"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 06:47:41 +00:00
parent 0d9be55c8f
commit f6506835b4
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 3968 additions and 3922 deletions

View File

@ -53,49 +53,49 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20041027 PHP4 cURL functions bypass open_basedir", "name": "php-openbasedir-restriction-bypass(17900)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=109898213806099&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17900"
},
{
"name" : "FLSA:2344",
"refsource" : "FEDORA",
"url" : "https://bugzilla.fedora.us/show_bug.cgi?id=2344"
},
{
"name" : "RHSA-2005:405",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-405.html"
}, },
{ {
"name": "RHSA-2005:406", "name": "RHSA-2005:406",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-406.html" "url": "http://www.redhat.com/support/errata/RHSA-2005-406.html"
}, },
{
"name" : "20050120 [USN-66-1] PHP vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=110625060220934&w=2"
},
{ {
"name": "11557", "name": "11557",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/11557" "url": "http://www.securityfocus.com/bid/11557"
}, },
{
"name": "20050120 [USN-66-1] PHP vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110625060220934&w=2"
},
{ {
"name": "oval:org.mitre.oval:def:9279", "name": "oval:org.mitre.oval:def:9279",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9279" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9279"
}, },
{
"name": "FLSA:2344",
"refsource": "FEDORA",
"url": "https://bugzilla.fedora.us/show_bug.cgi?id=2344"
},
{ {
"name": "1011984", "name": "1011984",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1011984" "url": "http://securitytracker.com/id?1011984"
}, },
{ {
"name" : "php-openbasedir-restriction-bypass(17900)", "name": "20041027 PHP4 cURL functions bypass open_basedir",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17900" "url": "http://marc.info/?l=bugtraq&m=109898213806099&w=2"
},
{
"name": "RHSA-2005:405",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-405.html"
} }
] ]
} }

View File

@ -52,40 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20040315 Phorum 5.0.3 Beta && Earlier XSS Issues",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107939479713136&w=2"
},
{
"name" : "http://phorum.org/changelog.txt",
"refsource" : "CONFIRM",
"url" : "http://phorum.org/changelog.txt"
},
{ {
"name": "9882", "name": "9882",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/9882" "url": "http://www.securityfocus.com/bid/9882"
}, },
{ {
"name" : "4333", "name": "20040315 Phorum 5.0.3 Beta && Earlier XSS Issues",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://www.osvdb.org/4333" "url": "http://marc.info/?l=bugtraq&m=107939479713136&w=2"
}, },
{ {
"name": "4334", "name": "4334",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/4334" "url": "http://www.osvdb.org/4334"
}, },
{
"name": "http://phorum.org/changelog.txt",
"refsource": "CONFIRM",
"url": "http://phorum.org/changelog.txt"
},
{ {
"name": "4335", "name": "4335",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/4335" "url": "http://www.osvdb.org/4335"
}, },
{ {
"name" : "1009433", "name": "phorum-register-xss(15494)",
"refsource" : "SECTRACK", "refsource": "XF",
"url" : "http://securitytracker.com/id?1009433" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15494"
}, },
{ {
"name": "11157", "name": "11157",
@ -93,9 +88,14 @@
"url": "http://secunia.com/advisories/11157" "url": "http://secunia.com/advisories/11157"
}, },
{ {
"name" : "phorum-register-xss(15494)", "name": "1009433",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15494" "url": "http://securitytracker.com/id?1009433"
},
{
"name": "4333",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4333"
} }
] ]
} }

