"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:36:43 +00:00
parent ef8522925e
commit 031179c9e1
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 4752 additions and 4752 deletions

View File

@ -58,9 +58,14 @@
"url": "http://pridels0.blogspot.com/2006/03/adman-v10x-sql-vuln.html"
},
{
"name" : "17208",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17208"
"name": "adman-viewstatement-sql-injection(25403)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25403"
},
{
"name": "19351",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19351"
},
{
"name": "ADV-2006-1071",
@ -73,14 +78,9 @@
"url": "http://www.osvdb.org/24064"
},
{
"name" : "19351",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19351"
},
{
"name" : "adman-viewstatement-sql-injection(25403)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25403"
"name": "17208",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17208"
}
]
}

View File

@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name": "26932",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26932"
},
{
"name": "APPLE-SA-2006-06-27",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2006/Jun/msg00000.html"
},
{
"name" : "VU#652196",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/652196"
},
{
"name": "18686",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18686"
},
{
"name" : "18728",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18728"
},
{
"name" : "ADV-2006-2566",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2566"
},
{
"name" : "26932",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26932"
},
{
"name": "1016396",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016396"
},
{
"name": "VU#652196",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/652196"
},
{
"name": "macosx-openldap-directory-dos(27480)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27480"
},
{
"name": "18728",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18728"
},
{
"name": "20877",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20877"
},
{
"name" : "macosx-openldap-directory-dos(27480)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27480"
"name": "ADV-2006-2566",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2566"
}
]
}

View File

@ -52,21 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-004_e/index-e.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-004_e/index-e.html"
},
{
"name": "17329",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17329"
},
{
"name" : "24309",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24309"
},
{
"name": "19472",
"refsource": "SECUNIA",
@ -76,6 +66,16 @@
"name": "xfits-data-dos(25567)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25567"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS06-004_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-004_e/index-e.html"
},
{
"name": "24309",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24309"
}
]
}

View File

@ -52,30 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20060407 [KAPDA::#38] - MyBB 1.1.0~functions_post.php~XSS Attack",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/430344/100/0/threaded"
},
{
"name" : "http://kapda.ir/advisory-305.html",
"refsource" : "MISC",
"url" : "http://kapda.ir/advisory-305.html"
},
{
"name" : "http://myimei.com/security/2006-03-12/mybb-110functions_postphpxss-attack.html",
"refsource" : "MISC",
"url" : "http://myimei.com/security/2006-03-12/mybb-110functions_postphpxss-attack.html"
},
{
"name": "17413",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17413"
},
{
"name" : "24375",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24375"
"name": "http://kapda.ir/advisory-305.html",
"refsource": "MISC",
"url": "http://kapda.ir/advisory-305.html"
},
{
"name": "19516",
@ -86,6 +71,21 @@
"name": "mybb-email-img-bbcode-xss(25615)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25615"
},
{
"name": "24375",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24375"
},
{
"name": "http://myimei.com/security/2006-03-12/mybb-110functions_postphpxss-attack.html",
"refsource": "MISC",
"url": "http://myimei.com/security/2006-03-12/mybb-110functions_postphpxss-attack.html"
},
{
"name": "20060407 [KAPDA::#38] - MyBB 1.1.0~functions_post.php~XSS Attack",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/430344/100/0/threaded"
}
]
}

