"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:44:55 +00:00
parent be57268794
commit 02ec11aeaf
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 4079 additions and 4079 deletions

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "webmin-dot-directory-traversal(7711)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7711.php"
},
{
"name": "20011217 webmin 0.91 ../.. problem",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/245980"
},
{
"name" : "20011218 Re: webmin 0.91 ../.. problem",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=webmin-l&m=100865390306103&w=2"
},
{
"name": "3698",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3698"
},
{
"name" : "webmin-dot-directory-traversal(7711)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/7711.php"
"name": "20011218 Re: webmin 0.91 ../.. problem",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=webmin-l&m=100865390306103&w=2"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://archives.neohapsis.com/archives/apps/freshmeat/2006-05/0002.html",
"refsource" : "CONFIRM",
"url" : "http://archives.neohapsis.com/archives/apps/freshmeat/2006-05/0002.html"
},
{
"name" : "17957",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17957"
},
{
"name": "ADV-2006-1777",
"refsource": "VUPEN",
@ -72,10 +62,20 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25194"
},
{
"name": "http://archives.neohapsis.com/archives/apps/freshmeat/2006-05/0002.html",
"refsource": "CONFIRM",
"url": "http://archives.neohapsis.com/archives/apps/freshmeat/2006-05/0002.html"
},
{
"name": "chirpy-script-sql-injection(26418)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26418"
},
{
"name": "17957",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17957"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060507 X-POLL admin By-Pass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/433220/100/0/threaded"
},
{
"name" : "\"X-POLL admin By-Pass\" - standard PHP upload?",
"refsource" : "VIM",
"url" : "http://attrition.org/pipermail/vim/2006-May/000752.html"
"name": "xpoll-add-file-upload(26363)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26363"
},
{
"name": "17901",
@ -68,14 +63,9 @@
"url": "http://www.securityfocus.com/bid/17901"
},
{
"name" : "ADV-2006-1732",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1732"
},
{
"name" : "20057",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20057"
"name": "\"X-POLL admin By-Pass\" - standard PHP upload?",
"refsource": "VIM",
"url": "http://attrition.org/pipermail/vim/2006-May/000752.html"
},
{
"name": "872",
@ -83,9 +73,19 @@
"url": "http://securityreason.com/securityalert/872"
},
{
"name" : "xpoll-add-file-upload(26363)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26363"
"name": "20057",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20057"
},
{
"name": "20060507 X-POLL admin By-Pass",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/433220/100/0/threaded"
},
{
"name": "ADV-2006-1732",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1732"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2006-2598",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "1007",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1007"
},
{
"name": "20060528 Advisory: UBBThreads 5.x,6.x Multiple File InclusionVulnerabilities.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435288/100/0/threaded"
},
{
"name": "ubbthreads-index-xss(26870)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26870"
},
{
"name": "20060529 UBBThreads 5.x,6.x md5 hash disclosure",
"refsource": "BUGTRAQ",
@ -71,16 +81,6 @@
"name": "18152",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18152"
},
{
"name" : "1007",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1007"
},
{
"name" : "ubbthreads-index-xss(26870)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26870"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "1883",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1883"
},
{
"name" : "18291",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18291"
},
{
"name" : "ADV-2006-2167",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2167"
"name": "wikiwig-wklang-file-include(26942)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26942"
},
{
"name": "20487",
@ -73,9 +63,19 @@
"url": "http://secunia.com/advisories/20487"
},
{
"name" : "wikiwig-wklang-file-include(26942)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26942"
"name": "18291",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18291"
},
{
"name": "1883",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1883"
},
{
"name": "ADV-2006-2167",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2167"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060605 FunkBoard CF0.71 (profile.php) Remote User Pass Change Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/435987/100/0/threaded"
},
{
"name": "http://www.funkboard.co.uk/forum/thread.php?id=302",
"refsource": "CONFIRM",
@ -67,6 +62,21 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1875"
},
{
"name": "funkboard-profile-password-modification(26912)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26912"
},
{
"name": "1066",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1066"
},
{
"name": "20060605 FunkBoard CF0.71 (profile.php) Remote User Pass Change Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435987/100/0/threaded"
},
{
"name": "ADV-2006-2158",
"refsource": "VUPEN",
@ -76,16 +86,6 @@
"name": "20433",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20433"
},
{
"name" : "1066",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1066"
},
{
"name" : "funkboard-profile-password-modification(26912)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26912"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "efone-config-information-disclosure(27574)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27574"
},
{
"name": "1192",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1192"
},
{
"name": "20902",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20902"
},
{
"name": "20060703 5 php scripts remote database password disclosure",
"refsource": "BUGTRAQ",
@ -66,21 +81,6 @@
"name": "ADV-2006-2664",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2664"
},
{
"name" : "20902",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20902"
},
{
"name" : "1192",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1192"
},
{
"name" : "efone-config-information-disclosure(27574)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27574"
}
]
}

