"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:05:58 +00:00
parent 7e9f31f2c2
commit 06ef87c1ec
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
55 changed files with 3948 additions and 3948 deletions

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060505 CuteNews 1.4.1 Multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/433058/100/0/threaded"
},
{
"name" : "25305",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/25305"
},
{ {
"name": "25306", "name": "25306",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -76,6 +66,16 @@
"name": "cutenews-multiple-path-disclosure(26271)", "name": "cutenews-multiple-path-disclosure(26271)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26271" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26271"
},
{
"name": "20060505 CuteNews 1.4.1 Multiple vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/433058/100/0/threaded"
},
{
"name": "25305",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25305"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.kb.cert.org/vuls/id/MIMG-6JLSP7", "name": "20378",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.kb.cert.org/vuls/id/MIMG-6JLSP7" "url": "http://secunia.com/advisories/20378"
},
{
"name": "c5emv-ceid-weak-security(26767)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26767"
}, },
{ {
"name": "VU#353945", "name": "VU#353945",
@ -73,14 +78,9 @@
"url": "http://securitytracker.com/id?1016184" "url": "http://securitytracker.com/id?1016184"
}, },
{ {
"name" : "20378", "name": "http://www.kb.cert.org/vuls/id/MIMG-6JLSP7",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/20378" "url": "http://www.kb.cert.org/vuls/id/MIMG-6JLSP7"
},
{
"name" : "c5emv-ceid-weak-security(26767)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26767"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-014_e/index-e.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-014_e/index-e.html"
},
{
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-014_e/01-e.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-014_e/01-e.html"
},
{
"name" : "18830",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18830"
},
{ {
"name": "ADV-2006-2665", "name": "ADV-2006-2665",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -81,6 +66,21 @@
"name": "hitachi-multiple-products-xss(27605)", "name": "hitachi-multiple-products-xss(27605)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27605" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27605"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS06-014_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-014_e/index-e.html"
},
{
"name": "18830",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18830"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS06-014_e/01-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-014_e/01-e.html"
} }
] ]
} }

View File

@ -52,80 +52,80 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "libtunepimp-lookuptrmlookup-bo(27728)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27728"
},
{ {
"name": "http://bugs.musicbrainz.org/ticket/1764", "name": "http://bugs.musicbrainz.org/ticket/1764",
"refsource": "MISC", "refsource": "MISC",
"url": "http://bugs.musicbrainz.org/ticket/1764" "url": "http://bugs.musicbrainz.org/ticket/1764"
}, },
{
"name" : "DSA-1135",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1135"
},
{
"name" : "GLSA-200607-11",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200607-11.xml"
},
{
"name" : "MDKSA-2006:126",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:126"
},
{
"name" : "USN-318-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-318-1"
},
{
"name" : "18961",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18961"
},
{
"name" : "ADV-2006-2785",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2785"
},
{
"name" : "27094",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27094"
},
{
"name" : "1016539",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016539"
},
{
"name" : "21026",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21026"
},
{
"name" : "21027",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21027"
},
{
"name" : "21106",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21106"
},
{ {
"name": "21277", "name": "21277",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21277" "url": "http://secunia.com/advisories/21277"
}, },
{
"name": "DSA-1135",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1135"
},
{
"name": "1016539",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016539"
},
{ {
"name": "21323", "name": "21323",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21323" "url": "http://secunia.com/advisories/21323"
}, },
{ {
"name" : "libtunepimp-lookuptrmlookup-bo(27728)", "name": "MDKSA-2006:126",
"refsource" : "XF", "refsource": "MANDRIVA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27728" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:126"
},
{
"name": "21106",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21106"
},
{
"name": "21027",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21027"
},
{
"name": "GLSA-200607-11",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200607-11.xml"
},
{
"name": "27094",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27094"
},
{
"name": "21026",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21026"
},
{
"name": "18961",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18961"
},
{
"name": "USN-318-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-318-1"
},
{
"name": "ADV-2006-2785",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2785"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2006-3874", "ID": "CVE-2006-3874",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2006-4341", "ID": "CVE-2006-4341",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "2888",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2888"
},
{
"name" : "21413",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21413"
},
{ {
"name": "ADV-2006-4836", "name": "ADV-2006-4836",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -71,6 +61,16 @@
"name": "envolution-pnsvlang-file-include(30700)", "name": "envolution-pnsvlang-file-include(30700)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30700" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30700"
},
{
"name": "21413",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21413"
},
{
"name": "2888",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2888"
} }
] ]
} }