View File

@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20040323 How to crash a harddisk - the Ipswitch WS_FTP Server way", "name": "11206",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=bugtraq&m=108006717731989&w=2" "url": "http://secunia.com/advisories/11206"
}, },
{ {
"name": "9953", "name": "9953",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/9953" "url": "http://www.securityfocus.com/bid/9953"
}, },
{
"name": "20040323 How to crash a harddisk - the Ipswitch WS_FTP Server way",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108006717731989&w=2"
},
{
"name": "wsftp-rest-stor-dos(41831)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41831"
},
{ {
"name": "4542", "name": "4542",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/4542" "url": "http://www.osvdb.org/4542"
}, },
{
"name" : "11206",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/11206"
},
{
"name" : "1009529",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1009529"
},
{ {
"name": "wsftp-rest-dos(15560)", "name": "wsftp-rest-dos(15560)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15560" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15560"
}, },
{ {
"name" : "wsftp-rest-stor-dos(41831)", "name": "1009529",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41831" "url": "http://securitytracker.com/id?1009529"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080212 Unicode buffer-overflow in RPM Remote Print Manager 4.5.1.11", "name": "28905",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/488010/100/0/threaded" "url": "http://secunia.com/advisories/28905"
}, },
{ {
"name": "http://aluigi.altervista.org/adv/rpmlpdbof-adv.txt", "name": "http://aluigi.altervista.org/adv/rpmlpdbof-adv.txt",
@ -67,16 +67,16 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/27742" "url": "http://www.securityfocus.com/bid/27742"
}, },
{
"name": "20080212 Unicode buffer-overflow in RPM Remote Print Manager 4.5.1.11",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488010/100/0/threaded"
},
{ {
"name": "ADV-2008-0501", "name": "ADV-2008-0501",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0501" "url": "http://www.vupen.com/english/advisories/2008/0501"
}, },
{
"name" : "28905",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28905"
},
{ {
"name": "rpm-receivedatafile-bo(40432)", "name": "rpm-receivedatafile-bo(40432)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "6028",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6028"
},
{
"name" : "ADV-2008-2033",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2033/references"
},
{ {
"name": "30999", "name": "30999",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -72,10 +62,20 @@
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3994" "url": "http://securityreason.com/securityalert/3994"
}, },
{
"name": "6028",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6028"
},
{ {
"name": "ray-sincpath-file-include(43644)", "name": "ray-sincpath-file-include(43644)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43644" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43644"
},
{
"name": "ADV-2008-2033",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2033/references"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "6015", "name": "3991",
"refsource" : "EXPLOIT-DB", "refsource": "SREASON",
"url" : "https://www.exploit-db.com/exploits/6015" "url": "http://securityreason.com/securityalert/3991"
},
{
"name" : "30117",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30117"
}, },
{ {
"name": "ADV-2008-2016", "name": "ADV-2008-2016",
@ -72,15 +67,20 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30948" "url": "http://secunia.com/advisories/30948"
}, },
{
"name" : "3991",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3991"
},
{ {
"name": "webxelleditor-upload-file-upload(43596)", "name": "webxelleditor-upload-file-upload(43596)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43596" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43596"
},
{
"name": "30117",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30117"
},
{
"name": "6015",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6015"
} }
] ]
} }