View File

@ -52,46 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "20060706 WebEx ActiveX Control DLL Injection",
"refsource" : "ISS",
"url" : "http://xforce.iss.net/xforce/alerts/id/226"
},
{
"name" : "20060707 ZDI-06-021: WebEx Downloader Plug-in Code Execution Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/439496/100/0/threaded"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-06-021.html",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-06-021.html"
},
{
"name" : "http://www.webex.com/lp/security/ActiveAdv.html?TrackID=123456",
"refsource" : "CONFIRM",
"url" : "http://www.webex.com/lp/security/ActiveAdv.html?TrackID=123456"
},
{
"name" : "18860",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18860"
},
{
"name": "ADV-2006-2688",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2688"
},
{
"name" : "27039",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27039"
},
{
"name" : "27040",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27040"
},
{
"name": "1016446",
"refsource": "SECTRACK",
@ -102,10 +67,45 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20956"
},
{
"name": "20060706 WebEx ActiveX Control DLL Injection",
"refsource": "ISS",
"url": "http://xforce.iss.net/xforce/alerts/id/226"
},
{
"name": "web-conferencing-code-injection(24370)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24370"
},
{
"name": "20060707 ZDI-06-021: WebEx Downloader Plug-in Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/439496/100/0/threaded"
},
{
"name": "27040",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27040"
},
{
"name": "18860",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18860"
},
{
"name": "http://www.webex.com/lp/security/ActiveAdv.html?TrackID=123456",
"refsource": "CONFIRM",
"url": "http://www.webex.com/lp/security/ActiveAdv.html?TrackID=123456"
},
{
"name": "27039",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27039"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-021.html",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-021.html"
}
]
}

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "102462",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102462-1"
},
{
"name" : "18972",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18972"
},
{
"name" : "ADV-2006-2799",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2799"
"name": "21047",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21047"
},
{
"name": "oval:org.mitre.oval:def:1921",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1921"
},
{
"name" : "1016494",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016494"
},
{
"name" : "21047",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21047"
},
{
"name": "solaris-ypserv-dos(27722)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27722"
},
{
"name": "18972",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18972"
},
{
"name": "102462",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102462-1"
},
{
"name": "ADV-2006-2799",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2799"
},
{
"name": "1016494",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016494"
}
]
}

View File

@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "20060723 Buffer-overflow in the XM loader of Cheese Tracker 0.9.9",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440962/100/0/threaded"
},
{
"name" : "http://aluigi.altervista.org/adv/cheesebof-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/cheesebof-adv.txt"
},
{
"name" : "DSA-1166",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1166"
},
{
"name" : "GLSA-200610-13",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200610-13.xml"
},
{
"name": "19115",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19115"
},
{
"name" : "21759",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21759"
},
{
"name" : "22643",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22643"
},
{
"name": "1291",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1291"
},
{
"name": "http://aluigi.altervista.org/adv/cheesebof-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/cheesebof-adv.txt"
},
{
"name": "21759",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21759"
},
{
"name": "GLSA-200610-13",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200610-13.xml"
},
{
"name": "20060723 Buffer-overflow in the XM loader of Cheese Tracker 0.9.9",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440962/100/0/threaded"
},
{
"name": "DSA-1166",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1166"
},
{
"name": "cheesetronic-loaderxm-bo(27957)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27957"
},
{
"name": "22643",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22643"
}
]
}