View File

@ -52,65 +52,65 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2006-090826.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2006-090826.html"
},
{
"name" : "HPSBMA02113",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/432267/100/0/threaded"
},
{
"name" : "SSRT061148",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/432267/100/0/threaded"
},
{
"name" : "VU#619194",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/619194"
},
{
"name" : "VU#824833",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/824833"
},
{
"name" : "17590",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17590"
},
{
"name" : "ADV-2006-1397",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1397"
},
{
"name" : "ADV-2006-1571",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1571"
},
{
"name" : "1015961",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015961"
},
{
"name": "19712",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19712"
},
{
"name": "oracle-ebusiness-multiple-unspecifed(26058)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26058"
},
{
"name": "19859",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19859"
},
{
"name" : "oracle-ebusiness-multiple-unspecifed(26058)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26058"
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2006-090826.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2006-090826.html"
},
{
"name": "ADV-2006-1571",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1571"
},
{
"name": "VU#824833",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/824833"
},
{
"name": "VU#619194",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/619194"
},
{
"name": "17590",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17590"
},
{
"name": "SSRT061148",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/432267/100/0/threaded"
},
{
"name": "ADV-2006-1397",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1397"
},
{
"name": "HPSBMA02113",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/432267/100/0/threaded"
},
{
"name": "1015961",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015961"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "2430",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2430"
"name": "22113",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22113"
},
{
"name": "84255",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84255"
},
{
"name" : "ADV-2006-3774",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3774"
},
{
"name" : "22113",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22113"
},
{
"name": "importal-functions-file-include(29146)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29146"
},
{
"name": "2430",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2430"
},
{
"name": "ADV-2006-3774",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3774"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20212",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20212"
},
{
"name": "33676",
"refsource": "OSVDB",
@ -66,6 +61,11 @@
"name": "33677",
"refsource": "OSVDB",
"url": "http://osvdb.org/33677"
},
{
"name": "20212",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20212"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060926 net2ftp: a web based FTP client :) <= Remote File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/447156/100/0/threaded"
"name": "http://www.net2ftp.org/forums/viewtopic.php?pid=6689",
"refsource": "MISC",
"url": "http://www.net2ftp.org/forums/viewtopic.php?pid=6689"
},
{
"name": "20061002 Re: net2ftp: a web based FTP client :) <= Remote File Inclusion",
@ -63,14 +63,9 @@
"url": "http://www.securityfocus.com/archive/1/447535/100/0/threaded"
},
{
"name" : "20061006 Re: net2ftp Remote File Inclusion - bogus report",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/447916/100/0/threaded"
},
{
"name" : "20061009 Re: net2ftp: a web based FTP client :) <= Remote File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/448037/100/0/threaded"
"name": "http://www.net2ftp.org/forums/viewtopic.php?pid=6676",
"refsource": "MISC",
"url": "http://www.net2ftp.org/forums/viewtopic.php?pid=6676"
},
{
"name": "http://www.net2ftp.org/forums/viewtopic.php?pid=6687",
@ -78,9 +73,9 @@
"url": "http://www.net2ftp.org/forums/viewtopic.php?pid=6687"
},
{
"name" : "20061009 net2ftp: a web based FTP client :) <= Remote File Inclusion (fwd)",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2006-October/001076.html"
"name": "20061009 Re: net2ftp: a web based FTP client :) <= Remote File Inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/448037/100/0/threaded"
},
{
"name": "20061009 net2ftp: a web based FTP client :) <= Remote File Inclusion (fwd)",
@ -88,14 +83,14 @@
"url": "http://www.attrition.org/pipermail/vim/2006-October/001077.html"
},
{
"name" : "http://www.net2ftp.org/forums/viewtopic.php?pid=6676",
"refsource" : "MISC",
"url" : "http://www.net2ftp.org/forums/viewtopic.php?pid=6676"
"name": "20061006 Re: net2ftp Remote File Inclusion - bogus report",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/447916/100/0/threaded"
},
{
"name" : "http://www.net2ftp.org/forums/viewtopic.php?pid=6689",
"refsource" : "MISC",
"url" : "http://www.net2ftp.org/forums/viewtopic.php?pid=6689"
"name": "net2ftp-index-file-include(29203)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29203"
},
{
"name": "1655",
@ -103,9 +98,14 @@
"url": "http://securityreason.com/securityalert/1655"
},
{
"name" : "net2ftp-index-file-include(29203)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29203"
"name": "20060926 net2ftp: a web based FTP client :) <= Remote File Inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/447156/100/0/threaded"
},
{
"name": "20061009 net2ftp: a web based FTP client :) <= Remote File Inclusion (fwd)",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2006-October/001076.html"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20417"
},
{
"name" : "ADV-2006-3958",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3958"
},
{
"name": "22310",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22310"
},
{
"name": "ADV-2006-3958",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3958"
}
]
}

View File

@ -53,25 +53,20 @@
"references": {
"reference_data": [
{
"name" : "https://bugs.freedesktop.org/show_bug.cgi?id=8699",
"refsource" : "CONFIRM",
"url" : "https://bugs.freedesktop.org/show_bug.cgi?id=8699"
},
{
"name" : "http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git;a=commit;h=686bb8b35acf6cecae80fe89b2b5853f5816ce19",
"refsource" : "CONFIRM",
"url" : "http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git;a=commit;h=686bb8b35acf6cecae80fe89b2b5853f5816ce19"
},
{
"name" : "MDKSA-2006:199",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:199"
"name": "22749",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22749"
},
{
"name": "20845",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20845"
},
{
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=8699",
"refsource": "CONFIRM",
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=8699"
},
{
"name": "ADV-2006-4289",
"refsource": "VUPEN",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/22642"
},
{
"name" : "22749",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22749"
"name": "http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git;a=commit;h=686bb8b35acf6cecae80fe89b2b5853f5816ce19",
"refsource": "CONFIRM",
"url": "http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git;a=commit;h=686bb8b35acf6cecae80fe89b2b5853f5816ce19"
},
{
"name": "MDKSA-2006:199",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:199"
},
{
"name": "libx11-xinput-information-disclosure(29956)",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "24842",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24842"
},
{
"name": "3702",
"refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "ADV-2007-1345",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1345"
},
{
"name" : "24842",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24842"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "3717",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3717"
},
{
"name" : "23451",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23451"
"name": "35747",
"refsource": "OSVDB",
"url": "http://osvdb.org/35747"
},
{
"name": "ADV-2007-1385",
@ -68,14 +63,19 @@
"url": "http://www.vupen.com/english/advisories/2007/1385"
},
{
"name" : "35747",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35747"
"name": "23451",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23451"
},
{
"name": "webkalk2-engine-file-include(33598)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33598"
},
{
"name": "3717",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3717"
}
]
}