View File

@ -53,35 +53,35 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080805 Plogger <= 3.0 SQL Injection", "name": "4121",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/495116/100/0/threaded" "url": "http://securityreason.com/securityalert/4121"
},
{
"name" : "6204",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6204"
}, },
{ {
"name": "http://www.gulftech.org/?node=research&article_id=00121-08042008", "name": "http://www.gulftech.org/?node=research&article_id=00121-08042008",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.gulftech.org/?node=research&article_id=00121-08042008" "url": "http://www.gulftech.org/?node=research&article_id=00121-08042008"
}, },
{
"name": "20080805 Plogger <= 3.0 SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495116/100/0/threaded"
},
{ {
"name": "http://dev.plogger.org/changeset/569", "name": "http://dev.plogger.org/changeset/569",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://dev.plogger.org/changeset/569" "url": "http://dev.plogger.org/changeset/569"
}, },
{
"name": "6204",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6204"
},
{ {
"name": "30547", "name": "30547",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/30547" "url": "http://www.securityfocus.com/bid/30547"
}, },
{
"name" : "4121",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4121"
},
{ {
"name": "plogger-plogdownload-sql-injection(44233)", "name": "plogger-plogdownload-sql-injection(44233)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,65 +52,65 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080922 Squirrelmail: Session hijacking vulnerability, CVE-2008-3663",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/496601/100/0/threaded"
},
{
"name" : "http://int21.de/cve/CVE-2008-3663-squirrelmail.html",
"refsource" : "MISC",
"url" : "http://int21.de/cve/CVE-2008-3663-squirrelmail.html"
},
{ {
"name": "http://www.nabble.com/ANNOUNCE:-SquirrelMail-1.4.16-Released-td19711998.html", "name": "http://www.nabble.com/ANNOUNCE:-SquirrelMail-1.4.16-Released-td19711998.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.nabble.com/ANNOUNCE:-SquirrelMail-1.4.16-Released-td19711998.html" "url": "http://www.nabble.com/ANNOUNCE:-SquirrelMail-1.4.16-Released-td19711998.html"
}, },
{
"name" : "http://support.apple.com/kb/HT3438",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3438"
},
{
"name" : "APPLE-SA-2009-02-12",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name" : "SUSE-SR:2008:028",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html"
},
{
"name" : "SUSE-SR:2009:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name" : "31321",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31321"
},
{
"name" : "oval:org.mitre.oval:def:10548",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10548"
},
{ {
"name": "33937", "name": "33937",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33937" "url": "http://secunia.com/advisories/33937"
}, },
{
"name": "http://int21.de/cve/CVE-2008-3663-squirrelmail.html",
"refsource": "MISC",
"url": "http://int21.de/cve/CVE-2008-3663-squirrelmail.html"
},
{
"name": "31321",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31321"
},
{
"name": "http://support.apple.com/kb/HT3438",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3438"
},
{ {
"name": "4304", "name": "4304",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4304" "url": "http://securityreason.com/securityalert/4304"
}, },
{
"name": "APPLE-SA-2009-02-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "20080922 Squirrelmail: Session hijacking vulnerability, CVE-2008-3663",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/496601/100/0/threaded"
},
{ {
"name": "squirrelmail-cookie-session-hijacking(45700)", "name": "squirrelmail-cookie-session-hijacking(45700)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45700" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45700"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "SUSE-SR:2008:028",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html"
},
{
"name": "oval:org.mitre.oval:def:10548",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10548"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://sourceforge.net/project/shownotes.php?release_id=619467", "name": "freeway-unspecified-file-include(44426)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=619467" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44426"
},
{
"name" : "30676",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30676"
}, },
{ {
"name": "31475", "name": "31475",
@ -68,9 +63,14 @@
"url": "http://secunia.com/advisories/31475" "url": "http://secunia.com/advisories/31475"
}, },
{ {
"name" : "freeway-unspecified-file-include(44426)", "name": "30676",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44426" "url": "http://www.securityfocus.com/bid/30676"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=619467",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=619467"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[linux-kernel] 20080903 [patch 05/16] nfsd: fix buffer overrun decoding NFSv4 acl",
"refsource" : "MLIST",
"url" : "http://lkml.org/lkml/2008/9/3/286"
},
{ {
"name": "[oss-security] 20080904 CVE request: kernel: nfsd: fix buffer overrun decoding NFSv4 acl", "name": "[oss-security] 20080904 CVE request: kernel: nfsd: fix buffer overrun decoding NFSv4 acl",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,46 +62,6 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/09/04/18" "url": "http://www.openwall.com/lists/oss-security/2008/09/04/18"
}, },
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=91b80969ba466ba4b915a4a1d03add8c297add3f",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=91b80969ba466ba4b915a4a1d03add8c297add3f"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.4",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.4"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=461101",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=461101"
},
{
"name" : "DSA-1636",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1636"
},
{
"name" : "RHSA-2008:0857",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
},
{
"name" : "USN-659-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-659-1"
},
{
"name" : "31133",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31133"
},
{
"name" : "31881",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31881"
},
{ {
"name": "32190", "name": "32190",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -117,6 +72,51 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32393" "url": "http://secunia.com/advisories/32393"
}, },
{
"name": "DSA-1636",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1636"
},
{
"name": "31881",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31881"
},
{
"name": "USN-659-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-659-1"
},
{
"name": "[linux-kernel] 20080903 [patch 05/16] nfsd: fix buffer overrun decoding NFSv4 acl",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2008/9/3/286"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=91b80969ba466ba4b915a4a1d03add8c297add3f",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=91b80969ba466ba4b915a4a1d03add8c297add3f"
},
{
"name": "RHSA-2008:0857",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.4",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.4"
},
{
"name": "31133",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31133"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=461101",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461101"
},
{ {
"name": "linux-kernel-nfsv4-bo(45055)", "name": "linux-kernel-nfsv4-bo(45055)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog",
"refsource": "CONFIRM",
"url": "http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog"
},
{ {
"name": "[oss-security] 20080911 Re: CVE Request (ruby -- DNS spoofing vulnerability in resolv.rb)", "name": "[oss-security] 20080911 Re: CVE Request (ruby -- DNS spoofing vulnerability in resolv.rb)",
"refsource": "MLIST", "refsource": "MLIST",
@ -66,11 +71,6 @@
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217", "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217" "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217"
},
{
"name" : "http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog",
"refsource" : "CONFIRM",
"url" : "http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog"
} }
] ]
} }

View File

@ -52,31 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "HPSBMA02378",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962"
},
{
"name" : "SSRT080035",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962"
},
{
"name" : "31777",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31777"
},
{
"name" : "ADV-2008-2836",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2836"
},
{ {
"name": "1021064", "name": "1021064",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021064" "url": "http://www.securitytracker.com/id?1021064"
}, },
{
"name": "HPSBMA02378",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962"
},
{ {
"name": "32287", "name": "32287",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -86,6 +71,21 @@
"name": "hp-sim-unspecified-security-bypass(45916)", "name": "hp-sim-unspecified-security-bypass(45916)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45916" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45916"
},
{
"name": "SSRT080035",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962"
},
{
"name": "ADV-2008-2836",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2836"
},
{
"name": "31777",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31777"
} }
] ]
} }

