"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 06:47:41 +00:00
parent 0d9be55c8f
commit f6506835b4
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 3968 additions and 3922 deletions

View File

@ -53,49 +53,49 @@
"references": {
"reference_data": [
{
"name" : "20041027 PHP4 cURL functions bypass open_basedir",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=109898213806099&w=2"
},
{
"name" : "FLSA:2344",
"refsource" : "FEDORA",
"url" : "https://bugzilla.fedora.us/show_bug.cgi?id=2344"
},
{
"name" : "RHSA-2005:405",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-405.html"
"name": "php-openbasedir-restriction-bypass(17900)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17900"
},
{
"name": "RHSA-2005:406",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-406.html"
},
{
"name" : "20050120 [USN-66-1] PHP vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=110625060220934&w=2"
},
{
"name": "11557",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11557"
},
{
"name": "20050120 [USN-66-1] PHP vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110625060220934&w=2"
},
{
"name": "oval:org.mitre.oval:def:9279",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9279"
},
{
"name": "FLSA:2344",
"refsource": "FEDORA",
"url": "https://bugzilla.fedora.us/show_bug.cgi?id=2344"
},
{
"name": "1011984",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1011984"
},
{
"name" : "php-openbasedir-restriction-bypass(17900)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17900"
"name": "20041027 PHP4 cURL functions bypass open_basedir",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=109898213806099&w=2"
},
{
"name": "RHSA-2005:405",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-405.html"
}
]
}

View File

@ -52,40 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "20040315 Phorum 5.0.3 Beta && Earlier XSS Issues",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107939479713136&w=2"
},
{
"name" : "http://phorum.org/changelog.txt",
"refsource" : "CONFIRM",
"url" : "http://phorum.org/changelog.txt"
},
{
"name": "9882",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9882"
},
{
"name" : "4333",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/4333"
"name": "20040315 Phorum 5.0.3 Beta && Earlier XSS Issues",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107939479713136&w=2"
},
{
"name": "4334",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4334"
},
{
"name": "http://phorum.org/changelog.txt",
"refsource": "CONFIRM",
"url": "http://phorum.org/changelog.txt"
},
{
"name": "4335",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4335"
},
{
"name" : "1009433",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1009433"
"name": "phorum-register-xss(15494)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15494"
},
{
"name": "11157",
@ -93,9 +88,14 @@
"url": "http://secunia.com/advisories/11157"
},
{
"name" : "phorum-register-xss(15494)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15494"
"name": "1009433",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1009433"
},
{
"name": "4333",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4333"
}
]
}

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "20040323 How to crash a harddisk - the Ipswitch WS_FTP Server way",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=108006717731989&w=2"
"name": "11206",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11206"
},
{
"name": "9953",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9953"
},
{
"name": "20040323 How to crash a harddisk - the Ipswitch WS_FTP Server way",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108006717731989&w=2"
},
{
"name": "wsftp-rest-stor-dos(41831)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41831"
},
{
"name": "4542",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4542"
},
{
"name" : "11206",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/11206"
},
{
"name" : "1009529",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1009529"
},
{
"name": "wsftp-rest-dos(15560)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15560"
},
{
"name" : "wsftp-rest-stor-dos(41831)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41831"
"name": "1009529",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1009529"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20080212 Unicode buffer-overflow in RPM Remote Print Manager 4.5.1.11",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488010/100/0/threaded"
"name": "28905",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28905"
},
{
"name": "http://aluigi.altervista.org/adv/rpmlpdbof-adv.txt",
@ -67,16 +67,16 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27742"
},
{
"name": "20080212 Unicode buffer-overflow in RPM Remote Print Manager 4.5.1.11",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488010/100/0/threaded"
},
{
"name": "ADV-2008-0501",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0501"
},
{
"name" : "28905",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28905"
},
{
"name": "rpm-receivedatafile-bo(40432)",
"refsource": "XF",

