mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
087ae5b991
commit
f34455c4d6
@ -53,49 +53,49 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://docs.info.apple.com/article.html?artnum=307562",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://docs.info.apple.com/article.html?artnum=307562"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2008-03-18",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA08-079A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
|
||||
},
|
||||
{
|
||||
"name" : "28341",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28341"
|
||||
"name": "macos-nsselectorfromstring-code-execution(41355)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41355"
|
||||
},
|
||||
{
|
||||
"name": "28304",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28304"
|
||||
},
|
||||
{
|
||||
"name": "TA08-079A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0924",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
|
||||
},
|
||||
{
|
||||
"name" : "1019649",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1019649"
|
||||
},
|
||||
{
|
||||
"name": "29420",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29420"
|
||||
},
|
||||
{
|
||||
"name" : "macos-nsselectorfromstring-code-execution(41355)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41355"
|
||||
"name": "APPLE-SA-2008-03-18",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "28341",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28341"
|
||||
},
|
||||
{
|
||||
"name": "http://docs.info.apple.com/article.html?artnum=307562",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://docs.info.apple.com/article.html?artnum=307562"
|
||||
},
|
||||
{
|
||||
"name": "1019649",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019649"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080110 Simple Machines Forum Cross-Site Scripting Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/486074/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "27218",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27218"
|
||||
},
|
||||
{
|
||||
"name": "simplemachinesforum-itemid-xss(39585)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39585"
|
||||
},
|
||||
{
|
||||
"name": "3540",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3540"
|
||||
},
|
||||
{
|
||||
"name" : "simplemachinesforum-itemid-xss(39585)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39585"
|
||||
"name": "20080110 Simple Machines Forum Cross-Site Scripting Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/486074/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,49 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080204 CORE-2008-0122: MPlayer arbitrary pointer dereference",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/487500/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080204 CORE-2008-0122: MPlayer arbitrary pointer dereference",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060032.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.coresecurity.com/?action=item&id=2102",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.coresecurity.com/?action=item&id=2102"
|
||||
"name": "ADV-2008-0406",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0406/references"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mplayerhq.hu/design7/news.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mplayerhq.hu/design7/news.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1496",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2008/dsa-1496"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200803-16",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200803-16.xml"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:045",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:045"
|
||||
},
|
||||
{
|
||||
"name" : "27499",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27499"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0406",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0406/references"
|
||||
"name": "28955",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28955"
|
||||
},
|
||||
{
|
||||
"name": "1019299",
|
||||
@ -108,24 +83,49 @@
|
||||
"url": "http://secunia.com/advisories/28779"
|
||||
},
|
||||
{
|
||||
"name" : "28956",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28956"
|
||||
"name": "20080204 CORE-2008-0122: MPlayer arbitrary pointer dereference",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060032.html"
|
||||
},
|
||||
{
|
||||
"name" : "28955",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28955"
|
||||
"name": "27499",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27499"
|
||||
},
|
||||
{
|
||||
"name": "29307",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29307"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1496",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1496"
|
||||
},
|
||||
{
|
||||
"name": "20080204 CORE-2008-0122: MPlayer arbitrary pointer dereference",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/487500/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "3607",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3607"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200803-16",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200803-16.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://www.coresecurity.com/?action=item&id=2102",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.coresecurity.com/?action=item&id=2102"
|
||||
},
|
||||
{
|
||||
"name": "28956",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28956"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.nagios.org/development/changelog.php#2x_branch",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.nagios.org/development/changelog.php#2x_branch"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2008:067",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
|
||||
"name": "ADV-2008-0900",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0900/references"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2008:011",
|
||||
@ -68,24 +63,29 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "28250",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28250"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0900",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0900/references"
|
||||
"name": "MDVSA-2008:067",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
|
||||
},
|
||||
{
|
||||
"name": "29363",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29363"
|
||||
},
|
||||
{
|
||||
"name": "http://www.nagios.org/development/changelog.php#2x_branch",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.nagios.org/development/changelog.php#2x_branch"
|
||||
},
|
||||
{
|
||||
"name": "nagios-unspecified-xss(41210)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41210"
|
||||
},
|
||||
{
|
||||
"name": "28250",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28250"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "28908",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28908"
|
||||
},
|
||||
{
|
||||
"name": "20080423 Re: xine-lib NES Sound Format Demuxer Buffer Overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "20080423 xine-lib NES Sound Format Demuxer Buffer Overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/491248/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "28908",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28908"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2008-3019",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBST02360",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=121915960406986&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT080117",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=121915960406986&w=2"
|
||||
},
|
||||
{
|
||||
"name": "MS08-044",
|
||||
"refsource": "MS",
|
||||
@ -73,25 +63,35 @@
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html"
|
||||
},
|
||||
{
|
||||
"name" : "30595",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30595"
|
||||
"name": "HPSBST02360",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=121915960406986&w=2"
|
||||
},
|
||||
{
|
||||
"name": "1020673",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020673"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:6122",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6122"
|
||||
},
|
||||
{
|
||||
"name": "SSRT080117",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=121915960406986&w=2"
|
||||
},
|
||||
{
|
||||
"name": "30595",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30595"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2348",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2348"
|
||||
},
|
||||
{
|
||||
"name" : "1020673",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020673"
|
||||
},
|
||||
{
|
||||