View File

@ -52,41 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "20061114 A-Cart pro[ injection sql (post&get)]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/451594/100/100/threaded"
},
{
"name" : "20061118 A-Cart PRO SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/452006/100/0/threaded"
},
{
"name": "20061118 Re: A-Cart PRO SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/452023/100/0/threaded"
},
{
"name" : "http://s-a-p.ca/index.php?page=OurAdvisories&id=27",
"refsource" : "MISC",
"url" : "http://s-a-p.ca/index.php?page=OurAdvisories&id=27"
},
{
"name" : "21166",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21166"
},
{
"name" : "32750",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/32750"
},
{
"name": "32751",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/32751"
},
{
"name": "20061114 A-Cart pro[ injection sql (post&get)]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/451594/100/100/threaded"
},
{
"name": "acart-category-product-sql-injection(30279)",
"refsource": "XF",
@ -96,6 +76,26 @@
"name": "acart-search-sql-injection(30280)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30280"
},
{
"name": "21166",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21166"
},
{
"name": "20061118 A-Cart PRO SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/452006/100/0/threaded"
},
{
"name": "http://s-a-p.ca/index.php?page=OurAdvisories&id=27",
"refsource": "MISC",
"url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=27"
},
{
"name": "32750",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/32750"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20061204 Re: UPublisher Exploit - Superfreaker",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/453462/100/0/threaded"
},
{
"name": "22840",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22840"
},
{
"name": "20061204 Re: UPublisher Exploit - Superfreaker",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/453462/100/0/threaded"
}
]
}

View File

@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://bugs.kde.org/show_bug.cgi?id=138499",
"refsource" : "MISC",
"url" : "http://bugs.kde.org/show_bug.cgi?id=138499"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=166901",
"refsource" : "MISC",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=166901"
},
{
"name" : "GLSA-200703-11",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200703-11.xml"
},
{
"name" : "SUSE-SR:2007:002",
"refsource" : "SUSE",
"url" : "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0015.html"
},
{
"name" : "22568",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22568"
"name": "23984",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23984"
},
{
"name": "ADV-2007-0613",
@ -83,19 +63,39 @@
"url": "http://www.vupen.com/english/advisories/2007/0613"
},
{
"name" : "23984",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23984"
"name": "SUSE-SR:2007:002",
"refsource": "SUSE",
"url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0015.html"
},
{
"name" : "24159",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24159"
"name": "http://bugs.gentoo.org/show_bug.cgi?id=166901",
"refsource": "MISC",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=166901"
},
{
"name": "24510",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24510"
},
{
"name": "22568",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22568"
},
{
"name": "http://bugs.kde.org/show_bug.cgi?id=138499",
"refsource": "MISC",
"url": "http://bugs.kde.org/show_bug.cgi?id=138499"
},
{
"name": "GLSA-200703-11",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200703-11.xml"
},
{
"name": "24159",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24159"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0156",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT4554",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4554"
},
{
"name": "http://support.apple.com/kb/HT4564",
"refsource": "CONFIRM",
@ -67,6 +62,11 @@
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4566"
},
{
"name": "oval:org.mitre.oval:def:17191",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17191"
},
{
"name": "APPLE-SA-2011-03-02-1",
"refsource": "APPLE",
@ -77,15 +77,15 @@
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT4554",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4554"
},
{
"name": "APPLE-SA-2011-03-09-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"name" : "oval:org.mitre.oval:def:17191",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17191"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0207",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-0561",
"STATE": "PUBLIC"
},
@ -53,60 +53,25 @@
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-02.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-02.html"
},
{
"name" : "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash2",
"refsource" : "CONFIRM",
"url" : "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash2"
},
{
"name" : "RHSA-2011:0206",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0206.html"
},
{
"name" : "RHSA-2011:0259",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0259.html"
},
{
"name" : "RHSA-2011:0368",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0368.html"
},
{
"name" : "SUSE-SA:2011:009",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html"
},
{
"name" : "VU#812969",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/812969"
},
{
"name" : "46189",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46189"
},
{
"name" : "oval:org.mitre.oval:def:14169",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14169"
},
{
"name" : "oval:org.mitre.oval:def:15930",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15930"
"name": "ADV-2011-0348",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0348"
},
{
"name": "1025055",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025055"
},
{
"name": "ADV-2011-0646",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0646"
},
{
"name": "VU#812969",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/812969"
},
{
"name": "43267",
"refsource": "SECUNIA",
@ -118,9 +83,9 @@
"url": "http://secunia.com/advisories/43292"
},
{
"name" : "43340",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43340"
"name": "46189",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46189"
},
{
"name": "43351",
@ -128,29 +93,64 @@
"url": "http://secunia.com/advisories/43351"
},
{
"name" : "43747",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43747"
"name": "oval:org.mitre.oval:def:14169",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14169"
},
{
"name" : "ADV-2011-0348",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0348"
"name": "43340",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43340"
},
{
"name": "ADV-2011-0383",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0383"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-02.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-02.html"
},
{
"name": "oval:org.mitre.oval:def:15930",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15930"
},
{
"name": "43747",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43747"
},
{
"name": "ADV-2011-0402",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0402"
},
{
"name" : "ADV-2011-0646",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0646"
"name": "RHSA-2011:0259",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0259.html"
},
{
"name": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash2",
"refsource": "CONFIRM",
"url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash2"
},
{
"name": "RHSA-2011:0206",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0206.html"
},
{
"name": "SUSE-SA:2011:009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html"
},
{
"name": "RHSA-2011:0368",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0368.html"
}
]
}