View File

@ -58,19 +58,9 @@
"url": "http://www.securityfocus.com/archive/1/454059/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/454059/100/0/threaded"
}, },
{ {
"name" : "20061210 Multiple vulnerabilities in Winamp Web Interface 7.5.13", "name": "23292",
"refsource" : "FULLDISC", "refsource": "SECUNIA",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051217.html" "url": "http://secunia.com/advisories/23292"
},
{
"name" : "http://aluigi.altervista.org/adv/wawix-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/wawix-adv.txt"
},
{
"name" : "ADV-2006-4935",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4935"
}, },
{ {
"name": "1017362", "name": "1017362",
@ -78,9 +68,19 @@
"url": "http://securitytracker.com/id?1017362" "url": "http://securitytracker.com/id?1017362"
}, },
{ {
"name" : "23292", "name": "winampwi-browse-directory-traversal(30827)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/23292" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30827"
},
{
"name": "20061210 Multiple vulnerabilities in Winamp Web Interface 7.5.13",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051217.html"
},
{
"name": "ADV-2006-4935",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4935"
}, },
{ {
"name": "2032", "name": "2032",
@ -88,9 +88,9 @@
"url": "http://securityreason.com/securityalert/2032" "url": "http://securityreason.com/securityalert/2032"
}, },
{ {
"name" : "winampwi-browse-directory-traversal(30827)", "name": "http://aluigi.altervista.org/adv/wawix-adv.txt",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30827" "url": "http://aluigi.altervista.org/adv/wawix-adv.txt"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20061209 Messageriescripthp V2.0 XSS & SQL Injection", "name": "2026",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/453965/100/0/threaded" "url": "http://securityreason.com/securityalert/2026"
}, },
{ {
"name": "21513", "name": "21513",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/23319" "url": "http://secunia.com/advisories/23319"
}, },
{ {
"name" : "2026", "name": "20061209 Messageriescripthp V2.0 XSS & SQL Injection",
"refsource" : "SREASON", "refsource": "BUGTRAQ",
"url" : "http://securityreason.com/securityalert/2026" "url": "http://www.securityfocus.com/archive/1/453965/100/0/threaded"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.securityfocus.com/data/vulnerabilities/exploits/PSYAuction-0515-sql-html.txt",
"refsource" : "MISC",
"url" : "http://www.securityfocus.com/data/vulnerabilities/exploits/PSYAuction-0515-sql-html.txt"
},
{ {
"name": "17974", "name": "17974",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/17974" "url": "http://www.securityfocus.com/bid/17974"
},
{
"name": "http://www.securityfocus.com/data/vulnerabilities/exploits/PSYAuction-0515-sql-html.txt",
"refsource": "MISC",
"url": "http://www.securityfocus.com/data/vulnerabilities/exploits/PSYAuction-0515-sql-html.txt"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "JVN#25393522", "name": "winny-node-info-dos(61277)",
"refsource" : "JVN", "refsource": "XF",
"url" : "http://jvn.jp/en/jp/JVN25393522/index.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61277"
}, },
{ {
"name": "JVNDB-2010-000028", "name": "JVNDB-2010-000028",
@ -63,9 +63,9 @@
"url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000028.html" "url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000028.html"
}, },
{ {
"name" : "winny-node-info-dos(61277)", "name": "JVN#25393522",
"refsource" : "XF", "refsource": "JVN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/61277" "url": "http://jvn.jp/en/jp/JVN25393522/index.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.ipa.go.jp/about/press/20101012_2.html", "name": "JVNDB-2010-000038",
"refsource" : "MISC", "refsource": "JVNDB",
"url" : "http://www.ipa.go.jp/about/press/20101012_2.html" "url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000038.html"
}, },
{ {
"name": "JVN#88850043", "name": "JVN#88850043",
@ -63,9 +63,9 @@
"url": "http://jvn.jp/en/jp/JVN88850043/index.html" "url": "http://jvn.jp/en/jp/JVN88850043/index.html"
}, },
{ {
"name" : "JVNDB-2010-000038", "name": "http://www.ipa.go.jp/about/press/20101012_2.html",
"refsource" : "JVNDB", "refsource": "MISC",
"url" : "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000038.html" "url": "http://www.ipa.go.jp/about/press/20101012_2.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0136", "ID": "CVE-2011-0136",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT4554",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4554"
},
{ {
"name": "http://support.apple.com/kb/HT4564", "name": "http://support.apple.com/kb/HT4564",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,20 +67,25 @@
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html"
}, },
{
"name": "oval:org.mitre.oval:def:17222",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17222"
},
{ {
"name": "APPLE-SA-2011-03-09-1", "name": "APPLE-SA-2011-03-09-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
}, },
{
"name": "http://support.apple.com/kb/HT4554",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4554"
},
{ {
"name": "APPLE-SA-2011-03-09-2", "name": "APPLE-SA-2011-03-09-2",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" "url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"name" : "oval:org.mitre.oval:def:17222",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17222"
} }
] ]
} }