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=508650",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=508650"
"name": "36174",
"refsource": "OSVDB",
"url": "http://osvdb.org/36174"
},
{
"name": "DSA-1692",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1692"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=508650",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=508650"
},
{
"name": "ADV-2007-1841",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1841"
},
{
"name" : "36174",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36174"
},
{
"name": "25299",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25299"
},
{
"name" : "33265",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33265"
},
{
"name": "xajax-xajaxinc-xss(34323)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34323"
},
{
"name": "33265",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33265"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2007-6017",
"STATE": "PUBLIC"
},
@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://secunia.com/secunia_research/2007-101/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2007-101/"
"name": "http://support.veritas.com/docs/300471",
"refsource": "CONFIRM",
"url": "http://support.veritas.com/docs/300471"
},
{
"name": "1019525",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019525"
},
{
"name": "http://www.symantec.com/avcenter/security/Content/2008.02.29.html",
@ -68,9 +73,9 @@
"url": "http://seer.entsupport.symantec.com/docs/300471.htm"
},
{
"name" : "http://support.veritas.com/docs/300471",
"name": "http://seer.support.veritas.com/docs/308669.htm",
"refsource": "CONFIRM",
"url" : "http://support.veritas.com/docs/300471"
"url": "http://seer.support.veritas.com/docs/308669.htm"
},
{
"name": "http://www.symantec.com/avcenter/security/Content/2008.02.28.html",
@ -78,34 +83,29 @@
"url": "http://www.symantec.com/avcenter/security/Content/2008.02.28.html"
},
{
"name" : "http://seer.support.veritas.com/docs/308669.htm",
"refsource" : "CONFIRM",
"url" : "http://seer.support.veritas.com/docs/308669.htm"
"name": "ADV-2008-0718",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0718"
},
{
"name": "27885",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27885"
},
{
"name": "http://secunia.com/secunia_research/2007-101/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2007-101/"
},
{
"name": "28008",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28008"
},
{
"name" : "ADV-2008-0718",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0718"
},
{
"name": "ADV-2008-2672",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2672"
},
{
"name" : "1019525",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019525"
},
{
"name" : "27885",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27885"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "18564",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/18564/"
},
{
"name" : "http://drupal.org/node/144538",
"name": "http://ivanobinetti.blogspot.it/2012/03/drupal-cms-712-latest-stable-release.html",
"refsource": "MISC",
"url" : "http://drupal.org/node/144538"
"url": "http://ivanobinetti.blogspot.it/2012/03/drupal-cms-712-latest-stable-release.html"
},
{
"name": "http://groups.drupal.org/node/216314",
@ -68,9 +63,14 @@
"url": "http://groups.drupal.org/node/216314"
},
{
"name" : "http://ivanobinetti.blogspot.it/2012/03/drupal-cms-712-latest-stable-release.html",
"name": "http://drupal.org/node/144538",
"refsource": "MISC",
"url" : "http://ivanobinetti.blogspot.it/2012/03/drupal-cms-712-latest-stable-release.html"
"url": "http://drupal.org/node/144538"
},
{
"name": "18564",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18564/"
},
{
"name": "http://packetstormsecurity.org/files/110404/drupal712-xsrf.txt",