View File

@ -52,55 +52,55 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.opera.com/docs/changelogs/mac/1101/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/mac/1101/"
},
{
"name" : "http://www.opera.com/docs/changelogs/unix/1101/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/unix/1101/"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1101/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1101/"
},
{
"name" : "http://www.opera.com/support/kb/view/986/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/support/kb/view/986/"
},
{
"name" : "46036",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46036"
},
{
"name" : "70731",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/70731"
},
{
"name": "oval:org.mitre.oval:def:12507",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12507"
},
{
"name" : "43023",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43023"
"name": "http://www.opera.com/support/kb/view/986/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/support/kb/view/986/"
},
{
"name": "ADV-2011-0231",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0231"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/1101/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/unix/1101/"
},
{
"name": "46036",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46036"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/1101/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/mac/1101/"
},
{
"name": "opera-passwords-sec-bypass(65018)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65018"
},
{
"name": "70731",
"refsource": "OSVDB",
"url": "http://osvdb.org/70731"
},
{
"name": "43023",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43023"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=70376",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=70376"
},
{
"name" : "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html"
"name": "google-chrome-pickle-dos(65731)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65731"
},
{
"name": "46614",
@ -73,9 +68,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13935"
},
{
"name" : "google-chrome-pickle-dos(65731)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65731"
"name": "http://code.google.com/p/chromium/issues/detail?id=70376",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=70376"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html"
}
]
}

View File

@ -57,16 +57,6 @@
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=76666"
},
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=77507",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=77507"
},
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=78031",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=78031"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html",
"refsource": "CONFIRM",
@ -81,6 +71,16 @@
"name": "chrome-navigation-spoofing(67153)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67153"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=77507",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=77507"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=78031",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=78031"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-2228",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=122337",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=122337"
},
{
"name" : "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html"
},
{
"name": "GLSA-201205-03",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201205-03.xml"
},
{
"name" : "openSUSE-SU-2012:0656",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html"
},
{
"name" : "53540",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/53540"
},
{
"name": "oval:org.mitre.oval:def:15610",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15610"
},
{
"name": "openSUSE-SU-2012:0656",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html"
},
{
"name": "1027067",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027067"
},
{
"name": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html"
},
{
"name": "53540",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53540"
},
{
"name": "chrome-v8regex-code-exec(75597)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75597"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=122337",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=122337"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[Xen-devel] 20110616 IOMMU faults",
"refsource" : "MLIST",
"url" : "http://old-list-archives.xen.org/archives/html/xen-devel/2011-06/msg01106.html"
},
{
"name" : "[Xen-devel] 20110812 Xen Advisory 5 (CVE-2011-3131) IOMMU fault livelock",
"refsource" : "MLIST",
"url" : "http://old-list-archives.xen.org/archives/html/xen-devel/2011-08/msg00450.html"
},
{
"name": "http://xenbits.xen.org/hg/staging/xen-4.1-testing.hg/rev/84e3706df07a",
"refsource": "CONFIRM",
@ -72,20 +62,30 @@
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2582"
},
{
"name" : "49146",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/49146"
},
{
"name": "45622",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45622"
},
{
"name": "[Xen-devel] 20110812 Xen Advisory 5 (CVE-2011-3131) IOMMU fault livelock",
"refsource": "MLIST",
"url": "http://old-list-archives.xen.org/archives/html/xen-devel/2011-08/msg00450.html"
},
{
"name": "51468",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51468"
},
{
"name": "[Xen-devel] 20110616 IOMMU faults",
"refsource": "MLIST",
"url": "http://old-list-archives.xen.org/archives/html/xen-devel/2011-06/msg01106.html"
},
{
"name": "49146",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49146"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-4263",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "JVN#61695284",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN61695284/index.html"
},
{
"name": "JVNDB-2011-000100",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000100"
},
{
"name": "JVN#61695284",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN61695284/index.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/owasp-java-html-sanitizer/wiki/CVE20114457",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/owasp-java-html-sanitizer/wiki/CVE20114457"
},
{
"name": "http://owasp-java-html-sanitizer.googlecode.com/svn/trunk/CHANGE_LOG.html",
"refsource": "CONFIRM",
"url": "http://owasp-java-html-sanitizer.googlecode.com/svn/trunk/CHANGE_LOG.html"
},
{
"name": "http://code.google.com/p/owasp-java-html-sanitizer/wiki/CVE20114457",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/owasp-java-html-sanitizer/wiki/CVE20114457"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2011-4514",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf",
"refsource" : "MISC",
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf"
},
{
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf"
},
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf",
"refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1318",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS13-042",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-042"
},
{
"name": "TA13-134A",
"refsource": "CERT",
@ -66,6 +61,11 @@
"name": "oval:org.mitre.oval:def:16682",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16682"
},
{
"name": "MS13-042",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-042"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-5136",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-5443",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21667626",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21667626"
},
{
"name": "ibm-cognos-cve20135443-csrf(87819)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87819"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21667626",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21667626"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-2346",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase",
"refsource": "CONFIRM",
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
},
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-154-01",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase",
"refsource": "CONFIRM",
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
},
{
"name" : "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase",
"refsource" : "CONFIRM",
"url" : "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
}
]
}