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "6028",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6028"
},
{
"name" : "ADV-2008-2033",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2033/references"
},
{
"name": "30999",
"refsource": "SECUNIA",
@ -72,10 +62,20 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3994"
},
{
"name": "6028",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6028"
},
{
"name": "ray-sincpath-file-include(43644)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43644"
},
{
"name": "ADV-2008-2033",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2033/references"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "6015",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6015"
},
{
"name" : "30117",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30117"
"name": "3991",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3991"
},
{
"name": "ADV-2008-2016",
@ -72,15 +67,20 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30948"
},
{
"name" : "3991",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3991"
},
{
"name": "webxelleditor-upload-file-upload(43596)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43596"
},
{
"name": "30117",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30117"
},
{
"name": "6015",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6015"
}
]
}

View File

@ -53,35 +53,35 @@
"references": {
"reference_data": [
{
"name" : "20080805 Plogger <= 3.0 SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495116/100/0/threaded"
},
{
"name" : "6204",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6204"
"name": "4121",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4121"
},
{
"name": "http://www.gulftech.org/?node=research&article_id=00121-08042008",
"refsource": "MISC",
"url": "http://www.gulftech.org/?node=research&article_id=00121-08042008"
},
{
"name": "20080805 Plogger <= 3.0 SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495116/100/0/threaded"
},
{
"name": "http://dev.plogger.org/changeset/569",
"refsource": "CONFIRM",
"url": "http://dev.plogger.org/changeset/569"
},
{
"name": "6204",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6204"
},
{
"name": "30547",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30547"
},
{
"name" : "4121",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4121"
},
{
"name": "plogger-plogdownload-sql-injection(44233)",
"refsource": "XF",

View File

@ -52,65 +52,65 @@
},
"references": {
"reference_data": [
{
"name" : "20080922 Squirrelmail: Session hijacking vulnerability, CVE-2008-3663",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/496601/100/0/threaded"
},
{
"name" : "http://int21.de/cve/CVE-2008-3663-squirrelmail.html",
"refsource" : "MISC",
"url" : "http://int21.de/cve/CVE-2008-3663-squirrelmail.html"
},
{
"name": "http://www.nabble.com/ANNOUNCE:-SquirrelMail-1.4.16-Released-td19711998.html",
"refsource": "CONFIRM",
"url": "http://www.nabble.com/ANNOUNCE:-SquirrelMail-1.4.16-Released-td19711998.html"
},
{
"name" : "http://support.apple.com/kb/HT3438",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3438"
},
{
"name" : "APPLE-SA-2009-02-12",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name" : "SUSE-SR:2008:028",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html"
},
{
"name" : "SUSE-SR:2009:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name" : "31321",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31321"
},
{
"name" : "oval:org.mitre.oval:def:10548",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10548"
},
{
"name": "33937",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33937"
},
{
"name": "http://int21.de/cve/CVE-2008-3663-squirrelmail.html",
"refsource": "MISC",
"url": "http://int21.de/cve/CVE-2008-3663-squirrelmail.html"
},
{
"name": "31321",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31321"
},
{
"name": "http://support.apple.com/kb/HT3438",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "4304",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4304"
},
{
"name": "APPLE-SA-2009-02-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "20080922 Squirrelmail: Session hijacking vulnerability, CVE-2008-3663",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/496601/100/0/threaded"
},
{
"name": "squirrelmail-cookie-session-hijacking(45700)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45700"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "SUSE-SR:2008:028",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html"
},
{
"name": "oval:org.mitre.oval:def:10548",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10548"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=619467",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=619467"
},
{
"name" : "30676",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30676"
"name": "freeway-unspecified-file-include(44426)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44426"
},
{
"name": "31475",
@ -68,9 +63,14 @@
"url": "http://secunia.com/advisories/31475"
},
{
"name" : "freeway-unspecified-file-include(44426)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44426"
"name": "30676",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30676"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=619467",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=619467"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[linux-kernel] 20080903 [patch 05/16] nfsd: fix buffer overrun decoding NFSv4 acl",
"refsource" : "MLIST",
"url" : "http://lkml.org/lkml/2008/9/3/286"
},
{
"name": "[oss-security] 20080904 CVE request: kernel: nfsd: fix buffer overrun decoding NFSv4 acl",
"refsource": "MLIST",
@ -67,46 +62,6 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/09/04/18"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=91b80969ba466ba4b915a4a1d03add8c297add3f",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=91b80969ba466ba4b915a4a1d03add8c297add3f"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.4",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.4"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=461101",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=461101"
},
{
"name" : "DSA-1636",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1636"
},
{
"name" : "RHSA-2008:0857",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
},
{
"name" : "USN-659-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-659-1"
},
{
"name" : "31133",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31133"
},
{
"name" : "31881",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31881"
},
{
"name": "32190",
"refsource": "SECUNIA",
@ -117,6 +72,51 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32393"
},
{
"name": "DSA-1636",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1636"
},
{
"name": "31881",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31881"
},
{
"name": "USN-659-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-659-1"
},
{
"name": "[linux-kernel] 20080903 [patch 05/16] nfsd: fix buffer overrun decoding NFSv4 acl",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2008/9/3/286"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=91b80969ba466ba4b915a4a1d03add8c297add3f",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=91b80969ba466ba4b915a4a1d03add8c297add3f"
},
{
"name": "RHSA-2008:0857",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.4",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.4"
},
{
"name": "31133",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31133"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=461101",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461101"
},
{
"name": "linux-kernel-nfsv4-bo(45055)",
"refsource": "XF",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog",
"refsource": "CONFIRM",
"url": "http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog"
},
{
"name": "[oss-security] 20080911 Re: CVE Request (ruby -- DNS spoofing vulnerability in resolv.rb)",
"refsource": "MLIST",
@ -66,11 +71,6 @@
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217"
},
{
"name" : "http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog",
"refsource" : "CONFIRM",
"url" : "http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog"
}
]
}