View File

@ -52,26 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=32915",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=32915"
},
{
"name" : "http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html"
},
{
"name" : "http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs",
"refsource" : "CONFIRM",
"url" : "http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs"
},
{
"name": "38177",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38177"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=32915",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=32915"
},
{
"name": "62320",
"refsource": "OSVDB",
@ -82,25 +72,35 @@
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14256"
},
{
"name": "http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs",
"refsource": "CONFIRM",
"url": "http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs"
},
{
"name": "googlechrome-sandbox-code-exec(56217)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56217"
},
{
"name": "1023583",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023583"
},
{
"name" : "38545",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38545"
},
{
"name": "ADV-2010-0361",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0361"
},
{
"name" : "googlechrome-sandbox-code-exec(56217)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56217"
"name": "http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html"
},
{
"name": "38545",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38545"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-0731",
"STATE": "PUBLIC"
},
@ -52,6 +52,36 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2010:0167",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0167.html"
},
{
"name": "39127",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39127"
},
{
"name": "MDVSA-2010:089",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:089"
},
{
"name": "38959",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38959"
},
{
"name": "ADV-2010-0713",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0713"
},
{
"name": "oval:org.mitre.oval:def:9759",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9759"
},
{
"name": "http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/4230",
"refsource": "CONFIRM",
@ -62,41 +92,11 @@
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=573028"
},
{
"name" : "MDVSA-2010:089",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:089"
},
{
"name" : "RHSA-2010:0167",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0167.html"
},
{
"name": "SUSE-SR:2010:014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
},
{
"name" : "38959",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/38959"
},
{
"name" : "oval:org.mitre.oval:def:9759",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9759"
},
{
"name" : "39127",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39127"
},
{
"name" : "ADV-2010-0713",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/0713"
},
{
"name": "ADV-2010-1054",
"refsource": "VUPEN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-0884",
"STATE": "PUBLIC"
},
@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "TA10-103B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-103B.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html"
},
{
"name": "osps-cluster-unspecified-var1(57760)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57760"
},
{
"name": "1021808",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021808.1-1"
},
{
"name" : "TA10-103B",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-103B.html"
},
{
"name": "39464",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39464"
},
{
"name" : "osps-cluster-unspecified-var1(57760)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57760"
}
]
}

View File

@ -53,35 +53,35 @@
"references": {
"reference_data": [
{
"name" : "[MediaWiki-announce] 20100303 MediaWiki security update: 1.15.2",
"refsource" : "MLIST",
"url" : "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-March/000088.html"
"name": "39656",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39656"
},
{
"name": "DSA-2022",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2022"
},
{
"name": "[MediaWiki-announce] 20100303 MediaWiki security update: 1.15.2",
"refsource": "MLIST",
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-March/000088.html"
},
{
"name": "SUSE-SR:2010:010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html"
},
{
"name" : "39022",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39022"
},
{
"name" : "39656",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39656"
},
{
"name": "ADV-2010-0685",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0685"
},
{
"name": "39022",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39022"
},
{
"name": "ADV-2010-1001",
"refsource": "VUPEN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-1818",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:7523",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7523"
},
{
"name": "https://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb",
"refsource": "MISC",
"url": "https://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb"
},
{
"name": "http://reversemode.com/index.php?option=com_content&task=view&id=69&Itemid=1",
"refsource": "MISC",
@ -62,11 +72,6 @@
"refsource": "MISC",
"url": "http://threatpost.com/en_us/blogs/new-remote-flaw-apple-quicktime-bypasses-aslr-and-dep-083010"
},
{
"name" : "https://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb",
"refsource" : "MISC",
"url" : "https://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb"
},
{
"name": "http://support.apple.com/kb/ht4339",
"refsource": "CONFIRM",
@ -76,11 +81,6 @@
"name": "APPLE-SA-2010-09-15-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010/Sep/msg00003.html"
},
{
"name" : "oval:org.mitre.oval:def:7523",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7523"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/12063"
},
{
"name" : "39233",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39233"
},
{
"name": "63558",
"refsource": "OSVDB",
@ -76,6 +71,11 @@
"name": "fpbs-phpincdir-file-include(57560)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57560"
},
{
"name": "39233",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39233"
}
]
}

View File

@ -52,16 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "68882",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/68882"
},
{
"name": "41978",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41978"
},
{
"name": "http://bugs.gentoo.org/342687",
"refsource": "MISC",
"url": "http://bugs.gentoo.org/342687"
},
{
"name" : "http://www.vuxml.org/freebsd/96e776c7-e75c-11df-8f26-00151735203a.html",
"refsource" : "MISC",
"url" : "http://www.vuxml.org/freebsd/96e776c7-e75c-11df-8f26-00151735203a.html"
},
{
"name": "http://otrs.org/advisory/OSA-2010-03-en/",
"refsource": "CONFIRM",
@ -73,14 +78,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name" : "68882",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/68882"
},
{
"name" : "41978",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41978"
"name": "http://www.vuxml.org/freebsd/96e776c7-e75c-11df-8f26-00151735203a.html",
"refsource": "MISC",
"url": "http://www.vuxml.org/freebsd/96e776c7-e75c-11df-8f26-00151735203a.html"
}
]
}