View File

@ -53,60 +53,30 @@
"references": {
"reference_data": [
{
"name" : "[security-announce] 20140315 Announce: OpenSSH 6.6 released",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "59855",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59855"
},
{
"name": "57574",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57574"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0143.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0143.html"
},
{
"name" : "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc",
"refsource" : "CONFIRM",
"url" : "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc"
},
{
"name" : "https://support.apple.com/HT205267",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205267"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "APPLE-SA-2015-09-30-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
},
{
"name" : "DSA-2894",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2894"
},
{
"name" : "FEDORA-2014-6380",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html"
},
{
"name" : "FEDORA-2014-6569",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html"
},
{
"name": "HPSBUX03188",
"refsource": "HP",
@ -118,9 +88,9 @@
"url": "http://marc.info/?l=bugtraq&m=141576985122836&w=2"
},
{
"name" : "MDVSA-2014:068",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2014:068"
"name": "57488",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57488"
},
{
"name": "MDVSA-2015:095",
@ -128,34 +98,9 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:095"
},
{
"name" : "RHSA-2014:1552",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1552.html"
},
{
"name" : "USN-2155-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2155-1"
},
{
"name" : "66355",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/66355"
},
{
"name" : "1029925",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029925"
},
{
"name" : "57488",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/57488"
},
{
"name" : "57574",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/57574"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "59313",
@ -163,14 +108,69 @@
"url": "http://secunia.com/advisories/59313"
},
{
"name" : "59855",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59855"
"name": "https://support.apple.com/HT205267",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205267"
},
{
"name": "FEDORA-2014-6380",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html"
},
{
"name": "DSA-2894",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2894"
},
{
"name": "RHSA-2014:1552",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1552.html"
},
{
"name": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc",
"refsource": "CONFIRM",
"url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc"
},
{
"name": "1029925",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029925"
},
{
"name": "[security-announce] 20140315 Announce: OpenSSH 6.6 released",
"refsource": "MLIST",
"url": "http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name": "USN-2155-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2155-1"
},
{
"name": "FEDORA-2014-6569",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html"
},
{
"name": "openssh-cve20142532-sec-bypass(91986)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91986"
},
{
"name": "MDVSA-2014:068",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:068"
},
{
"name": "66355",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66355"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "disable-comments-wordpress-csrf(92219)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92219"
},
{
"name": "https://security.dxw.com/advisories/csrf-in-disable-comments-1-0-3/",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://wordpress.org/plugins/disable-comments/#developers",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/disable-comments/#developers"
},
{
"name" : "disable-comments-wordpress-csrf(92219)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/92219"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2014-2633",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "HPSBMU03079",
"refsource" : "HP",
"url" : "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
},
{
"name" : "SSRT101654",
"refsource" : "HP",
"url" : "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
},
{
"name": "69376",
"refsource": "BID",
@ -72,6 +62,11 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030756"
},
{
"name": "hp-service-cve20142633-csrf(95449)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95449"
},
{
"name": "60028",
"refsource": "SECUNIA",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/60714"
},
{
"name" : "hp-service-cve20142633-csrf(95449)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95449"
"name": "SSRT101654",
"refsource": "HP",
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
},
{
"name": "HPSBMU03079",
"refsource": "HP",
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
}
]
}