View File

@ -52,31 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "HPSBMA02378",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962"
},
{
"name" : "SSRT080035",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962"
},
{
"name" : "31777",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31777"
},
{
"name" : "ADV-2008-2836",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2836"
},
{
"name": "1021064",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021064"
},
{
"name": "HPSBMA02378",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962"
},
{
"name": "32287",
"refsource": "SECUNIA",
@ -86,6 +71,21 @@
"name": "hp-sim-unspecified-security-bypass(45916)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45916"
},
{
"name": "SSRT080035",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962"
},
{
"name": "ADV-2008-2836",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2836"
},
{
"name": "31777",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31777"
}
]
}

View File

@ -52,46 +52,46 @@
},
"references": {
"reference_data": [
{
"name" : "20081008 ZDI-08-064: Novell eDirectory dhost.exe Accept Language Header Heap Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/497164/100/0/threaded"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-064",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-064"
},
{
"name": "http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7000086&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7000086&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953"
},
{
"name" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html"
},
{
"name" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html"
},
{
"name" : "ADV-2008-2738",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2738"
},
{
"name": "1020989",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020989"
},
{
"name": "ADV-2008-2738",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2738"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-064",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-064"
},
{
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html"
},
{
"name": "20081008 ZDI-08-064: Novell eDirectory dhost.exe Accept Language Header Heap Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497164/100/0/threaded"
},
{
"name": "32111",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32111"
},
{
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html"
},
{
"name": "4405",
"refsource": "SREASON",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20080214 Philips VOIP841 Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488127/100/200/threaded"
},
{
"name": "5113",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5113"
},
{
"name": "28978",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28978"
},
{
"name": "27790",
"refsource": "BID",
@ -73,9 +73,9 @@
"url": "http://www.vupen.com/english/advisories/2008/0583"
},
{
"name" : "28978",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28978"
"name": "20080214 Philips VOIP841 Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488127/100/200/threaded"
},
{
"name": "4536",

