|
cve-2017-5639
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-09-24T12:57:01.000Z', 'orgId': 'f0158376-9dc2-43b6-827c-5f631a4d8d09', 'shortName': 'apache'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none'}]}
|
N/A
|
N/A
|
2018-09-24T13:00:00.000Z |
2018-09-24T12:57:01.000Z |
|
cve-2018-11043
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-02T13:57:01.000Z', 'orgId': 'c550e75a-17ff-4988-97f0-544cde3820fe', 'shortName': 'dell'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none'}]}
|
N/A
|
N/A
|
2018-10-02T14:00:00.000Z |
2018-10-02T13:57:01.000Z |
|
cve-2017-17781
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-02T17:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none'}]}
|
N/A
|
N/A
|
2017-12-20T09:00:00.000Z |
2018-10-02T17:57:01.000Z |
|
cve-2018-17850
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-02T20:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none'}]}
|
N/A
|
N/A
|
2018-10-01T08:00:00.000Z |
2018-10-02T20:57:01.000Z |
|
cve-2018-17851
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-02T20:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none'}]}
|
N/A
|
N/A
|
2018-10-01T08:00:00.000Z |
2018-10-02T20:57:01.000Z |
|
cve-2018-3736
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-10T20:57:01.000Z', 'orgId': '36234546-b8fa-4601-9d6f-f4e334aa8ea1', 'shortName': 'hackerone'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-3739. Reason: This candidate is a duplicate of CVE-2018-3739. Notes: All CVE users should reference CVE-2018-3739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]}
|
N/A
|
N/A
|
2018-06-07T02:00:00.000Z |
2018-10-10T20:57:01.000Z |
|
cve-2018-14915
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-17T17:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none'}]}
|
N/A
|
N/A
|
2018-10-17T18:00:00.000Z |
2018-10-17T17:57:01.000Z |
|
cve-2018-14917
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-17T17:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none'}]}
|
N/A
|
N/A
|
2018-10-17T18:00:00.000Z |
2018-10-17T17:57:01.000Z |
|
cve-2018-7106
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-17T17:57:01.000Z', 'orgId': 'eb103674-0d28-4225-80f8-39fb86215de0', 'shortName': 'hpe'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none'}]}
|
N/A
|
N/A
|
2018-09-27T18:00:00.000Z |
2018-10-17T17:57:01.000Z |
|
cve-2006-4274
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-19T14:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Unknown vulnerability in Microsoft PowerPoint allows user-assisted attackers to execute arbitrary code via a crafted PPT document, as exploited by malware such as TROJ_MDROPPER.BH. NOTE: on 20060822, it was determined that TROJ_MDROPPER.BH was exploiting CVE-2006-0009, so this is not a new vulnerability'}]}
|
N/A
|
N/A
|
2006-08-21T22:00:00.000Z |
2018-10-19T14:57:01.000Z |
|
cve-2007-2056
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-19T14:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'The getlock function in aimage/aimage.cpp in AFFLIB 2.2.8 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary lock files (aka "time-of-check-time-of-use file race"). NOTE: the researcher has retracted the original advisory, stating that "the portion of vulnerable code is not called in any current version of AFFLIB and is therefore not exploitable.'}]}
|
N/A
|
N/A
|
2007-04-30T22:00:00.000Z |
2018-10-19T14:57:01.000Z |
|
cve-2007-3004
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-19T14:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]}
|
N/A
|
N/A
|
2007-06-04T17:00:00.000Z |
2018-10-19T14:57:01.000Z |
|
cve-2007-5421
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-19T14:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Multiple stack-based buffer overflows in Cisco IOS 12.x and IOS XR allow attackers to execute arbitrary code, as demonstrated via the "Bind Shell", "Reverse Shell", and "Two byte rootshell (Tiny Shell)" attacks. NOTE: the vendor and researcher agree that this issue does not cross privilege boundaries, saying they do not "represent a vulnerability." The disclosure was intended to demonstrate techniques for exploitation, which is not covered by CVE'}]}
|
N/A
|
N/A
|
2007-10-12T21:00:00.000Z |
2018-10-19T14:57:01.000Z |
|
cve-2008-6800
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-10-19T14:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not a security issue. It was originally created based on one vendor\'s misinterpretation of an upstream changelog comment that referred to a race condition in the winbind daemon (aka winbindd) in Samba before 3.0.32. The upstream vendor states: "The Samba Team sees no way to exploit this race condition by a user of the system or an external attacker. In order to be able to trigger the race condition a privileged user (root) need to intentionally kill a winbind child process and carefully time the killing to trigger the race condition. Although, if the user is already privileged, it can more easily just kill the parent process directly." CVE concurs with the dispute. Notes: CVE users should not use this identifier'}]}