View File

@ -52,46 +52,46 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20081008 ZDI-08-064: Novell eDirectory dhost.exe Accept Language Header Heap Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/497164/100/0/threaded"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-064",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-064"
},
{ {
"name": "http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7000086&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953", "name": "http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7000086&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7000086&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953" "url": "http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7000086&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953"
}, },
{
"name" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html"
},
{
"name" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html"
},
{
"name" : "ADV-2008-2738",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2738"
},
{ {
"name": "1020989", "name": "1020989",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020989" "url": "http://www.securitytracker.com/id?1020989"
}, },
{
"name": "ADV-2008-2738",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2738"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-064",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-064"
},
{
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html"
},
{
"name": "20081008 ZDI-08-064: Novell eDirectory dhost.exe Accept Language Header Heap Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497164/100/0/threaded"
},
{ {
"name": "32111", "name": "32111",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32111" "url": "http://secunia.com/advisories/32111"
}, },
{
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html"
},
{ {
"name": "4405", "name": "4405",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080214 Philips VOIP841 Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488127/100/200/threaded"
},
{ {
"name": "5113", "name": "5113",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5113" "url": "https://www.exploit-db.com/exploits/5113"
}, },
{
"name": "28978",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28978"
},
{ {
"name": "27790", "name": "27790",
"refsource": "BID", "refsource": "BID",
@ -73,9 +73,9 @@
"url": "http://www.vupen.com/english/advisories/2008/0583" "url": "http://www.vupen.com/english/advisories/2008/0583"
}, },
{ {
"name" : "28978", "name": "20080214 Philips VOIP841 Multiple Vulnerabilities",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/28978" "url": "http://www.securityfocus.com/archive/1/488127/100/200/threaded"
}, },
{ {
"name": "4536", "name": "4536",

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "31968",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31968"
},
{
"name": "31312",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31312"
},
{ {
"name": "20080921 [MajorSecurity Advisory #53]BLUEPAGE CMS - Cross Site Scripting and Session Fixation Issues", "name": "20080921 [MajorSecurity Advisory #53]BLUEPAGE CMS - Cross Site Scripting and Session Fixation Issues",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -62,16 +72,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls53" "url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls53"
}, },
{
"name" : "31312",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31312"
},
{
"name" : "31968",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31968"
},
{ {
"name": "bluepagecms-index-xss(45321)", "name": "bluepagecms-index-xss(45321)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "7475", "name": "33174",
"refsource" : "EXPLOIT-DB", "refsource": "SECUNIA",
"url" : "https://www.exploit-db.com/exploits/7475" "url": "http://secunia.com/advisories/33174"
}, },
{ {
"name": "50721", "name": "50721",
@ -63,9 +63,9 @@
"url": "http://osvdb.org/50721" "url": "http://osvdb.org/50721"
}, },
{ {
"name" : "33174", "name": "7475",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/33174" "url": "https://www.exploit-db.com/exploits/7475"
}, },
{ {
"name": "babbleboard-index-csrf(47396)", "name": "babbleboard-index-csrf(47396)",