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "31968",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31968"
},
{
"name": "31312",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31312"
},
{
"name": "20080921 [MajorSecurity Advisory #53]BLUEPAGE CMS - Cross Site Scripting and Session Fixation Issues",
"refsource": "BUGTRAQ",
@ -62,16 +72,6 @@
"refsource": "MISC",
"url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls53"
},
{
"name" : "31312",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31312"
},
{
"name" : "31968",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31968"
},
{
"name": "bluepagecms-index-xss(45321)",
"refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "7475",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7475"
"name": "33174",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33174"
},
{
"name": "50721",
@ -63,9 +63,9 @@
"url": "http://osvdb.org/50721"
},
{
"name" : "33174",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33174"
"name": "7475",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7475"
},
{
"name": "babbleboard-index-csrf(47396)",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20081023 SiteEngine 5.x Multiple Remote Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/497747/100/0/threaded"
},
{
"name": "6823",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6823"
},
{
"name": "20081023 SiteEngine 5.x Multiple Remote Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497747/100/0/threaded"
},
{
"name": "31888",
"refsource": "BID",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2191",
"STATE": "PUBLIC"
},
@ -58,14 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2013/06/19/6"
},
{
"name" : "[python-bugzilla] 20130619 ANNOUNCE: python-bugzilla 0.9.0 released",
"refsource" : "MLIST",
"url" : "https://lists.fedorahosted.org/pipermail/python-bugzilla/2013-June/000104.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=951594",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=951594"
"name": "openSUSE-SU-2013:1155",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00026.html"
},
{
"name": "https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef",
@ -78,9 +73,14 @@
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00025.html"
},
{
"name" : "openSUSE-SU-2013:1155",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-07/msg00026.html"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=951594",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=951594"
},
{
"name": "[python-bugzilla] 20130619 ANNOUNCE: python-bugzilla 0.9.0 released",
"refsource": "MLIST",
"url": "https://lists.fedorahosted.org/pipermail/python-bugzilla/2013-June/000104.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2013-2880",
"STATE": "PUBLIC"
},
@ -53,54 +53,34 @@
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html",
"name": "https://code.google.com/p/chromium/issues/detail?id=236845",
"refsource": "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html"
"url": "https://code.google.com/p/chromium/issues/detail?id=236845"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=160450",
"name": "https://code.google.com/p/chromium/issues/detail?id=256985",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=160450"
"url": "https://code.google.com/p/chromium/issues/detail?id=256985"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=167924",
"name": "https://code.google.com/p/chromium/issues/detail?id=242023",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=167924"
"url": "https://code.google.com/p/chromium/issues/detail?id=242023"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=173688",
"name": "https://code.google.com/p/chromium/issues/detail?id=196570",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=173688"
"url": "https://code.google.com/p/chromium/issues/detail?id=196570"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=176027",
"name": "https://code.google.com/p/chromium/issues/detail?id=243875",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=176027"
"url": "https://code.google.com/p/chromium/issues/detail?id=243875"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=176676",
"name": "https://code.google.com/p/chromium/issues/detail?id=226091",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=176676"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=177215",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=177215"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=177688",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=177688"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=178264",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=178264"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=178266",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=178266"
"url": "https://code.google.com/p/chromium/issues/detail?id=226091"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=179653",
@ -113,29 +93,29 @@
"url": "https://code.google.com/p/chromium/issues/detail?id=187243"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=189084",
"name": "https://code.google.com/p/chromium/issues/detail?id=240055",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=189084"
"url": "https://code.google.com/p/chromium/issues/detail?id=240055"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=189090",
"name": "https://code.google.com/p/chromium/issues/detail?id=178266",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=189090"
"url": "https://code.google.com/p/chromium/issues/detail?id=178266"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=196570",
"name": "https://code.google.com/p/chromium/issues/detail?id=243881",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=196570"
"url": "https://code.google.com/p/chromium/issues/detail?id=243881"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=222852",
"name": "https://code.google.com/p/chromium/issues/detail?id=173688",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=222852"
