"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:14:57 +00:00
parent 2f26b93ecf
commit f88569b63c
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 4198 additions and 4198 deletions

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "netopia-telnet-dos(6001)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6001"
},
{
"name": "20010123 Make The Netopia R9100 Router To Crash",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "2287",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2287"
},
{
"name" : "netopia-telnet-dos(6001)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6001"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM",
"url": "http://phpnuke.org/download.php?dcategory=Fixes"
},
{
"name" : "php-nuke-url-redirect(6342)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6342"
},
{
"name": "2544",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2544"
},
{
"name": "php-nuke-url-redirect(6342)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6342"
}
]
}

View File

@ -53,8 +53,18 @@
"references": {
"reference_data": [
{
"name" : "20010323 Elron IM Products Vulnerability ",
"name": "2520",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2520"
},
{
"name": "2519",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2519"
},
{
"refsource": "BUGTRAQ",
"name": "20010323 Elron IM Products Vulnerability",
"url": "http://marc.info/?l=bugtraq&m=98538867727489&w=2"
},
{
@ -66,16 +76,6 @@
"name": "20010406 http://archives.neohapsis.com/archives/bugtraq/2001-03/0345.html",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0382.html"
},
{
"name" : "2519",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2519"
},
{
"name" : "2520",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2520"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20010418 Eudora file leakage problem (still)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/177369"
"name": "2616",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2616"
},
{
"name": "eudora-plain-text-attachment(6431)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6431"
},
{
"name" : "2616",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2616"
},
{
"name": "3085",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/3085"
},
{
"name": "20010418 Eudora file leakage problem (still)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/177369"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20011212 Buffer Overflow in /bin/login",
"refsource" : "ISS",
"url" : "http://xforce.iss.net/alerts/advise105.php"
},
{
"name" : "20011219 Linux distributions and /bin/login overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/246487"
"name": "oval:org.mitre.oval:def:2025",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2025"
},
{
"name": "CA-2001-34",
@ -68,49 +63,54 @@
"url": "http://www.cert.org/advisories/CA-2001-34.html"
},
{
"name" : "VU#569272",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/569272"
},
{
"name" : "CSSA-2001-SCO.40",
"refsource" : "CALDERA",
"url" : "ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/CSSA-2001-SCO.40.txt"
},
{
"name" : "00213",
"refsource" : "SUN",
"url" : "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/213"
"name": "telnet-tab-bo(7284)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7284"
},
{
"name": "IY26221",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY26221&apar=only"
},
{
"name" : "20011201-01-I",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I"
},
{
"name": "20011214 Sun Solaris login bug patches out",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=100844757228307&w=2"
},
{
"name": "CSSA-2001-SCO.40",
"refsource": "CALDERA",
"url": "ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/CSSA-2001-SCO.40.txt"
},
{
"name": "20011219 Linux distributions and /bin/login overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/246487"
},
{
"name": "20011201-01-I",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I"
},
{
"name": "3681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3681"
},
{
"name" : "oval:org.mitre.oval:def:2025",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2025"
"name": "20011212 Buffer Overflow in /bin/login",
"refsource": "ISS",
"url": "http://xforce.iss.net/alerts/advise105.php"
},
{
"name" : "telnet-tab-bo(7284)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7284"
"name": "VU#569272",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/569272"
},
{
"name": "00213",
"refsource": "SUN",
"url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/213"
}
]
}