View File

@ -53,30 +53,30 @@
"references": {
"reference_data": [
{
"name" : "20101013 Directory Traversal Vulnerability in AnyConnect",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=128699692209082&w=2"
},
{
"name" : "http://packetstormsecurity.org/1010-exploits/anyconnect-traversal.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1010-exploits/anyconnect-traversal.txt"
"name": "68666",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/68666"
},
{
"name": "http://www.htbridge.ch/advisory/directory_traversal_vulnerability_in_anyconnect.html",
"refsource": "MISC",
"url": "http://www.htbridge.ch/advisory/directory_traversal_vulnerability_in_anyconnect.html"
},
{
"name": "http://packetstormsecurity.org/1010-exploits/anyconnect-traversal.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1010-exploits/anyconnect-traversal.txt"
},
{
"name": "20101013 Directory Traversal Vulnerability in AnyConnect",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=128699692209082&w=2"
},
{
"name": "44076",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44076"
},
{
"name" : "68666",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/68666"
},
{
"name": "41802",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4258",
"STATE": "PUBLIC"
},
@ -52,175 +52,75 @@
},
"references": {
"reference_data": [
{
"name" : "20101207 Linux kernel exploit",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html"
},
{
"name" : "[linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.",
"refsource" : "MLIST",
"url" : "https://lkml.org/lkml/2010/12/1/543"
},
{
"name" : "[linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=linux-kernel&m=129117048916957&w=2"
},
{
"name": "[oss-security] 20101202 CVE request: kernel: failure to revert address limit override in OOPS error path",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/02/2"
},
{
"name" : "[oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/02/7"
},
{
"name" : "[oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/02/4"
},
{
"name" : "[oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/02/3"
},
{
"name" : "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/08/9"
},
{
"name" : "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/08/4"
},
{
"name" : "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/08/5"
},
{
"name" : "[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/09/4"
},
{
"name" : "[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/09/14"
},
{
"name" : "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/",
"refsource" : "MISC",
"url" : "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=659567",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=659567"
},
{
"name" : "http://code.google.com/p/chromium-os/issues/detail?id=10234",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium-os/issues/detail?id=10234"
},
{
"name" : "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html"
},
{
"name" : "FEDORA-2010-18983",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"
},
{
"name" : "MDVSA-2011:029",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"name" : "SUSE-SA:2011:001",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
},
{
"name" : "SUSE-SA:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
},
{
"name" : "SUSE-SA:2011:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"
},
{
"name" : "SUSE-SA:2011:005",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html"
},
{
"name" : "SUSE-SA:2011:007",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name" : "SUSE-SA:2011:008",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"name" : "42745",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42745"
},
{
"name" : "42778",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42778"
},
{
"name" : "42801",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42801"
},
{
"name" : "42932",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42932"
},
{
"name": "43056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43056"
},
{
"name" : "43291",
"name": "SUSE-SA:2011:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"
},
{
"name": "42778",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/43291"
"url": "http://secunia.com/advisories/42778"
},
{
"name" : "ADV-2010-3321",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/3321"
"name": "[oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/02/3"
},
{
"name" : "ADV-2011-0012",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0012"
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177"
},
{
"name": "42801",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42801"
},
{
"name": "SUSE-SA:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
},
{
"name": "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/",
"refsource": "MISC",
"url": "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/"
},
{
"name": "[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/09/4"
},
{
"name": "FEDORA-2010-18983",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"
},
{
"name": "SUSE-SA:2011:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
},
{
"name": "42932",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42932"
},
{
"name": "20101207 Linux kernel exploit",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html"
},
{
"name": "ADV-2011-0124",
@ -228,19 +128,119 @@
"url": "http://www.vupen.com/english/advisories/2011/0124"
},
{
"name" : "ADV-2011-0213",
"name": "[linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel&m=129117048916957&w=2"
},
{
"name": "SUSE-SA:2011:007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "ADV-2010-3321",
"refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0213"
"url": "http://www.vupen.com/english/advisories/2010/3321"
},
{
"name": "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/08/9"
},
{
"name": "ADV-2011-0298",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
},
{
"name": "[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/09/14"
},
{
"name": "SUSE-SA:2011:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html"
},
{
"name": "http://code.google.com/p/chromium-os/issues/detail?id=10234",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium-os/issues/detail?id=10234"
},
{
"name": "ADV-2011-0375",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"name": "[linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.",
"refsource": "MLIST",
"url": "https://lkml.org/lkml/2010/12/1/543"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html"
},
{
"name": "ADV-2011-0012",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0012"
},
{
"name": "SUSE-SA:2011:008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"name": "[oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/02/4"
},
{
"name": "MDVSA-2011:029",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"name": "42745",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42745"
},
{
"name": "[oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/02/7"
},
{
"name": "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/08/5"
},
{
"name": "43291",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43291"
},
{
"name": "ADV-2011-0213",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0213"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659567",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659567"
},
{
"name": "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/08/4"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15627"
},
{