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20081023 SiteEngine 5.x Multiple Remote Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/497747/100/0/threaded"
},
{ {
"name": "6823", "name": "6823",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6823" "url": "https://www.exploit-db.com/exploits/6823"
}, },
{
"name": "20081023 SiteEngine 5.x Multiple Remote Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497747/100/0/threaded"
},
{ {
"name": "31888", "name": "31888",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2191", "ID": "CVE-2013-2191",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,14 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2013/06/19/6" "url": "http://www.openwall.com/lists/oss-security/2013/06/19/6"
}, },
{ {
"name" : "[python-bugzilla] 20130619 ANNOUNCE: python-bugzilla 0.9.0 released", "name": "openSUSE-SU-2013:1155",
"refsource" : "MLIST", "refsource": "SUSE",
"url" : "https://lists.fedorahosted.org/pipermail/python-bugzilla/2013-June/000104.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00026.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=951594",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=951594"
}, },
{ {
"name": "https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef", "name": "https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef",
@ -78,9 +73,14 @@
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00025.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00025.html"
}, },
{ {
"name" : "openSUSE-SU-2013:1155", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=951594",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-07/msg00026.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=951594"
},
{
"name": "[python-bugzilla] 20130619 ANNOUNCE: python-bugzilla 0.9.0 released",
"refsource": "MLIST",
"url": "https://lists.fedorahosted.org/pipermail/python-bugzilla/2013-June/000104.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2013-2880", "ID": "CVE-2013-2880",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,54 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html", "name": "https://code.google.com/p/chromium/issues/detail?id=236845",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html" "url": "https://code.google.com/p/chromium/issues/detail?id=236845"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=160450", "name": "https://code.google.com/p/chromium/issues/detail?id=256985",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=160450" "url": "https://code.google.com/p/chromium/issues/detail?id=256985"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=167924", "name": "https://code.google.com/p/chromium/issues/detail?id=242023",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=167924" "url": "https://code.google.com/p/chromium/issues/detail?id=242023"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=173688", "name": "https://code.google.com/p/chromium/issues/detail?id=196570",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=173688" "url": "https://code.google.com/p/chromium/issues/detail?id=196570"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=176027", "name": "https://code.google.com/p/chromium/issues/detail?id=243875",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=176027" "url": "https://code.google.com/p/chromium/issues/detail?id=243875"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=176676", "name": "https://code.google.com/p/chromium/issues/detail?id=226091",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=176676" "url": "https://code.google.com/p/chromium/issues/detail?id=226091"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=177215",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=177215"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=177688",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=177688"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=178264",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=178264"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=178266",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=178266"
}, },
{ {
"name": "https://code.google.com/p/chromium/issues/detail?id=179653", "name": "https://code.google.com/p/chromium/issues/detail?id=179653",
@ -113,29 +93,29 @@
"url": "https://code.google.com/p/chromium/issues/detail?id=187243" "url": "https://code.google.com/p/chromium/issues/detail?id=187243"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=189084", "name": "https://code.google.com/p/chromium/issues/detail?id=240055",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=189084" "url": "https://code.google.com/p/chromium/issues/detail?id=240055"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=189090", "name": "https://code.google.com/p/chromium/issues/detail?id=178266",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=189090" "url": "https://code.google.com/p/chromium/issues/detail?id=178266"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=196570", "name": "https://code.google.com/p/chromium/issues/detail?id=243881",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=196570" "url": "https://code.google.com/p/chromium/issues/detail?id=243881"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=222852", "name": "https://code.google.com/p/chromium/issues/detail?id=173688",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=222852" "url": "https://code.google.com/p/chromium/issues/detail?id=173688"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=223482", "name": "https://code.google.com/p/chromium/issues/detail?id=176027",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=223482" "url": "https://code.google.com/p/chromium/issues/detail?id=176027"
}, },
{ {
"name": "https://code.google.com/p/chromium/issues/detail?id=223772", "name": "https://code.google.com/p/chromium/issues/detail?id=223772",
@ -143,19 +123,24 @@
"url": "https://code.google.com/p/chromium/issues/detail?id=223772" "url": "https://code.google.com/p/chromium/issues/detail?id=223772"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=225798", "name": "https://code.google.com/p/chromium/issues/detail?id=239411",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=225798" "url": "https://code.google.com/p/chromium/issues/detail?id=239411"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=226091", "name": "https://code.google.com/p/chromium/issues/detail?id=240961",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=226091" "url": "https://code.google.com/p/chromium/issues/detail?id=240961"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=227157", "name": "https://code.google.com/p/chromium/issues/detail?id=235732",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=227157" "url": "https://code.google.com/p/chromium/issues/detail?id=235732"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=177688",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=177688"
}, },
{ {
"name": "https://code.google.com/p/chromium/issues/detail?id=230726", "name": "https://code.google.com/p/chromium/issues/detail?id=230726",
@ -163,9 +148,89 @@
"url": "https://code.google.com/p/chromium/issues/detail?id=230726" "url": "https://code.google.com/p/chromium/issues/detail?id=230726"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=235732", "name": "https://code.google.com/p/chromium/issues/detail?id=246240",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=235732" "url": "https://code.google.com/p/chromium/issues/detail?id=246240"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=227157",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=227157"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=240449",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=240449"
},
{