View File

@ -52,41 +52,41 @@
},
"references": {
"reference_data": [
{
"name" : "20080123 Syhunt: HFS (HTTP File Server) Log Arbitrary File/Directory Manipulation and Denial-of-Service Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/486873/100/0/threaded"
},
{
"name": "http://www.rejetto.com/hfs/?f=wn",
"refsource": "MISC",
"url": "http://www.rejetto.com/hfs/?f=wn"
},
{
"name" : "http://www.syhunt.com/advisories/hfs-1-log.txt",
"refsource" : "MISC",
"url" : "http://www.syhunt.com/advisories/hfs-1-log.txt"
},
{
"name" : "http://www.syhunt.com/advisories/hfshack.txt",
"refsource" : "MISC",
"url" : "http://www.syhunt.com/advisories/hfshack.txt"
},
{
"name": "27423",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27423"
},
{
"name" : "28631",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28631"
},
{
"name": "3581",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3581"
},
{
"name": "20080123 Syhunt: HFS (HTTP File Server) Log Arbitrary File/Directory Manipulation and Denial-of-Service Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/486873/100/0/threaded"
},
{
"name": "http://www.syhunt.com/advisories/hfshack.txt",
"refsource": "MISC",
"url": "http://www.syhunt.com/advisories/hfshack.txt"
},
{
"name": "http://www.syhunt.com/advisories/hfs-1-log.txt",
"refsource": "MISC",
"url": "http://www.syhunt.com/advisories/hfs-1-log.txt"
},
{
"name": "28631",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28631"
},
{
"name": "hfs-unspecified-command-execution(39873)",
"refsource": "XF",

View File

@ -53,45 +53,45 @@
"references": {
"reference_data": [
{
"name" : "http://docs.info.apple.com/article.html?artnum=307562",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name" : "APPLE-SA-2008-03-18",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name" : "TA08-079A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
},
{
"name" : "28365",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28365"
"name": "1019673",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019673"
},
{
"name": "28304",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28304"
},
{
"name": "28365",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28365"
},
{
"name": "TA08-079A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
},
{
"name": "ADV-2008-0924",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"name" : "1019673",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019673"
},
{
"name": "29420",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29420"
},
{
"name": "APPLE-SA-2008-03-18",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307562",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name": "macos-pax-code-execution(41288)",
"refsource": "XF",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20080304 Minigal 2 critical XSS",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=120467196623452&w=2"
},
{
"name": "28098",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28098"
},
{
"name": "20080304 Minigal 2 critical XSS",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=120467196623452&w=2"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "jeeblesdirectory-path-xss(41183)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41183"
},
{
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/28221.html",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "28221",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28221"
},
{
"name" : "jeeblesdirectory-path-xss(41183)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41183"
}
]
}

View File

@ -52,6 +52,51 @@
},
"references": {
"reference_data": [
{
"name": "GLSA-201209-25",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"name": "3755",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3755"
},
{
"name": "http://www.vmware.com/support/server/doc/releasenotes_server.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
},
{
"name": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html"
},
{
"name": "vmware-namedpipes-privilege-escalation(41259)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41259"
},
{
"name": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
},
{
"name": "http://www.vmware.com/support/player/doc/releasenotes_player.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
},
{
"name": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
},
{
"name": "1019621",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019621"
},
{
"name": "20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues",
"refsource": "BUGTRAQ",
@ -62,70 +107,25 @@
"refsource": "MLIST",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2008-0005.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2008-0005.html"
},
{
"name" : "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html"
},
{
"name" : "http://www.vmware.com/support/player/doc/releasenotes_player.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/player/doc/releasenotes_player.html"
},
{
"name" : "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
},
{
"name" : "http://www.vmware.com/support/server/doc/releasenotes_server.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/server/doc/releasenotes_server.html"
},
{
"name": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
},
{
"name" : "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
},
{
"name" : "GLSA-201209-25",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"name" : "28276",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28276"
},
{
"name": "ADV-2008-0905",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0905/references"
},
{
"name" : "1019621",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019621"
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html"
},
{
"name" : "3755",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3755"
},
{
"name" : "vmware-namedpipes-privilege-escalation(41259)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41259"
"name": "28276",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28276"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-1444",
"STATE": "PUBLIC"
},
@ -53,35 +53,25 @@
"references": {
"reference_data": [
{
"name" : "20080610 ZDI-08-040: Microsoft DirectX SAMI File Format Name Parsing Stack Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/493250/100/0/threaded"
"name": "ADV-2008-1780",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1780"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-040/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-040/"
"name": "3937",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3937"
},
{
"name" : "HPSBST02344",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=121380194923597&w=2"
},
{
"name" : "SSRT080087",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=121380194923597&w=2"
"name": "1020223",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1020223"
},
{
"name": "MS08-033",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033"
},
{
"name" : "TA08-162B",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-162B.html"
},
{
"name": "29578",
"refsource": "BID",
@ -93,14 +83,19 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5562"
},
{
"name" : "ADV-2008-1780",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1780"
"name": "TA08-162B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html"
},
{
"name" : "1020223",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1020223"
"name": "HPSBST02344",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=121380194923597&w=2"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-040/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-040/"
},
{
"name": "30579",
@ -108,9 +103,14 @@
"url": "http://secunia.com/advisories/30579"
},
{
"name" : "3937",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3937"
"name": "20080610 ZDI-08-040: Microsoft DirectX SAMI File Format Name Parsing Stack Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493250/100/0/threaded"
},
{
"name": "SSRT080087",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=121380194923597&w=2"
}
]
}

