"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:19:17 +00:00
parent 087ae5b991
commit f34455c4d6
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
50 changed files with 2923 additions and 2923 deletions

View File

@ -53,49 +53,49 @@
"references": {
"reference_data": [
{
"name" : "http://docs.info.apple.com/article.html?artnum=307562",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name" : "APPLE-SA-2008-03-18",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name" : "TA08-079A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
},
{
"name" : "28341",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28341"
"name": "macos-nsselectorfromstring-code-execution(41355)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41355"
},
{
"name": "28304",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28304"
},
{
"name": "TA08-079A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
},
{
"name": "ADV-2008-0924",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"name" : "1019649",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019649"
},
{
"name": "29420",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29420"
},
{
"name" : "macos-nsselectorfromstring-code-execution(41355)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41355"
"name": "APPLE-SA-2008-03-18",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name": "28341",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28341"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307562",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name": "1019649",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019649"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20080110 Simple Machines Forum Cross-Site Scripting Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/486074/100/0/threaded"
},
{
"name": "27218",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27218"
},
{
"name": "simplemachinesforum-itemid-xss(39585)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39585"
},
{
"name": "3540",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3540"
},
{
"name" : "simplemachinesforum-itemid-xss(39585)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39585"
"name": "20080110 Simple Machines Forum Cross-Site Scripting Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/486074/100/0/threaded"
}
]
}

View File

@ -53,49 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20080204 CORE-2008-0122: MPlayer arbitrary pointer dereference",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/487500/100/0/threaded"
},
{
"name" : "20080204 CORE-2008-0122: MPlayer arbitrary pointer dereference",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060032.html"
},
{
"name" : "http://www.coresecurity.com/?action=item&id=2102",
"refsource" : "MISC",
"url" : "http://www.coresecurity.com/?action=item&id=2102"
"name": "ADV-2008-0406",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0406/references"
},
{
"name": "http://www.mplayerhq.hu/design7/news.html",
"refsource": "CONFIRM",
"url": "http://www.mplayerhq.hu/design7/news.html"
},
{
"name" : "DSA-1496",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1496"
},
{
"name" : "GLSA-200803-16",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200803-16.xml"
},
{
"name": "MDVSA-2008:045",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:045"
},
{
"name" : "27499",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27499"
},
{
"name" : "ADV-2008-0406",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0406/references"
"name": "28955",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28955"
},
{
"name": "1019299",
@ -108,24 +83,49 @@
"url": "http://secunia.com/advisories/28779"
},
{
"name" : "28956",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28956"
"name": "20080204 CORE-2008-0122: MPlayer arbitrary pointer dereference",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060032.html"
},
{
"name" : "28955",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28955"
"name": "27499",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27499"
},
{
"name": "29307",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29307"
},
{
"name": "DSA-1496",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1496"
},
{
"name": "20080204 CORE-2008-0122: MPlayer arbitrary pointer dereference",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/487500/100/0/threaded"
},
{
"name": "3607",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3607"
},
{
"name": "GLSA-200803-16",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200803-16.xml"
},
{
"name": "http://www.coresecurity.com/?action=item&id=2102",
"refsource": "MISC",
"url": "http://www.coresecurity.com/?action=item&id=2102"
},
{
"name": "28956",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28956"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.nagios.org/development/changelog.php#2x_branch",
"refsource" : "CONFIRM",
"url" : "http://www.nagios.org/development/changelog.php#2x_branch"
},
{
"name" : "MDVSA-2008:067",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
"name": "ADV-2008-0900",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0900/references"
},
{
"name": "SUSE-SR:2008:011",
@ -68,24 +63,29 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
},
{
"name" : "28250",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28250"
},
{
"name" : "ADV-2008-0900",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0900/references"
"name": "MDVSA-2008:067",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
},
{
"name": "29363",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29363"
},
{
"name": "http://www.nagios.org/development/changelog.php#2x_branch",
"refsource": "CONFIRM",
"url": "http://www.nagios.org/development/changelog.php#2x_branch"
},
{
"name": "nagios-unspecified-xss(41210)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41210"
},
{
"name": "28250",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28250"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "28908",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28908"
},
{
"name": "20080423 Re: xine-lib NES Sound Format Demuxer Buffer Overflow",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "20080423 xine-lib NES Sound Format Demuxer Buffer Overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/491248/100/0/threaded"
},
{
"name" : "28908",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28908"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-3019",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "HPSBST02360",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=121915960406986&w=2"
},
{
"name" : "SSRT080117",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=121915960406986&w=2"
},
{
"name": "MS08-044",
"refsource": "MS",
@ -73,25 +63,35 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html"
},
{
"name" : "30595",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30595"
"name": "HPSBST02360",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=121915960406986&w=2"
},
{
"name": "1020673",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020673"
},
{
"name": "oval:org.mitre.oval:def:6122",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6122"
},
{
"name": "SSRT080117",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=121915960406986&w=2"
},
{
"name": "30595",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30595"
},
{
"name": "ADV-2008-2348",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2348"
},
{
"name" : "1020673",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020673"
},
{
"name": "31336",
"refsource": "SECUNIA",