"name" : "http://packetstormsecurity.org/files/view/96148/site2nitebigtruck-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/files/view/96148/site2nitebigtruck-sql.txt"
},
{
"name": "42383",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42383"
},
{
"name": "http://packetstormsecurity.org/files/view/96148/site2nitebigtruck-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/files/view/96148/site2nitebigtruck-sql.txt"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21454745",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21454745"
},
{
"name" : "IC69150",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IC69150"
},
{
"name": "1024901",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024901"
},
{
"name": "ADV-2010-3251",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3251"
},
{
"name": "42639",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42639"
},
{
"name" : "ADV-2010-3251",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/3251"
"name": "IC69150",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC69150"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21454745",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21454745"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0061",
"STATE": "PUBLIC"
},
@ -52,56 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://wiki.postgresql.org/wiki/20140220securityrelease",
"refsource" : "CONFIRM",
"url" : "http://wiki.postgresql.org/wiki/20140220securityrelease"
},
{
"name" : "http://www.postgresql.org/about/news/1506/",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/about/news/1506/"
},
{
"name" : "http://support.apple.com/kb/HT6448",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6448"
},
{
"name" : "https://support.apple.com/kb/HT6536",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT6536"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name" : "APPLE-SA-2014-10-16-3",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html"
},
{
"name" : "DSA-2864",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2864"
},
{
"name" : "DSA-2865",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2865"
},
{
"name" : "RHSA-2014:0469",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0469.html"
},
{
"name": "RHSA-2014:0211",
"refsource": "REDHAT",
@ -112,26 +62,76 @@
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0221.html"
},
{
"name": "http://support.apple.com/kb/HT6448",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6448"
},
{
"name": "RHSA-2014:0469",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0469.html"
},
{
"name": "APPLE-SA-2014-10-16-3",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html"
},
{
"name": "http://wiki.postgresql.org/wiki/20140220securityrelease",
"refsource": "CONFIRM",
"url": "http://wiki.postgresql.org/wiki/20140220securityrelease"
},
{
"name": "DSA-2864",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2864"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "RHSA-2014:0249",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0249.html"
},
{
"name": "http://www.postgresql.org/about/news/1506/",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/about/news/1506/"
},
{
"name": "USN-2120-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2120-1"
},
{
"name": "https://support.apple.com/kb/HT6536",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6536"
},
{
"name": "DSA-2865",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2865"
},
{
"name": "openSUSE-SU-2014:0345",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "openSUSE-SU-2014:0368",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html"
},
{
"name" : "USN-2120-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2120-1"
},
{
"name": "61307",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0182",
"STATE": "PUBLIC"
},
@ -52,15 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2014:0743",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
},
{
"name": "[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html"
},
{
"name" : "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc",
"refsource" : "CONFIRM",
"url" : "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc"
"name": "RHSA-2014:0744",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
},
{
"name": "FEDORA-2014-6288",
@ -68,14 +73,9 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html"
},
{
"name" : "RHSA-2014:0743",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
},
{
"name" : "RHSA-2014:0744",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
"name": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc",
"refsource": "CONFIRM",
"url": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2014-0498",
"STATE": "PUBLIC"
},
@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "http://helpx.adobe.com/security/products/flash-player/apsb14-07.html",
"refsource" : "CONFIRM",
"url" : "http://helpx.adobe.com/security/products/flash-player/apsb14-07.html"
"name": "openSUSE-SU-2014:0278",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html"
},
{
"name": "GLSA-201405-04",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201405-04.xml"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb14-07.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-07.html"
},
{
"name": "RHSA-2014:0196",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0196.html"
},
{
"name" : "openSUSE-SU-2014:0277",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html"
},
{
"name" : "openSUSE-SU-2014:0278",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html"
},
{
"name": "SUSE-SU-2014:0290",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html"
},
{
"name": "openSUSE-SU-2014:0277",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-0769",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-0961",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "ibm-sim-cve20140961-csrf(92747)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92747"
},
{
"name": "59080",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59080"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21674754",
"refsource": "CONFIRM",
@ -61,16 +71,6 @@
"name": "67909",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67909"
},
{
"name" : "59080",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59080"
},
{
"name" : "ibm-sim-cve20140961-csrf(92747)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/92747"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-4062",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MS14-046",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-046"
"name": "1030721",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030721"
},
{
"name": "69145",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/69145"
},
{
"name" : "1030721",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030721"
"name": "MS14-046",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-046"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-4232",
"STATE": "PUBLIC"
},
@ -53,14 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
@ -68,19 +68,19 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name" : "68606",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68606"
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name": "oracle-cpujul2014-cve20144232(94614)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94614"
},
{
"name": "68606",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68606"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-9207",
"STATE": "PUBLIC"
},