View File

@ -53,49 +53,49 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html"
},
{
"name" : "HPSBMA02133",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/491024/100/0/threaded"
},
{
"name" : "SSRT061201",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/491024/100/0/threaded"
},
{
"name" : "ADV-2008-1233",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1233/references"
"name": "oracle-cpu-april-2008(41858)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41858"
},
{
"name": "ADV-2008-1267",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1267/references"
},
{
"name": "ADV-2008-1233",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1233/references"
},
{
"name": "1019855",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019855"
},
{
"name" : "29874",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29874"
},
{
"name": "29829",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29829"
},
{
"name" : "oracle-cpu-april-2008(41858)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41858"
"name": "HPSBMA02133",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/491024/100/0/threaded"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html"
},
{
"name": "29874",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29874"
},
{
"name": "SSRT061201",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/491024/100/0/threaded"
},
{
"name": "oracle-jinitiator-unauth-access(42045)",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-5077",
"STATE": "PUBLIC"
},
@ -53,94 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/502322/100/0/threaded"
},
{
"name" : "20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/499827/100/0/threaded"
},
{
"name" : "http://www.ocert.org/advisories/ocert-2008-016.html",
"refsource" : "MISC",
"url" : "http://www.ocert.org/advisories/ocert-2008-016.html"
},
{
"name" : "http://voodoo-circle.sourceforge.net/sa/sa-20090123-01.html",
"refsource" : "CONFIRM",
"url" : "http://voodoo-circle.sourceforge.net/sa/sa-20090123-01.html"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2009-038.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2009-038.htm"
},
{
"name" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=837653",
"refsource" : "CONFIRM",
"url" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=837653"
"name": "SSRT090002",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=123859864430555&w=2"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0004.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0004.html"
},
{
"name": "SUSE-SU-2011:0847",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html"
},
{
"name": "http://support.apple.com/kb/HT3549",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3549"
},
{
"name" : "http://www.openssl.org/news/secadv_20090107.txt",
"refsource" : "CONFIRM",
"url" : "http://www.openssl.org/news/secadv_20090107.txt"
},
{
"name" : "APPLE-SA-2009-05-12",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name" : "GLSA-200902-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200902-02.xml"
},
{
"name" : "HPSBUX02418",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=123859864430555&w=2"
},
{
"name" : "SSRT090002",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=123859864430555&w=2"
},
{
"name" : "HPSBMA02426",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=124277349419254&w=2"
},
{
"name" : "SSRT090053",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=124277349419254&w=2"
},
{
"name" : "HPSBOV02540",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=127678688104458&w=2"
},
{
"name" : "RHSA-2009:0004",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0004.html"
},
{
"name" : "SSA:2009-014-01",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.544796"
"name": "20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499827/100/0/threaded"
},
{
"name": "250826",
@ -148,109 +83,9 @@
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-250826-1"
},
{
"name" : "SUSE-SU-2011:0847",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html"
},
{
"name" : "openSUSE-SU-2011:0845",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html"
},
{
"name" : "USN-704-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/704-1/"
},
{
"name" : "TA09-133A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name" : "33150",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33150"
},
{
"name" : "oval:org.mitre.oval:def:6380",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6380"
},
{
"name" : "oval:org.mitre.oval:def:9155",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9155"
},
{
"name" : "1021523",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021523"
},
{
"name" : "34211",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34211"
},
{
"name" : "35074",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35074"
},
{
"name" : "35108",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35108"
},
{
"name" : "39005",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39005"
},
{
"name" : "33338",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33338"
},
{
"name" : "33394",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33394"
},
{
"name" : "ADV-2009-0040",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0040"
},
{
"name" : "ADV-2009-0289",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0289"
},
{
"name" : "ADV-2009-0362",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0362"
},
{
"name" : "33765",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33765"
},
{
"name" : "33673",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33673"
},
{
"name" : "33557",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33557"
},
{
"name" : "33436",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33436"
"name": "http://www.openssl.org/news/secadv_20090107.txt",
"refsource": "CONFIRM",
"url": "http://www.openssl.org/news/secadv_20090107.txt"
},
{
"name": "ADV-2009-0558",
@ -258,24 +93,189 @@
"url": "http://www.vupen.com/english/advisories/2009/0558"
},
{