"url": "https://code.google.com/p/chromium/issues/detail?id=173688"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=223482",
"name": "https://code.google.com/p/chromium/issues/detail?id=176027",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=223482"
"url": "https://code.google.com/p/chromium/issues/detail?id=176027"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=223772",
@ -143,19 +123,24 @@
"url": "https://code.google.com/p/chromium/issues/detail?id=223772"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=225798",
"name": "https://code.google.com/p/chromium/issues/detail?id=239411",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=225798"
"url": "https://code.google.com/p/chromium/issues/detail?id=239411"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=226091",
"name": "https://code.google.com/p/chromium/issues/detail?id=240961",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=226091"
"url": "https://code.google.com/p/chromium/issues/detail?id=240961"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=227157",
"name": "https://code.google.com/p/chromium/issues/detail?id=235732",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=227157"
"url": "https://code.google.com/p/chromium/issues/detail?id=235732"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=177688",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=177688"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=230726",
@ -163,9 +148,89 @@
"url": "https://code.google.com/p/chromium/issues/detail?id=230726"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=235732",
"name": "https://code.google.com/p/chromium/issues/detail?id=246240",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=235732"
"url": "https://code.google.com/p/chromium/issues/detail?id=246240"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=227157",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=227157"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=240449",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=240449"
},
{
"name": "oval:org.mitre.oval:def:17281",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17281"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=242931",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=242931"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=242786",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=242786"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=160450",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=160450"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=167924",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=167924"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=178264",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=178264"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=189090",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=189090"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=177215",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=177215"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=243045",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=243045"
},
{
"name": "DSA-2724",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2724"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=223482",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=223482"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=237263",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=237263"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=189084",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=189084"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=222852",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=222852"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=236269",
@ -178,84 +243,19 @@
"url": "https://code.google.com/p/chromium/issues/detail?id=236556"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=236845",
"name": "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=236845"
"url": "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=237263",
"name": "https://code.google.com/p/chromium/issues/detail?id=176676",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=237263"
"url": "https://code.google.com/p/chromium/issues/detail?id=176676"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=239411",
"name": "https://code.google.com/p/chromium/issues/detail?id=225798",
"refsource": "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=239411"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=240055",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=240055"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=240449",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=240449"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=240961",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=240961"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=242023",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=242023"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=242786",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=242786"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=242931",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=242931"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=243045",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=243045"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=243875",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=243875"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=243881",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=243881"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=246240",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=246240"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=256985",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=256985"
},
{
"name" : "DSA-2724",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2724"
},
{
"name" : "oval:org.mitre.oval:def:17281",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17281"