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "6430",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6430"
"name": "4249",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4249"
},
{
"name": "31135",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31135"
},
{
"name": "discussionboard-index-file-include(45063)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45063"
},
{
"name": "31808",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31808"
},
{
"name" : "4249",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4249"
},
{
"name" : "discussionboard-index-file-include(45063)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45063"
"name": "6430",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6430"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2013-2328",
"STATE": "PUBLIC"
},
@ -53,7 +53,7 @@
"references": {
"reference_data": [
{
"name" : "HPSBMU02883",
"name": "SSRT101227",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03781657"
},
@ -63,7 +63,7 @@
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03781657"
},
{
"name" : "SSRT101227",
"name": "HPSBMU02883",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03781657"
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2013-2835",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-3385",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "20130626 Multiple Vulnerabilities in Cisco Web Security Appliance",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa"
},
{
"name": "20130626 Multiple Vulnerabilities in Cisco Content Security Management Appliance",
"refsource": "CISCO",
@ -61,11 +66,6 @@
"name": "20130626 Multiple Vulnerabilities in Cisco Email Security Appliance",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-esa"
},
{
"name" : "20130626 Multiple Vulnerabilities in Cisco Web Security Appliance",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-3764",
"STATE": "PUBLIC"
},

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-034.txt",
"refsource" : "MISC",
"url" : "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-034.txt"
},
{
"name": "wifihdfree-cve20133923-dir-traversal(89172)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89172"
},
{
"name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-034.txt",
"refsource": "MISC",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-034.txt"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6102",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6512",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6540",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6598",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://code.google.com/p/memcached/issues/detail?id=306",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/memcached/issues/detail?id=306"
},
{
"name": "https://code.google.com/p/memcached/wiki/ReleaseNotes1417",
"refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "64989",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64989"
},
{
"name": "https://code.google.com/p/memcached/issues/detail?id=306",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/memcached/issues/detail?id=306"
}
]
}

View File

@ -81,16 +81,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "101340",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101340"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "1039592",
"refsource": "SECTRACK",

View File

@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://xenbits.xen.org/xsa/advisory-217.html",
"refsource" : "CONFIRM",
"url" : "https://xenbits.xen.org/xsa/advisory-217.html"
},
{
"name" : "DSA-3969",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3969"
},
{
"name": "GLSA-201708-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201708-03"
},
{
"name" : "GLSA-201710-17",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201710-17"
"name": "DSA-3969",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3969"
},
{
"name": "99158",
@ -81,6 +71,16 @@
"name": "1038721",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038721"
},
{
"name": "https://xenbits.xen.org/xsa/advisory-217.html",
"refsource": "CONFIRM",
"url": "https://xenbits.xen.org/xsa/advisory-217.html"
},
{
"name": "GLSA-201710-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201710-17"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://core.trac.wordpress.org/ticket/38474",
"refsource" : "MISC",
"url" : "https://core.trac.wordpress.org/ticket/38474"
},
{
"name": "DSA-3997",
"refsource": "DEBIAN",
@ -66,6 +61,11 @@
"name": "1039554",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039554"
},
{
"name": "https://core.trac.wordpress.org/ticket/38474",
"refsource": "MISC",
"url": "https://core.trac.wordpress.org/ticket/38474"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@qnapsecurity.com.tw",
"ASSIGNER": "security@qnap.com",
"DATE_PUBLIC": "2017-12-15T00:00:00",
"ID": "CVE-2017-17031",
"STATE": "PUBLIC"
@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.qnap.com/zh-tw/security-advisory/nas-201712-15",
"refsource" : "CONFIRM",
"url" : "https://www.qnap.com/zh-tw/security-advisory/nas-201712-15"
},
{
"name": "1040018",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040018"
},
{
"name": "https://www.qnap.com/zh-tw/security-advisory/nas-201712-15",
"refsource": "CONFIRM",
"url": "https://www.qnap.com/zh-tw/security-advisory/nas-201712-15"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06",
"refsource" : "CONFIRM",
"url" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06"
},
{
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=698025",
"refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "99976",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99976"
},
{
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06",
"refsource": "CONFIRM",
"url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06"
}
]
}

View File

@ -93,15 +93,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://kb.juniper.net/JSA10866",
"refsource" : "CONFIRM",
"url" : "https://kb.juniper.net/JSA10866"
},
{
"name": "1041337",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041337"
},
{
"name": "https://kb.juniper.net/JSA10866",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA10866"
}
]
},

View File

@ -53,16 +53,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0939",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0939"
},
{
"name": "103305",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103305"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0939",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0939"
},
{
"name": "1040507",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-02-26",
"ID": "CVE-2018-1000113",
"REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins TestLink Plugin",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "3.12 and older"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins project"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-79"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-12-28T04:34:37.683653",
"ID": "CVE-2018-1000420",
"REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins Mesos Plugin",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "0.17.1 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins project"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-285, CWE-200"
"value": "n/a"
}
]
}
@ -54,15 +54,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1013%20(1)",
"refsource" : "CONFIRM",
"url" : "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1013%20(1)"
},
{
"name": "106532",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106532"
},
{
"name": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1013%20(1)",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1013%20(1)"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/Dec/20"
},
{
"name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html"
},
{
"name": "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Dec/20"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html"
},
{
"name": "45999",
"refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "20181207 [CVE-2018-19861, CVE-2018-19862] Buffer overflow in MiniShare 1.4.1 HEAD and POST method",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Dec/19"
},
{
"name" : "http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html"
}
]
}