"name": "oval:org.mitre.oval:def:17281",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17281"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=242931",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=242931"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=242786",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=242786"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=160450",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=160450"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=167924",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=167924"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=178264",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=178264"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=189090",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=189090"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=177215",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=177215"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=243045",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=243045"
},
{
"name": "DSA-2724",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2724"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=223482",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=223482"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=237263",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=237263"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=189084",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=189084"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=222852",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=222852"
}, },
{ {
"name": "https://code.google.com/p/chromium/issues/detail?id=236269", "name": "https://code.google.com/p/chromium/issues/detail?id=236269",
@ -178,84 +243,19 @@
"url": "https://code.google.com/p/chromium/issues/detail?id=236556" "url": "https://code.google.com/p/chromium/issues/detail?id=236556"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=236845", "name": "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=236845" "url": "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=237263", "name": "https://code.google.com/p/chromium/issues/detail?id=176676",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=237263" "url": "https://code.google.com/p/chromium/issues/detail?id=176676"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=239411", "name": "https://code.google.com/p/chromium/issues/detail?id=225798",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=239411" "url": "https://code.google.com/p/chromium/issues/detail?id=225798"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=240055",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=240055"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=240449",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=240449"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=240961",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=240961"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=242023",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=242023"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=242786",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=242786"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=242931",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=242931"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=243045",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=243045"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=243875",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=243875"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=243881",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=243881"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=246240",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=246240"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=256985",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=256985"
},
{
"name" : "DSA-2724",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2724"
},
{
"name" : "oval:org.mitre.oval:def:17281",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17281"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-6021", "ID": "CVE-2013-6021",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "29273",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/29273"
},
{ {
"name": "https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/", "name": "https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/" "url": "https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/"
}, },
{ {
"name" : "http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/", "name": "29273",
"refsource" : "CONFIRM", "refsource": "EXPLOIT-DB",
"url" : "http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/" "url": "http://www.exploit-db.com/exploits/29273"
},
{
"name": "98752",
"refsource": "OSVDB",
"url": "http://osvdb.org/98752"
}, },
{ {
"name": "http://watchguardsecuritycenter.com/2013/10/17/xtm-11-8-secfixes/", "name": "http://watchguardsecuritycenter.com/2013/10/17/xtm-11-8-secfixes/",
@ -73,9 +73,9 @@
"url": "http://watchguardsecuritycenter.com/2013/10/17/xtm-11-8-secfixes/" "url": "http://watchguardsecuritycenter.com/2013/10/17/xtm-11-8-secfixes/"
}, },
{ {
"name" : "VU#233990", "name": "http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/",
"refsource" : "CERT-VN", "refsource": "CONFIRM",
"url" : "http://www.kb.cert.org/vuls/id/233990" "url": "http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/"
}, },
{ {
"name": "63227", "name": "63227",
@ -83,9 +83,9 @@
"url": "http://www.securityfocus.com/bid/63227" "url": "http://www.securityfocus.com/bid/63227"
}, },
{ {
"name" : "98752", "name": "VU#233990",
"refsource" : "OSVDB", "refsource": "CERT-VN",
"url" : "http://osvdb.org/98752" "url": "http://www.kb.cert.org/vuls/id/233990"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-6032", "ID": "CVE-2013-6032",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.lexmark.com/index?page=content&id=TE586",
"refsource" : "CONFIRM",
"url" : "http://support.lexmark.com/index?page=content&id=TE586"
},
{ {
"name": "VU#108062", "name": "VU#108062",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/108062" "url": "http://www.kb.cert.org/vuls/id/108062"
},
{
"name": "http://support.lexmark.com/index?page=content&id=TE586",
"refsource": "CONFIRM",
"url": "http://support.lexmark.com/index?page=content&id=TE586"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6092", "ID": "CVE-2013-6092",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://groups.google.com/d/msg/mod-pagespeed-announce/oo015UHRxMc/JcAuf1hE8L8J", "name": "55429",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://groups.google.com/d/msg/mod-pagespeed-announce/oo015UHRxMc/JcAuf1hE8L8J" "url": "http://secunia.com/advisories/55429"
}, },
{ {
"name": "99081", "name": "99081",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/99081" "url": "http://osvdb.org/99081"
}, },
{
"name": "https://groups.google.com/d/msg/mod-pagespeed-announce/oo015UHRxMc/JcAuf1hE8L8J",
"refsource": "CONFIRM",
"url": "https://groups.google.com/d/msg/mod-pagespeed-announce/oo015UHRxMc/JcAuf1hE8L8J"
},
{ {
"name": "1029262", "name": "1029262",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029262" "url": "http://www.securitytracker.com/id/1029262"
},
{
"name" : "55429",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/55429"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6578", "ID": "CVE-2013-6578",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20131126 CVE Request: FFmpeg 2.1 multiple problems",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2013/11/26/7"
},
{
"name" : "[oss-security] 20131208 Re: CVE Request: FFmpeg 2.1 multiple problems",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2013/12/08/3"
},
{
"name" : "http://ffmpeg.org/security.html",
"refsource" : "CONFIRM",
"url" : "http://ffmpeg.org/security.html"