"url": "https://code.google.com/p/chromium/issues/detail?id=225798"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-6021",
"STATE": "PUBLIC"
},
@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "29273",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/29273"
},
{
"name": "https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/",
"refsource": "MISC",
"url": "https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/"
},
{
"name" : "http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/",
"refsource" : "CONFIRM",
"url" : "http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/"
"name": "29273",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/29273"
},
{
"name": "98752",
"refsource": "OSVDB",
"url": "http://osvdb.org/98752"
},
{
"name": "http://watchguardsecuritycenter.com/2013/10/17/xtm-11-8-secfixes/",
@ -73,9 +73,9 @@
"url": "http://watchguardsecuritycenter.com/2013/10/17/xtm-11-8-secfixes/"
},
{
"name" : "VU#233990",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/233990"
"name": "http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/",
"refsource": "CONFIRM",
"url": "http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/"
},
{
"name": "63227",
@ -83,9 +83,9 @@
"url": "http://www.securityfocus.com/bid/63227"
},
{
"name" : "98752",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/98752"
"name": "VU#233990",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/233990"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-6032",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.lexmark.com/index?page=content&id=TE586",
"refsource" : "CONFIRM",
"url" : "http://support.lexmark.com/index?page=content&id=TE586"
},
{
"name": "VU#108062",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/108062"
},
{
"name": "http://support.lexmark.com/index?page=content&id=TE586",
"refsource": "CONFIRM",
"url": "http://support.lexmark.com/index?page=content&id=TE586"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6092",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "https://groups.google.com/d/msg/mod-pagespeed-announce/oo015UHRxMc/JcAuf1hE8L8J",
"refsource" : "CONFIRM",
"url" : "https://groups.google.com/d/msg/mod-pagespeed-announce/oo015UHRxMc/JcAuf1hE8L8J"
"name": "55429",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55429"
},
{
"name": "99081",
"refsource": "OSVDB",
"url": "http://osvdb.org/99081"
},
{
"name": "https://groups.google.com/d/msg/mod-pagespeed-announce/oo015UHRxMc/JcAuf1hE8L8J",
"refsource": "CONFIRM",
"url": "https://groups.google.com/d/msg/mod-pagespeed-announce/oo015UHRxMc/JcAuf1hE8L8J"
},
{
"name": "1029262",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029262"
},
{
"name" : "55429",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/55429"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6578",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20131126 CVE Request: FFmpeg 2.1 multiple problems",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2013/11/26/7"
},
{
"name" : "[oss-security] 20131208 Re: CVE Request: FFmpeg 2.1 multiple problems",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2013/12/08/3"
},
{
"name" : "http://ffmpeg.org/security.html",
"refsource" : "CONFIRM",
"url" : "http://ffmpeg.org/security.html"
},
{
"name": "https://github.com/FFmpeg/FFmpeg/commit/fe448cd28d674c3eff3072552eae366d0b659ce9",
"refsource": "CONFIRM",
"url": "https://github.com/FFmpeg/FFmpeg/commit/fe448cd28d674c3eff3072552eae366d0b659ce9"
},
{
"name": "GLSA-201603-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-06"
},
{
"name": "https://trac.ffmpeg.org/ticket/2921",
"refsource": "CONFIRM",
"url": "https://trac.ffmpeg.org/ticket/2921"
},
{
"name" : "GLSA-201603-06",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-06"
"name": "http://ffmpeg.org/security.html",
"refsource": "CONFIRM",
"url": "http://ffmpeg.org/security.html"
},
{
"name": "[oss-security] 20131208 Re: CVE Request: FFmpeg 2.1 multiple problems",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2013/12/08/3"
},
{
"name": "[oss-security] 20131126 CVE Request: FFmpeg 2.1 multiple problems",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2013/11/26/7"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "100630",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100630"
},
{
"name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
"refsource": "MLIST",
@ -66,11 +71,6 @@
"name": "DSA-3996",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3996"
},
{
"name" : "100630",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/100630"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20171118 [SECURITY] [DLA 1177-1] poppler security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html"
},
{
"name": "https://bugzilla.freedesktop.org/show_bug.cgi?id=102653",
"refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "DSA-4079",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4079"
},
{
"name": "[debian-lts-announce] 20171118 [SECURITY] [DLA 1177-1] poppler security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-15456",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[security] 20170806 ares_parse_a_reply out-of-bounds read (CVE=2017-9454)",
"refsource" : "MLIST",
"url" : "https://list.resiprocate.org/archive/resiprocate-users/msg02700.html"
},
{
"name": "https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df",
"refsource": "CONFIRM",
"url": "https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df"
},
{
"name": "[security] 20170806 ares_parse_a_reply out-of-bounds read (CVE=2017-9454)",
"refsource": "MLIST",
"url": "https://list.resiprocate.org/archive/resiprocate-users/msg02700.html"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "42258",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/42258/"
"name": "99272",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99272"
},
{
"name": "https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/",
@ -63,9 +63,9 @@
"url": "https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/"
},
{