"name" : "ADV-2009-0913",
"name": "openSUSE-SU-2011:0845",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html"
},
{
"name": "HPSBUX02418",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=123859864430555&w=2"
},
{
"name": "1021523",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021523"
},
{
"name": "ADV-2009-0362",
"refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0913"
"url": "http://www.vupen.com/english/advisories/2009/0362"
},
{
"name": "GLSA-200902-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200902-02.xml"
},
{
"name": "HPSBMA02426",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=124277349419254&w=2"
},
{
"name": "ADV-2009-0289",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0289"
},
{
"name": "35074",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35074"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-038.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2009-038.htm"
},
{
"name": "34211",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34211"
},
{
"name": "ADV-2009-0040",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0040"
},
{
"name": "HPSBOV02540",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=127678688104458&w=2"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "SSA:2009-014-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.544796"
},
{
"name": "ADV-2009-0904",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0904"
},
{
"name": "ADV-2009-0913",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0913"
},
{
"name": "33557",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33557"
},
{
"name": "33765",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33765"
},
{
"name": "http://www.ocert.org/advisories/ocert-2008-016.html",
"refsource": "MISC",
"url": "http://www.ocert.org/advisories/ocert-2008-016.html"
},
{
"name": "33673",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33673"
},
{
"name": "20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/502322/100/0/threaded"
},
{
"name": "33436",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33436"
},
{
"name": "35108",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35108"
},
{
"name": "TA09-133A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=837653",
"refsource": "CONFIRM",
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=837653"
},
{
"name": "33150",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33150"
},
{
"name": "RHSA-2009:0004",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0004.html"
},
{
"name": "ADV-2009-1297",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "USN-704-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/704-1/"
},
{
"name": "33338",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33338"
},
{
"name": "ADV-2009-1338",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1338"
},
{
"name": "SSRT090053",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=124277349419254&w=2"
},
{
"name": "33394",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33394"
},
{
"name": "http://voodoo-circle.sourceforge.net/sa/sa-20090123-01.html",
"refsource": "CONFIRM",
"url": "http://voodoo-circle.sourceforge.net/sa/sa-20090123-01.html"
},
{
"name": "oval:org.mitre.oval:def:6380",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6380"
},
{
"name": "39005",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39005"
},
{
"name": "oval:org.mitre.oval:def:9155",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9155"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-devel] 20080811 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages",
"refsource" : "MLIST",
"url" : "http://lists.debian.org/debian-devel/2008/08/msg00285.html"
},
{
"name": "32411",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32411"
},
{
"name": "[debian-devel] 20080811 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages",
"refsource": "MLIST",
"url": "http://lists.debian.org/debian-devel/2008/08/msg00285.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2008-5263",
"STATE": "PUBLIC"
},
@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "20090225 Secunia Research: ksquirrel-libs Radiance RGBE Buffer Overflows",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/501228/100/0/threaded"
"name": "33469",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33469"
},
{
"name": "ksquirrellibs-rgbe-bo(48901)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48901"
},
{
"name": "http://secunia.com/secunia_research/2008-63/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2008-63/"
},
{
"name" : "33902",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33902"
},
{
"name" : "33469",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33469"
},
{
"name": "ADV-2009-0528",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0528"
},
{
"name" : "ksquirrellibs-rgbe-bo(48901)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/48901"
"name": "33902",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33902"
},
{
"name": "20090225 Secunia Research: ksquirrel-libs Radiance RGBE Buffer Overflows",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/501228/100/0/threaded"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20081208 DoS attacks on MIME-capable software via complex MIME emails",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/499038/100/0/threaded"
},
{
"name" : "20081209 Re: DoS attacks on MIME-capable software via complex MIME emails",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/499045/100/0/threaded"
},
{
"name": "http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro",
"refsource": "MISC",
@ -71,6 +61,16 @@
"name": "4721",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4721"
},
{
"name": "20081208 DoS attacks on MIME-capable software via complex MIME emails",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499038/100/0/threaded"
},
{
"name": "20081209 Re: DoS attacks on MIME-capable software via complex MIME emails",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499045/100/0/threaded"
}
]
}