|
N/A
|
N/A
|
2009-05-07T23:00:00.000Z |
2018-10-19T14:57:01.000Z |
|
cve-2018-1293
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-11-13T14:57:01.000Z', 'orgId': 'f0158376-9dc2-43b6-827c-5f631a4d8d09', 'shortName': 'apache'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none'}]}
|
N/A
|
N/A
|
2018-11-13T15:00:00.000Z |
2018-11-13T14:57:01.000Z |
|
cve-2018-19270
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-11-14T16:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-16276. Reason: This candidate is a reservation duplicate of CVE-2018-16276. Notes: All CVE users should reference CVE-2018-16276 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]}
|
N/A
|
N/A
|
2018-11-14T11:00:00.000Z |
2018-11-14T16:57:01.000Z |
|
cve-2018-19387
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-11-23T14:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none'}]}
|
N/A
|
N/A
|
2018-11-20T21:00:00.000Z |
2018-11-23T14:57:01.000Z |
|
cve-2018-19764
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-11-30T21:57:01.000Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none'}]}
|
N/A
|
N/A
|
2018-11-30T03:00:00.000Z |
2018-11-30T21:57:01.000Z |
|
cve-2018-2515
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-12-03T20:57:01.000Z', 'orgId': 'e4686d1a-f260-4930-ac4c-2f5c992778dd', 'shortName': 'sap'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-2815. Reason: This candidate is a duplicate of CVE-2018-2815. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2018-2815 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]}
|
N/A
|
N/A
|
2018-12-03T21:00:00.000Z |
2018-12-03T20:57:01.000Z |
|
cve-2018-10145
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-12-06T13:57:01.000Z', 'orgId': 'd6c1279f-00f6-4ef7-9217-f89ffe703ec0', 'shortName': 'palo_alto'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none'}]}
|
N/A
|
N/A
|
2018-12-06T14:00:00.000Z |
2018-12-06T13:57:01.000Z |
|
cve-2018-10146
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-12-06T13:57:01.000Z', 'orgId': 'd6c1279f-00f6-4ef7-9217-f89ffe703ec0', 'shortName': 'palo_alto'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none'}]}
|
N/A
|
N/A
|
2018-12-06T14:00:00.000Z |
2018-12-06T13:57:01.000Z |
|
cve-2018-10147
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-12-06T13:57:01.000Z', 'orgId': 'd6c1279f-00f6-4ef7-9217-f89ffe703ec0', 'shortName': 'palo_alto'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none'}]}
|
N/A
|
N/A
|
2018-12-06T14:00:00.000Z |
2018-12-06T13:57:01.000Z |
|
cve-2018-10148
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-12-06T13:57:01.000Z', 'orgId': 'd6c1279f-00f6-4ef7-9217-f89ffe703ec0', 'shortName': 'palo_alto'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none'}]}
|
N/A
|
N/A
|
2018-12-06T14:00:00.000Z |
2018-12-06T13:57:01.000Z |
|
cve-2018-10149
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-12-06T13:57:01.000Z', 'orgId': 'd6c1279f-00f6-4ef7-9217-f89ffe703ec0', 'shortName': 'palo_alto'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none'}]}
|
N/A
|
N/A
|
2018-12-06T14:00:00.000Z |
2018-12-06T13:57:01.000Z |
|
cve-2018-10150
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-12-06T13:57:01.000Z', 'orgId': 'd6c1279f-00f6-4ef7-9217-f89ffe703ec0', 'shortName': 'palo_alto'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none'}]}
|
N/A
|
N/A
|
2018-12-06T14:00:00.000Z |
2018-12-06T13:57:01.000Z |
|
cve-2018-10151
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-12-06T13:57:01.000Z', 'orgId': 'd6c1279f-00f6-4ef7-9217-f89ffe703ec0', 'shortName': 'palo_alto'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none'}]}
|
N/A
|
N/A
|
2018-12-06T14:00:00.000Z |
2018-12-06T13:57:01.000Z |
|
cve-2018-10152
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-12-06T13:57:01.000Z', 'orgId': 'd6c1279f-00f6-4ef7-9217-f89ffe703ec0', 'shortName': 'palo_alto'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none'}]}
|
N/A
|
N/A
|
2018-12-06T14:00:00.000Z |
2018-12-06T13:57:01.000Z |
|
cve-2018-10153
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-12-06T13:57:01.000Z', 'orgId': 'd6c1279f-00f6-4ef7-9217-f89ffe703ec0', 'shortName': 'palo_alto'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none'}]}
|
N/A
|
N/A
|
2018-12-06T14:00:00.000Z |
2018-12-06T13:57:01.000Z |
|
cve-2018-10154
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-12-06T13:57:01.000Z', 'orgId': 'd6c1279f-00f6-4ef7-9217-f89ffe703ec0', 'shortName': 'palo_alto'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none'}]}
|
N/A
|
N/A
|
2018-12-06T14:00:00.000Z |
2018-12-06T13:57:01.000Z |
|
cve-2018-10155
|
N/A
|
{'providerMetadata': {'dateUpdated': '2018-12-06T13:57:01.000Z', 'orgId': 'd6c1279f-00f6-4ef7-9217-f89ffe703ec0', 'shortName': 'palo_alto'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none'}]}
|
N/A
|
N/A
|
2018-12-06T14:00:00.000Z |
2018-12-06T13:57:01.000Z |