"name": "31336",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6430",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6430"
|
||||
"name": "4249",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4249"
|
||||
},
|
||||
{
|
||||
"name": "31135",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31135"
|
||||
},
|
||||
{
|
||||
"name": "discussionboard-index-file-include(45063)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45063"
|
||||
},
|
||||
{
|
||||
"name": "31808",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31808"
|
||||
},
|
||||
{
|
||||
"name" : "4249",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4249"
|
||||
},
|
||||
{
|
||||
"name" : "discussionboard-index-file-include(45063)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45063"
|
||||
"name": "6430",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6430"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2013-2328",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,7 +53,7 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBMU02883",
|
||||
"name": "SSRT101227",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03781657"
|
||||
},
|
||||
@ -63,7 +63,7 @@
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03781657"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101227",
|
||||
"name": "HPSBMU02883",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03781657"
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2013-2835",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-3385",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "20130626 Multiple Vulnerabilities in Cisco Web Security Appliance",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa"
|
||||
},
|
||||
{
|
||||
"name": "20130626 Multiple Vulnerabilities in Cisco Content Security Management Appliance",
|
||||
"refsource": "CISCO",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "20130626 Multiple Vulnerabilities in Cisco Email Security Appliance",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-esa"
|
||||
},
|
||||
{
|
||||
"name" : "20130626 Multiple Vulnerabilities in Cisco Web Security Appliance",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-3764",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-034.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-034.txt"
|
||||
},
|
||||
{
|
||||
"name": "wifihdfree-cve20133923-dir-traversal(89172)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89172"
|
||||
},
|
||||
{
|
||||
"name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-034.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-034.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6102",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6512",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6540",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6598",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://code.google.com/p/memcached/issues/detail?id=306",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.google.com/p/memcached/issues/detail?id=306"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/memcached/wiki/ReleaseNotes1417",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "64989",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/64989"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/memcached/issues/detail?id=306",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/memcached/issues/detail?id=306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,16 +81,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "101340",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101340"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "1039592",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -52,25 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://xenbits.xen.org/xsa/advisory-217.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://xenbits.xen.org/xsa/advisory-217.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3969",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2017/dsa-3969"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201708-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201708-03"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201710-17",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201710-17"
|
||||
"name": "DSA-3969",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3969"
|
||||
},
|
||||
{
|
||||
"name": "99158",
|
||||
@ -81,6 +71,16 @@
|
||||
"name": "1038721",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038721"
|
||||
},
|
||||
{
|
||||
"name": "https://xenbits.xen.org/xsa/advisory-217.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://xenbits.xen.org/xsa/advisory-217.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201710-17",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201710-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://core.trac.wordpress.org/ticket/38474",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://core.trac.wordpress.org/ticket/38474"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3997",
|
||||
"refsource": "DEBIAN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1039554",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039554"
|
||||
},
|
||||
{
|
||||
"name": "https://core.trac.wordpress.org/ticket/38474",
|
||||
"refsource": "MISC",
|
||||
"url": "https://core.trac.wordpress.org/ticket/38474"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@qnapsecurity.com.tw",
|
||||
"ASSIGNER": "security@qnap.com",
|
||||
"DATE_PUBLIC": "2017-12-15T00:00:00",
|
||||
"ID": "CVE-2017-17031",
|
||||
"STATE": "PUBLIC"
|
||||
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.qnap.com/zh-tw/security-advisory/nas-201712-15",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.qnap.com/zh-tw/security-advisory/nas-201712-15"
|
||||
},
|
||||
{
|
||||
"name": "1040018",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040018"
|
||||
},
|
||||
{
|
||||
"name": "https://www.qnap.com/zh-tw/security-advisory/nas-201712-15",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.qnap.com/zh-tw/security-advisory/nas-201712-15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=698025",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "99976",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99976"
|
||||
},
|
||||
{
|
||||
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,15 +93,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://kb.juniper.net/JSA10866",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kb.juniper.net/JSA10866"
|
||||
},
|
||||
{
|
||||
"name": "1041337",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041337"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.juniper.net/JSA10866",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.juniper.net/JSA10866"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,16 +53,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0939",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0939"
|
||||
},
|
||||
{
|
||||
"name": "103305",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103305"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0939",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0939"
|
||||
},
|
||||
{
|
||||
"name": "1040507",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-02-26",
|
||||
"ID": "CVE-2018-1000113",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins TestLink Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "3.12 and older"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins project"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-79"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-12-28T04:34:37.683653",
|
||||
"ID": "CVE-2018-1000420",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins Mesos Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "0.17.1 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins project"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-285, CWE-200"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -54,15 +54,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1013%20(1)",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1013%20(1)"
|
||||
},
|
||||
{
|
||||
"name": "106532",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106532"
|
||||
},
|
||||
{
|
||||
"name": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1013%20(1)",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1013%20(1)"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2018/Dec/20"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2018/Dec/20"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html"
|
||||
},
|
||||
{
|
||||
"name": "45999",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "20181207 [CVE-2018-19861, CVE-2018-19862] Buffer overflow in MiniShare 1.4.1 HEAD and POST method",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2018/Dec/19"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user