View File

@ -52,30 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "7363",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7363"
},
{
"name" : "DSA-1693",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1693"
},
{
"name" : "SUSE-SR:2009:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "openSUSE-SU-2012:0493",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-04/msg00033.html"
},
{
"name" : "32670",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32670"
"name": "phppgadmin-index-file-include(47140)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47140"
},
{
"name": "7363",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7363"
},
{
"name": "33014",
@ -83,9 +73,14 @@
"url": "http://secunia.com/advisories/33014"
},
{
"name" : "33263",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33263"
"name": "32670",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32670"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "4737",
@ -93,9 +88,14 @@
"url": "http://securityreason.com/securityalert/4737"
},
{
"name" : "phppgadmin-index-file-include(47140)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47140"
"name": "33263",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33263"
},
{
"name": "DSA-1693",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1693"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-0011",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "MS13-001",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-001"
},
{
"name": "TA13-008A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-008A.html"
},
{
"name": "MS13-001",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-001"
},
{
"name": "oval:org.mitre.oval:def:16357",
"refsource": "OVAL",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0223",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:1652",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1652.html"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=798541",
"refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19",
"refsource": "CONFIRM",
"url": "https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19"
},
{
"name" : "RHSA-2013:1652",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1652.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-1003",
"STATE": "PUBLIC"
},
@ -52,36 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT5766",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5766"
},
{
"name": "http://support.apple.com/kb/HT5785",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5785"
},
{
"name" : "http://support.apple.com/kb/HT5934",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5934"
},
{
"name" : "APPLE-SA-2013-05-16-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/May/msg00000.html"
},
{
"name" : "APPLE-SA-2013-06-04-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Jun/msg00001.html"
},
{
"name" : "APPLE-SA-2013-09-18-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
},
{
"name": "oval:org.mitre.oval:def:17252",
"refsource": "OVAL",
@ -91,6 +66,31 @@
"name": "54886",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54886"
},
{
"name": "http://support.apple.com/kb/HT5934",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5934"
},
{
"name": "APPLE-SA-2013-06-04-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT5766",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5766"
},
{
"name": "APPLE-SA-2013-05-16-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/May/msg00000.html"
},
{
"name": "APPLE-SA-2013-09-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1252",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1859",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20130313 [Security-news] SA-CONTRIB-2013-034 - Node Parameter Control - Access Bypass",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2013/Mar/133"
},
{
"name" : "[oss-security] 20130314 Re: CVE request for a Drupal contributed module",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/03/15/2"
"name": "91257",
"refsource": "OSVDB",
"url": "http://osvdb.org/91257"
},
{
"name": "http://drupal.org/node/1942330",
@ -73,9 +68,14 @@
"url": "http://packetstormsecurity.com/files/120788/Drupal-Node-Parameter-Control-6.x-Access-Bypass.html"
},
{
"name" : "91257",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/91257"
"name": "[oss-security] 20130314 Re: CVE request for a Drupal contributed module",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/15/2"
},
{
"name": "20130313 [Security-news] SA-CONTRIB-2013-034 - Node Parameter Control - Access Bypass",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Mar/133"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-3035",
"STATE": "PUBLIC"
},
@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://aix.software.ibm.com/aix/efixes/security/inet_advisory.asc",
"refsource" : "CONFIRM",
"url" : "http://aix.software.ibm.com/aix/efixes/security/inet_advisory.asc"
},
{
"name" : "IV37925",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=isg1IV37925"