View File

@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140419 CVE request / advisory: gdomap (GNUstep core package <= 1.24.6)",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q2/143"
},
{
"name" : "[oss-security] 20140421 Re: CVE request / advisory: gdomap (GNUstep core package <= 1.24.6)",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q2/152"
},
{
"name" : "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/ChangeLog?r1=37756&r2=37755&pathrev=37756",
"refsource" : "CONFIRM",
"url" : "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/ChangeLog?r1=37756&r2=37755&pathrev=37756"
},
{
"name" : "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/Tools/gdomap.c?r1=37756&r2=37755&pathrev=37756",
"refsource" : "CONFIRM",
"url" : "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/Tools/gdomap.c?r1=37756&r2=37755&pathrev=37756"
"name": "gnustep-cve20142980-dos(92688)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92688"
},
{
"name": "https://savannah.gnu.org/bugs/?41751",
"refsource": "CONFIRM",
"url": "https://savannah.gnu.org/bugs/?41751"
},
{
"name": "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/Tools/gdomap.c?r1=37756&r2=37755&pathrev=37756",
"refsource": "CONFIRM",
"url": "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/Tools/gdomap.c?r1=37756&r2=37755&pathrev=37756"
},
{
"name": "66992",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66992"
},
{
"name": "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/ChangeLog?r1=37756&r2=37755&pathrev=37756",
"refsource": "CONFIRM",
"url": "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/ChangeLog?r1=37756&r2=37755&pathrev=37756"
},
{
"name": "[oss-security] 20140421 Re: CVE request / advisory: gdomap (GNUstep core package <= 1.24.6)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q2/152"
},
{
"name": "[oss-security] 20140419 CVE request / advisory: gdomap (GNUstep core package <= 1.24.6)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q2/143"
},
{
"name": "58104",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58104"
},
{
"name" : "gnustep-cve20142980-dos(92688)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/92688"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6856",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#777769",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/777769"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#777769",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/777769"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7499",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#256545",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "41652",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/41652/"
},
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0089",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0089"
},
{
"name": "96606",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96606"
},
{
"name": "41652",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41652/"
},
{
"name": "1037992",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037992"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0089",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0089"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-07-05T00:00:00",
"ID": "CVE-2017-0682",
"STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.361497",
"ID": "CVE-2017-1000150",
"REQUESTER": "info@mahara.org",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Mahara",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "<15.04.7, <15.10.3"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Mahara"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Sessions"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000443",
"REQUESTER": "boothf@boothlabs.me",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Openhacker",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "0.1.47"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Eleix (Francis Booth)"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-79"
"value": "n/a"
}
]
}
@ -54,15 +54,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/Eleix/openhacker/commit/9da5c237ba5e2311f01edc83389bc5aaf0a9885c",
"refsource" : "CONFIRM",
"url" : "https://github.com/Eleix/openhacker/commit/9da5c237ba5e2311f01edc83389bc5aaf0a9885c"
},
{
"name": "https://github.com/Eleix/openhacker/issues/5",
"refsource": "CONFIRM",
"url": "https://github.com/Eleix/openhacker/issues/5"
},
{
"name": "https://github.com/Eleix/openhacker/commit/9da5c237ba5e2311f01edc83389bc5aaf0a9885c",
"refsource": "CONFIRM",
"url": "https://github.com/Eleix/openhacker/commit/9da5c237ba5e2311f01edc83389bc5aaf0a9885c"
}
]
}

View File

@ -68,15 +68,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/123670",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/123670"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22007160",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22007160"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/123670",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/123670"
}
]
}

View File

@ -100,15 +100,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www-01.ibm.com/support/docview.wss?uid=ibm10724511",
"refsource" : "CONFIRM",
"url" : "https://www-01.ibm.com/support/docview.wss?uid=ibm10724511"
},
{
"name": "ibm-bigfix-cve20171231-info-disc(123910)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/123910"
},
{
"name": "https://www-01.ibm.com/support/docview.wss?uid=ibm10724511",
"refsource": "CONFIRM",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10724511"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4585",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4811",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2017-0003.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2017-0003.html"
},
{
"name": "96771",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96771"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2017-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2017-0003.html"
},
{
"name": "1037979",
"refsource": "SECTRACK",

View File

@ -58,6 +58,11 @@
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1309282"
},
{
"name": "1037693",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037693"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-01/",
"refsource": "CONFIRM",
@ -67,11 +72,6 @@
"name": "95763",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95763"
},
{
"name" : "1037693",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037693"
}
]
}