},
{ {
"name": "https://github.com/FFmpeg/FFmpeg/commit/fe448cd28d674c3eff3072552eae366d0b659ce9", "name": "https://github.com/FFmpeg/FFmpeg/commit/fe448cd28d674c3eff3072552eae366d0b659ce9",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/FFmpeg/FFmpeg/commit/fe448cd28d674c3eff3072552eae366d0b659ce9" "url": "https://github.com/FFmpeg/FFmpeg/commit/fe448cd28d674c3eff3072552eae366d0b659ce9"
}, },
{
"name": "GLSA-201603-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-06"
},
{ {
"name": "https://trac.ffmpeg.org/ticket/2921", "name": "https://trac.ffmpeg.org/ticket/2921",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://trac.ffmpeg.org/ticket/2921" "url": "https://trac.ffmpeg.org/ticket/2921"
}, },
{ {
"name" : "GLSA-201603-06", "name": "http://ffmpeg.org/security.html",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201603-06" "url": "http://ffmpeg.org/security.html"
},
{
"name": "[oss-security] 20131208 Re: CVE Request: FFmpeg 2.1 multiple problems",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2013/12/08/3"
},
{
"name": "[oss-security] 20131126 CVE Request: FFmpeg 2.1 multiple problems",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2013/11/26/7"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "100630",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100630"
},
{ {
"name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update", "name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
"refsource": "MLIST", "refsource": "MLIST",
@ -66,11 +71,6 @@
"name": "DSA-3996", "name": "DSA-3996",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3996" "url": "http://www.debian.org/security/2017/dsa-3996"
},
{
"name" : "100630",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/100630"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20171118 [SECURITY] [DLA 1177-1] poppler security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html"
},
{ {
"name": "https://bugzilla.freedesktop.org/show_bug.cgi?id=102653", "name": "https://bugzilla.freedesktop.org/show_bug.cgi?id=102653",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "DSA-4079", "name": "DSA-4079",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4079" "url": "https://www.debian.org/security/2018/dsa-4079"
},
{
"name": "[debian-lts-announce] 20171118 [SECURITY] [DLA 1177-1] poppler security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-15456", "ID": "CVE-2017-15456",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[security] 20170806 ares_parse_a_reply out-of-bounds read (CVE=2017-9454)",
"refsource" : "MLIST",
"url" : "https://list.resiprocate.org/archive/resiprocate-users/msg02700.html"
},
{ {
"name": "https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df", "name": "https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df" "url": "https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df"
},
{
"name": "[security] 20170806 ares_parse_a_reply out-of-bounds read (CVE=2017-9454)",
"refsource": "MLIST",
"url": "https://list.resiprocate.org/archive/resiprocate-users/msg02700.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "42258", "name": "99272",
"refsource" : "EXPLOIT-DB", "refsource": "BID",
"url" : "https://www.exploit-db.com/exploits/42258/" "url": "http://www.securityfocus.com/bid/99272"
}, },
{ {
"name": "https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/", "name": "https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/",
@ -63,9 +63,9 @@
"url": "https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/" "url": "https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/"
}, },
{ {
"name" : "99272", "name": "42258",
"refsource" : "BID", "refsource": "EXPLOIT-DB",
"url" : "http://www.securityfocus.com/bid/99272" "url": "https://www.exploit-db.com/exploits/42258/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "1/11/2018 14:07:39", "DATE_ASSIGNED": "1/11/2018 14:07:39",
"ID": "CVE-2018-1000041", "ID": "CVE-2018-1000041",
"REQUESTER": "alexbirsan@intigriti.me", "REQUESTER": "alexbirsan@intigriti.me",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "librsvg", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "GNOME" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Improper input validation" "value": "n/a"
} }
] ]
} }
@ -55,9 +55,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[debian-lts-announce] 20180212 [SECURITY] [DLA 1278-1] librsvg security update", "name": "https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "https://lists.debian.org/debian-lts-announce/2018/02/msg00013.html" "url": "https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd"
}, },
{ {
"name": "https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea", "name": "https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea",
@ -65,9 +65,9 @@
"url": "https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea" "url": "https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea"
}, },
{ {
"name" : "https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd", "name": "[debian-lts-announce] 20180212 [SECURITY] [DLA 1278-1] librsvg security update",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd" "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00013.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "1/31/2018 20:29:42", "DATE_ASSIGNED": "1/31/2018 20:29:42",
"ID": "CVE-2018-1000042", "ID": "CVE-2018-1000042",
"REQUESTER": "medsgerj@gmail.com", "REQUESTER": "medsgerj@gmail.com",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Squert", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "1.3.0 through 1.6.7" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Security Onion Solutions" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-78: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)" "value": "n/a"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "3/6/2018 21:59:48", "DATE_ASSIGNED": "3/6/2018 21:59:48",
"ID": "CVE-2018-1000119", "ID": "CVE-2018-1000119",
"REQUESTER": "kurt@seifried.org", "REQUESTER": "kurt@seifried.org",
@ -13,21 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "rack-protection", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "2.0.0.rc3 and earlier" "version_value": "n/a"
},
{
"version_value" : "1.5.4 and earlier"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Sinatra" "vendor_name": "n/a"
} }
] ]
} }
@ -49,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-208" "value": "n/a"
} }
] ]
} }
@ -63,9 +60,9 @@
"url": "https://github.com/sinatra/rack-protection/pull/98" "url": "https://github.com/sinatra/rack-protection/pull/98"
}, },
{ {
"name" : "https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109", "name": "RHSA-2018:1060",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109" "url": "https://access.redhat.com/errata/RHSA-2018:1060"
}, },
{ {
"name": "DSA-4247", "name": "DSA-4247",
@ -73,9 +70,9 @@
"url": "https://www.debian.org/security/2018/dsa-4247" "url": "https://www.debian.org/security/2018/dsa-4247"
}, },
{ {
"name" : "RHSA-2018:1060", "name": "https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "https://access.redhat.com/errata/RHSA-2018:1060" "url": "https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
},
{ {
"name": "106162", "name": "106162",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106162" "url": "http://www.securityfocus.com/bid/106162"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.ricoh.com/info/2018/1127_1.html",
"refsource" : "MISC",
"url" : "https://www.ricoh.com/info/2018/1127_1.html"
},
{ {
"name": "JVN#55263945", "name": "JVN#55263945",
"refsource": "JVN", "refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN55263945/index.html" "url": "https://jvn.jp/en/jp/JVN55263945/index.html"
},
{
"name": "https://www.ricoh.com/info/2018/1127_1.html",
"refsource": "MISC",
"url": "https://www.ricoh.com/info/2018/1127_1.html"
} }
] ]
} }