},
{
"name" : "IV42072",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=isg1IV42072"
},
{
"name" : "IV42095",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=isg1IV42095"
},
{
"name": "IV42124",
"refsource": "AIXAPAR",
@ -82,20 +62,40 @@
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IV42229"
},
{
"name": "IV42095",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IV42095"
},
{
"name": "IV42264",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IV42264"
},
{
"name" : "oval:org.mitre.oval:def:19253",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19253"
"name": "IV37925",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IV37925"
},
{
"name": "aix-cve20133035-dos(84657)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84657"
},
{
"name": "IV42072",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IV42072"
},
{
"name": "http://aix.software.ibm.com/aix/efixes/security/inet_advisory.asc",
"refsource": "CONFIRM",
"url": "http://aix.software.ibm.com/aix/efixes/security/inet_advisory.asc"
},
{
"name": "oval:org.mitre.oval:def:19253",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19253"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2013-3258",
"STATE": "PUBLIC"
},
@ -57,16 +57,16 @@
"refsource": "CONFIRM",
"url": "http://wordpress.org/plugins/digg-digg/changelog/"
},
{
"name" : "60046",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/60046"
},
{
"name": "53120",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53120"
},
{
"name": "60046",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/60046"
},
{
"name": "diggdigg-cve20133258-csrf(84418)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-3348",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb13-18.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb13-18.html"
},
{
"name": "1028758",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028758"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb13-18.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb13-18.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-3406",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-4056",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21652413",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21652413"
},
{
"name": "ibm-infosphere-cve20134056-csrf(86545)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86545"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21652413",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21652413"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4274",
"STATE": "PUBLIC"
},
@ -57,6 +57,11 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/08/22/2"
},
{
"name": "61780",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61780"
},
{
"name": "http://www.madirish.net/557",
"refsource": "MISC",
@ -71,11 +76,6 @@
"name": "https://drupal.org/node/2065241",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/2065241"
},
{
"name" : "61780",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/61780"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1039791",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039791"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "102140",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102140"
},
{
"name" : "1039791",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039791"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20171223 [SECURITY] [DLA 1219-1] enigmail security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"
},
{
"name": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf",
"refsource": "MISC",
@ -72,6 +67,11 @@
"refsource": "MISC",
"url": "https://www.mail-archive.com/enigmail-users@enigmail.net/msg04280.html"
},
{
"name": "[debian-lts-announce] 20171223 [SECURITY] [DLA 1219-1] enigmail security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"
},
{
"name": "DSA-4070",
"refsource": "DEBIAN",

View File

@ -76,15 +76,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10719401",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10719401"
},
{
"name": "ibm-tivoli-cve20181550-dos(142696)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/142696"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=ibm10719401",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10719401"
}
]
}

View File

@ -80,9 +80,9 @@
"references": {
"reference_data": [
{
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10792081",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10792081"
"name": "ibm-publishing-cve20181657-xss(144883)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/144883"
},
{
"name": "106460",
@ -90,9 +90,9 @@
"url": "http://www.securityfocus.com/bid/106460"
},
{
"name" : "ibm-publishing-cve20181657-xss(144883)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/144883"
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10792081",
"refsource": "CONFIRM",
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10792081"
}
]
}