"name" : "99272",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99272"
"name": "42258",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42258/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "1/11/2018 14:07:39",
"ID": "CVE-2018-1000041",
"REQUESTER": "alexbirsan@intigriti.me",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "librsvg",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "GNOME"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Improper input validation"
"value": "n/a"
}
]
}
@ -55,9 +55,9 @@
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20180212 [SECURITY] [DLA 1278-1] librsvg security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/02/msg00013.html"
"name": "https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd"
},
{
"name": "https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea",
@ -65,9 +65,9 @@
"url": "https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea"
},
{
"name" : "https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd",
"refsource" : "CONFIRM",
"url" : "https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd"
"name": "[debian-lts-announce] 20180212 [SECURITY] [DLA 1278-1] librsvg security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00013.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "1/31/2018 20:29:42",
"ID": "CVE-2018-1000042",
"REQUESTER": "medsgerj@gmail.com",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Squert",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1.3.0 through 1.6.7"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Security Onion Solutions"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-78: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "3/6/2018 21:59:48",
"ID": "CVE-2018-1000119",
"REQUESTER": "kurt@seifried.org",
@ -13,21 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "rack-protection",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.0.0.rc3 and earlier"
},
{
"version_value" : "1.5.4 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Sinatra"
"vendor_name": "n/a"
}
]
}
@ -49,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-208"
"value": "n/a"
}
]
}
@ -63,9 +60,9 @@
"url": "https://github.com/sinatra/rack-protection/pull/98"
},
{
"name" : "https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109",
"refsource" : "CONFIRM",
"url" : "https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109"
"name": "RHSA-2018:1060",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1060"
},
{
"name": "DSA-4247",
@ -73,9 +70,9 @@
"url": "https://www.debian.org/security/2018/dsa-4247"
},
{
"name" : "RHSA-2018:1060",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:1060"
"name": "https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109",
"refsource": "CONFIRM",
"url": "https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
},
{
"name": "106162",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106162"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.ricoh.com/info/2018/1127_1.html",
"refsource" : "MISC",
"url" : "https://www.ricoh.com/info/2018/1127_1.html"
},
{
"name": "JVN#55263945",
"refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN55263945/index.html"
},
{
"name": "https://www.ricoh.com/info/2018/1127_1.html",
"refsource": "MISC",
"url": "https://www.ricoh.com/info/2018/1127_1.html"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-19510",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,33 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "subscriber.php in Webgalamb through 7.0 is vulnerable to SQL injection via the Client-IP HTTP request header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html"
},
{
"url": "http://seclists.org/fulldisclosure/2019/Jan/15",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2019/Jan/15"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md",
"refsource" : "MISC",
"url" : "https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md"
},
{
"name": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/freeswitch_rce.py",
"refsource": "MISC",
"url": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/freeswitch_rce.py"
},
{
"name": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md",
"refsource": "MISC",
"url": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md"
}
]
}

View File

@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/",
"refsource" : "MISC",
"url" : "https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/"
},
{
"name": "https://support.apple.com/HT208462",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208462"
},
{
"name" : "https://support.apple.com/HT208463",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208463"
},
{
"name" : "https://support.apple.com/HT208464",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208464"
"name": "1040265",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040265"
},
{
"name": "102774",
@ -78,9 +68,19 @@
"url": "http://www.securityfocus.com/bid/102774"
},
{
"name" : "1040265",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040265"
"name": "https://support.apple.com/HT208464",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208464"
},
{
"name": "https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/",
"refsource": "MISC",
"url": "https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/"
},
{
"name": "https://support.apple.com/HT208463",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208463"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{
"name": "102996",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102996"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{
"name": "1040364",
"refsource": "SECTRACK",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html",
"refsource" : "MISC",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
},
{
"name": "104169",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104169"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html",
"refsource": "MISC",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
},
{
"name": "1040920",
"refsource": "SECTRACK",