View File

@ -2,7 +2,30 @@
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-19510", "ID": "CVE-2018-19510",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
}, },
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
@ -11,7 +34,33 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "subscriber.php in Webgalamb through 7.0 is vulnerable to SQL injection via the Client-IP HTTP request header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html"
},
{
"url": "http://seclists.org/fulldisclosure/2019/Jan/15",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2019/Jan/15"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md",
"refsource" : "MISC",
"url" : "https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md"
},
{ {
"name": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/freeswitch_rce.py", "name": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/freeswitch_rce.py",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/freeswitch_rce.py" "url": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/freeswitch_rce.py"
},
{
"name": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md",
"refsource": "MISC",
"url": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md"
} }
] ]
} }

View File

@ -52,25 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/",
"refsource" : "MISC",
"url" : "https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/"
},
{ {
"name": "https://support.apple.com/HT208462", "name": "https://support.apple.com/HT208462",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT208462" "url": "https://support.apple.com/HT208462"
}, },
{ {
"name" : "https://support.apple.com/HT208463", "name": "1040265",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT208463" "url": "http://www.securitytracker.com/id/1040265"
},
{
"name" : "https://support.apple.com/HT208464",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208464"
}, },
{ {
"name": "102774", "name": "102774",
@ -78,9 +68,19 @@
"url": "http://www.securityfocus.com/bid/102774" "url": "http://www.securityfocus.com/bid/102774"
}, },
{ {
"name" : "1040265", "name": "https://support.apple.com/HT208464",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1040265" "url": "https://support.apple.com/HT208464"
},
{
"name": "https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/",
"refsource": "MISC",
"url": "https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/"
},
{
"name": "https://support.apple.com/HT208463",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208463"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{ {
"name": "102996", "name": "102996",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102996" "url": "http://www.securityfocus.com/bid/102996"
}, },
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{ {
"name": "1040364", "name": "1040364",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html",
"refsource" : "MISC",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
},
{ {
"name": "104169", "name": "104169",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/104169" "url": "http://www.securityfocus.com/bid/104169"
}, },
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html",
"refsource": "MISC",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
},
{ {
"name": "1040920", "name": "1040920",
"refsource": "SECTRACK", "refsource": "SECTRACK",