View File

@ -56,179 +56,179 @@
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html"
},
{
"name" : "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e",
"refsource" : "CONFIRM",
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e"
},
{
"name" : "https://www.synology.com/support/security/Synology_SA_18_41",
"refsource" : "CONFIRM",
"url" : "https://www.synology.com/support/security/Synology_SA_18_41"
"name": "RHSA-2018:2785",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2785"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180815-0003/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180815-0003/"
},
{
"name": "VU#962459",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/962459"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt"
},
{
"name" : "https://support.f5.com/csp/article/K95343321",
"refsource" : "CONFIRM",
"url" : "https://support.f5.com/csp/article/K95343321"
},
{
"name" : "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack",
"refsource" : "CONFIRM",
"url" : "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack"
},
{
"name" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource" : "CONFIRM",
"url" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name" : "20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018",
"refsource" : "CISCO",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp"
},
{
"name" : "DSA-4266",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4266"
},
{
"name" : "RHSA-2018:2384",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2384"
},
{
"name" : "RHSA-2018:2395",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2395"
},
{
"name" : "RHSA-2018:2402",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2402"
},
{
"name" : "RHSA-2018:2403",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2403"
},
{
"name" : "RHSA-2018:2645",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2645"
},
{
"name" : "RHSA-2018:2776",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2776"
},
{
"name" : "RHSA-2018:2785",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2785"
},
{
"name" : "RHSA-2018:2789",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2789"
},
{
"name" : "RHSA-2018:2790",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2790"
},
{
"name" : "RHSA-2018:2791",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2791"
},
{
"name" : "RHSA-2018:2924",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2924"
},
{
"name" : "RHSA-2018:2933",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2933"
},
{
"name" : "RHSA-2018:2948",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"name" : "USN-3732-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3732-1/"
},
{
"name" : "USN-3732-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3732-2/"
},
{
"name" : "USN-3741-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3741-1/"
},
{
"name" : "USN-3742-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3742-1/"
},
{
"name" : "USN-3742-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3742-2/"
},
{
"name": "USN-3741-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3741-2/"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "RHSA-2018:2776",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2776"
},
{
"name": "https://www.synology.com/support/security/Synology_SA_18_41",
"refsource": "CONFIRM",
"url": "https://www.synology.com/support/security/Synology_SA_18_41"
},
{
"name": "RHSA-2018:2933",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2933"
},
{
"name": "RHSA-2018:2403",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2403"
},
{
"name": "RHSA-2018:2395",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2395"
},
{
"name": "USN-3763-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3763-1/"
},
{
"name" : "VU#962459",
"refsource" : "CERT-VN",
"url" : "https://www.kb.cert.org/vuls/id/962459"
"name": "RHSA-2018:2384",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2384"
},
{
"name": "https://support.f5.com/csp/article/K95343321",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K95343321"
},
{
"name": "USN-3741-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3741-1/"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "RHSA-2018:2402",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2402"
},
{
"name": "RHSA-2018:2948",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"name": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack",
"refsource": "CONFIRM",
"url": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack"
},
{
"name": "USN-3742-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3742-2/"
},
{
"name": "1041434",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041434"
},
{
"name": "USN-3732-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3732-2/"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e",
"refsource": "CONFIRM",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e"
},
{
"name": "104976",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104976"
},
{
"name": "[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html"
},
{
"name": "1041424",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041424"
},
{
"name" : "1041434",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041434"
"name": "USN-3742-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3742-1/"
},
{
"name": "RHSA-2018:2924",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2924"
},
{
"name": "20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp"
},
{
"name": "RHSA-2018:2789",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2789"
},
{
"name": "DSA-4266",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4266"
},
{
"name": "RHSA-2018:2645",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2645"
},
{
"name": "USN-3732-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3732-1/"
},
{
"name": "RHSA-2018:2791",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2791"
},
{
"name": "RHSA-2018:2790",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2790"
}
]
},

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md",
"refsource" : "MISC",
"url" : "https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md"
},
{
"name": "https://wpvulndb.com/vulnerabilities/9012",
"refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/9012"
},
{
"name": "https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md",
"refsource": "MISC",
"url": "https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md"
}
]
}