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "71846",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71846"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774321",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774321"
},
{
"name": "[oss-security] 20141231 cve request: miniunzip directory traversal",
"refsource": "MLIST",
@ -61,16 +71,6 @@
"name": "[oss-security] 20150103 Re: cve request: miniunzip directory traversal",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/01/03/16"
},
{
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774321",
"refsource" : "CONFIRM",
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774321"
},
{
"name" : "71846",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71846"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20150113 Reflecting XSS vulnerability in filemanager of CMS b2evolution v. 5.2.0",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Jan/48"
},
{
"name" : "http://packetstormsecurity.com/files/129940/CMS-b2evolution-5.2.0-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/129940/CMS-b2evolution-5.2.0-Cross-Site-Scripting.html"
"name": "http://b2evolution.net/downloads/5-2-1-stable",
"refsource": "CONFIRM",
"url": "http://b2evolution.net/downloads/5-2-1-stable"
},
{
"name": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-09.html",
@ -68,20 +63,20 @@
"url": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-09.html"
},
{
"name" : "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2014-09.html",
"refsource" : "MISC",
"url" : "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2014-09.html"
},
{
"name" : "http://b2evolution.net/downloads/5-2-1-stable",
"refsource" : "CONFIRM",
"url" : "http://b2evolution.net/downloads/5-2-1-stable"
"name": "20150113 Reflecting XSS vulnerability in filemanager of CMS b2evolution v. 5.2.0",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jan/48"
},
{
"name": "https://twitter.com/SecLists/status/554937224366546944",
"refsource": "CONFIRM",
"url": "https://twitter.com/SecLists/status/554937224366546944"
},
{
"name": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2014-09.html",
"refsource": "MISC",
"url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2014-09.html"
},
{
"name": "72052",
"refsource": "BID",
@ -91,6 +86,11 @@
"name": "b2evolution-fmfilter-xss(99891)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99891"
},
{
"name": "http://packetstormsecurity.com/files/129940/CMS-b2evolution-5.2.0-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/129940/CMS-b2evolution-5.2.0-Cross-Site-Scripting.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-9635",
"STATE": "PUBLIC"
},
@ -62,26 +62,26 @@
"refsource": "MISC",
"url": "https://issues.jenkins-ci.org/browse/JENKINS-25019"
},
{
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682",
"refsource" : "CONFIRM",
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1185151",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185151"
},
{
"name" : "https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710",
"refsource" : "CONFIRM",
"url" : "https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710"
},
{
"name": "https://jenkins.io/changelog-old/",
"refsource": "CONFIRM",
"url": "https://jenkins.io/changelog-old/"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682"
},
{
"name": "https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710",
"refsource": "CONFIRM",
"url": "https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710"
},
{
"name": "72054",
"refsource": "BID",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-3204",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MS16-084",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-084"
},
{
"name" : "MS16-086",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-086"
"name": "1036283",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036283"
},
{
"name": "91584",
@ -73,9 +68,14 @@
"url": "http://www.securitytracker.com/id/1036282"
},
{
"name" : "1036283",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036283"
"name": "MS16-086",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-086"
},
{
"name": "MS16-084",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-084"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-3215",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-370",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-370"
},
{
"name" : "MS16-068",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-068"
},
{
"name": "MS16-080",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-080"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-370",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-370"
},
{
"name": "1036099",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036099"
},
{
"name": "MS16-068",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-068"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-3555",
"STATE": "PUBLIC"
},
@ -57,6 +57,11 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "1036402",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036402"
},
{
"name": "91787",
"refsource": "BID",
@ -66,11 +71,6 @@
"name": "91997",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91997"
},
{
"name" : "1036402",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036402"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-3873",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-09-01.html"
},
{
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
"refsource" : "CONFIRM",
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
},
{
"name": "1036763",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036763"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160724 Re: Fwd: CVE for PHP 5.5.38 issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2016/07/24/2"
},
{
"name": "http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4",
"refsource": "MISC",
@ -72,6 +67,11 @@
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-58"
},
{
"name": "[oss-security] 20160724 Re: Fwd: CVE for PHP 5.5.38 issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2016/07/24/2"
},
{
"name": "92127",
"refsource": "BID",

