"
|
||||
},
|
||||
{
|
||||
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31759"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,11 +53,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11894",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11894"
|
||||
},
|
||||
{
|
||||
"name": "102053",
|
||||
"refsource": "BID",
|
||||
@ -72,6 +67,11 @@
|
||||
"name": "1039991",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039991"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11894",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11894"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-14780",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "43064",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/43064/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/thorsten/phpMyFAQ/commit/cce47f94375bb0102ab4f210672231dbb854dd0d",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/thorsten/phpMyFAQ/commit/cce47f94375bb0102ab4f210672231dbb854dd0d"
|
||||
},
|
||||
{
|
||||
"name": "43064",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/43064/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20171118 [SECURITY] [DLA 1174-1] konversation security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2017/11/msg00020.html"
|
||||
"name": "DSA-4033",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2017/dsa-4033"
|
||||
},
|
||||
{
|
||||
"name": "https://cgit.kde.org/konversation.git/commit/?h=1.7&id=6a7f59ee1b9dbc6e5cf9e5f3b306504d02b73ef0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cgit.kde.org/konversation.git/commit/?h=1.7&id=6a7f59ee1b9dbc6e5cf9e5f3b306504d02b73ef0"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20171118 [SECURITY] [DLA 1174-1] konversation security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00020.html"
|
||||
},
|
||||
{
|
||||
"name": "https://konversation.kde.org/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://konversation.kde.org/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4033",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2017/dsa-4033"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2018-0960",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "3/11/2018 1:47:04",
|
||||
"ID": "CVE-2018-1000136",
|
||||
"REQUESTER": "security@electronjs.org",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Electron",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.7 up to 1.7.12; 1.8 up to 1.8.3; 2.0.0 up to 2.0.0-beta.3"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Electron"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-229: Improper Handling of Values"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://doc.akka.io/docs/akka-http/current/security/2018-09-05-denial-of-service-via-decodeRequest.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://doc.akka.io/docs/akka-http/current/security/2018-09-05-denial-of-service-via-decodeRequest.html"
|
||||
},
|
||||
{
|
||||
"name": "https://groups.google.com/forum/#!topic/akka-security/Dj7INsYWdjg",
|
||||
"refsource": "MISC",
|
||||
"url": "https://groups.google.com/forum/#!topic/akka-security/Dj7INsYWdjg"
|
||||
},
|
||||
{
|
||||
"name": "https://akka.io/blog/news/2018/08/30/akka-http-dos-vulnerability-found",
|
||||
"refsource": "MISC",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "https://github.com/akka/akka-http/issues/2137",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/akka/akka-http/issues/2137"
|
||||
},
|
||||
{
|
||||
"name" : "https://groups.google.com/forum/#!topic/akka-security/Dj7INsYWdjg",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://groups.google.com/forum/#!topic/akka-security/Dj7INsYWdjg"
|
||||
},
|
||||
{
|
||||
"name" : "https://doc.akka.io/docs/akka-http/current/security/2018-09-05-denial-of-service-via-decodeRequest.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://doc.akka.io/docs/akka-http/current/security/2018-09-05-denial-of-service-via-decodeRequest.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://jpn.nec.com/security-info/secinfo/nv18-021.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://jpn.nec.com/security-info/secinfo/nv18-021.html"
|
||||
},
|
||||
{
|
||||
"name": "JVN#87535892",
|
||||
"refsource": "JVN",
|
||||
"url": "https://jvn.jp/en/jp/JVN87535892/index.html"
|
||||
},
|
||||
{
|
||||
"name": "https://jpn.nec.com/security-info/secinfo/nv18-021.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv18-021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT208462"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT208463",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT208463"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208464",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT208464"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208463",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT208463"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user