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "43390",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/43390/"
"name": "102278",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102278"
},
{
"name": "20171223 [CVE-2016-6914] Ubiquiti UniFi Video v3.7.3 (Windows) Local Privileges Escalation via Insecure Directory Permissions",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2017/Dec/83"
},
{
"name" : "http://packetstormsecurity.com/files/145533/Ubiquiti-UniFi-Video-3.7.3-Windows-Local-Privilege-Escalation.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/145533/Ubiquiti-UniFi-Video-3.7.3-Windows-Local-Privilege-Escalation.html"
},
{
"name": "https://hackerone.com/reports/140793",
"refsource": "MISC",
"url": "https://hackerone.com/reports/140793"
},
{
"name" : "102278",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102278"
"name": "43390",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43390/"
},
{
"name": "http://packetstormsecurity.com/files/145533/Ubiquiti-UniFi-Video-3.7.3-Windows-Local-Privilege-Escalation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/145533/Ubiquiti-UniFi-Video-3.7.3-Windows-Local-Privilege-Escalation.html"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-130"
},
{
"name" : "94021",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94021"
},
{
"name": "1037241",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037241"
},
{
"name": "94021",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94021"
}
]
}

View File

@ -52,60 +52,60 @@
},
"references": {
"reference_data": [
{
"name" : "http://nwtime.org/ntp428p9_release/",
"refsource" : "CONFIRM",
"url" : "http://nwtime.org/ntp428p9_release/"
},
{
"name" : "http://support.ntp.org/bin/view/Main/NtpBug3067",
"refsource" : "CONFIRM",
"url" : "http://support.ntp.org/bin/view/Main/NtpBug3067"
},
{
"name" : "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities",
"refsource" : "CONFIRM",
"url" : "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
},
{
"name" : "https://bto.bluecoat.com/security-advisory/sa139",
"refsource" : "CONFIRM",
"url" : "https://bto.bluecoat.com/security-advisory/sa139"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name" : "FreeBSD-SA-16:39",
"refsource" : "FREEBSD",
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
},
{
"name": "RHSA-2017:0252",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0252.html"
},
{
"name": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities",
"refsource": "CONFIRM",
"url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
},
{
"name": "http://nwtime.org/ntp428p9_release/",
"refsource": "CONFIRM",
"url": "http://nwtime.org/ntp428p9_release/"
},
{
"name": "VU#633847",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/633847"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "1037354",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037354"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa139",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa139"
},
{
"name": "94455",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94455"
},
{
"name" : "1037354",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037354"
"name": "FreeBSD-SA-16:39",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
},
{
"name": "http://support.ntp.org/bin/view/Main/NtpBug3067",
"refsource": "CONFIRM",
"url": "http://support.ntp.org/bin/view/Main/NtpBug3067"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "93102",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93102"
},
{
"name": "[oss-security] 20160921 Re: libav: divide-by-zero in sbr_make_f_master (aacsbr.c)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/09/21/9"
},
{
"name" : "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/",
"refsource" : "MISC",
"url" : "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/"
},
{
"name": "https://git.libav.org/?p=libav.git;a=blobdiff;f=libavcodec/aacsbr.c;h=7d156e525b40b197c38db17acf16730845b91e56;hp=dbfb1677813ce6c531e4362d0be7ccf9fdfdd28e;hb=a50a5ff29ec5a8243499769e2bb9b5509ce9fd52;hpb=f55e3ff5891daf3d538b4d9176371960200d68fa",
"refsource": "CONFIRM",
"url": "https://git.libav.org/?p=libav.git;a=blobdiff;f=libavcodec/aacsbr.c;h=7d156e525b40b197c38db17acf16730845b91e56;hp=dbfb1677813ce6c531e4362d0be7ccf9fdfdd28e;hb=a50a5ff29ec5a8243499769e2bb9b5509ce9fd52;hpb=f55e3ff5891daf3d538b4d9176371960200d68fa"
},
{
"name" : "93102",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/93102"
"name": "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/",
"refsource": "MISC",
"url": "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT207421",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207421"
},
{
"name" : "https://support.apple.com/HT207422",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207422"
},
{
"name" : "https://support.apple.com/HT207424",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207424"
},
{
"name": "https://support.apple.com/HT207427",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207427"
},
{
"name" : "GLSA-201706-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201706-15"
},
{
"name": "94907",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94907"
},
{
"name": "https://support.apple.com/HT207421",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207421"
},
{
"name": "1037459",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037459"
},
{
"name": "https://support.apple.com/HT207422",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207422"
},
{
"name": "GLSA-201706-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-15"
},
{
"name": "https://support.apple.com/HT207424",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207424"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00061&languageid=en-fr",
"refsource" : "CONFIRM",
"url" : "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00061&languageid=en-fr"
},
{
"name": "93482",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93482"
},
{
"name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00061&languageid=en-fr",
"refsource": "CONFIRM",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00061&languageid=en-fr"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-8396",
"STATE": "PUBLIC"
},