View File

@ -52,31 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://zerodayinitiative.com/advisories/ZDI-11-262/",
"refsource" : "MISC",
"url" : "http://zerodayinitiative.com/advisories/ZDI-11-262/"
},
{
"name" : "http://zerodayinitiative.com/advisories/ZDI-11-263/",
"refsource" : "MISC",
"url" : "http://zerodayinitiative.com/advisories/ZDI-11-263/"
},
{ {
"name": "http://zerodayinitiative.com/advisories/ZDI-11-264/", "name": "http://zerodayinitiative.com/advisories/ZDI-11-264/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-11-264/" "url": "http://zerodayinitiative.com/advisories/ZDI-11-264/"
}, },
{
"name" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110815_00",
"refsource" : "CONFIRM",
"url" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110815_00"
},
{
"name" : "http://www.symantec.com/business/support/index?page=content&id=TECH165536",
"refsource" : "CONFIRM",
"url" : "http://www.symantec.com/business/support/index?page=content&id=TECH165536"
},
{ {
"name": "HPSBUX02700", "name": "HPSBUX02700",
"refsource": "HP", "refsource": "HP",
@ -87,15 +67,35 @@
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=131955939603667&w=2" "url": "http://marc.info/?l=bugtraq&m=131955939603667&w=2"
}, },
{
"name": "oval:org.mitre.oval:def:14792",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14792"
},
{
"name": "http://zerodayinitiative.com/advisories/ZDI-11-263/",
"refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-11-263/"
},
{
"name": "http://www.symantec.com/business/support/index?page=content&id=TECH165536",
"refsource": "CONFIRM",
"url": "http://www.symantec.com/business/support/index?page=content&id=TECH165536"
},
{ {
"name": "49014", "name": "49014",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/49014" "url": "http://www.securityfocus.com/bid/49014"
}, },
{ {
"name" : "oval:org.mitre.oval:def:14792", "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110815_00",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14792" "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110815_00"
},
{
"name": "http://zerodayinitiative.com/advisories/ZDI-11-262/",
"refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-11-262/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1007", "ID": "CVE-2011-1007",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,49 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20110222 CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition", "name": "[oss-security] 20110224 Re: Re: CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/02/22/6" "url": "http://openwall.com/lists/oss-security/2011/02/24/9"
},
{
"name" : "[oss-security] 20110222 Re: CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/02/22/12"
},
{
"name" : "[oss-security] 20110222 Re: CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/02/22/16"
}, },
{ {
"name": "[oss-security] 20110223 Re: Re: CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition", "name": "[oss-security] 20110223 Re: Re: CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/02/23/22" "url": "http://openwall.com/lists/oss-security/2011/02/23/22"
}, },
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614575",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614575"
},
{ {
"name": "[oss-security] 20110224 Re: Re: CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition", "name": "[oss-security] 20110224 Re: Re: CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/02/24/7" "url": "http://openwall.com/lists/oss-security/2011/02/24/7"
}, },
{ {
"name" : "[oss-security] 20110224 Re: Re: CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition", "name": "[oss-security] 20110222 Re: CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/02/24/8" "url": "http://openwall.com/lists/oss-security/2011/02/22/12"
},
{
"name" : "[oss-security] 20110224 Re: Re: CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/02/24/9"
},
{
"name" : "[rt-announce] 20110216 RT 3.8.9 Released",
"refsource" : "MLIST",
"url" : "http://lists.bestpractical.com/pipermail/rt-announce/2011-February/000186.html"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614575",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614575"
}, },
{ {
"name": "http://issues.bestpractical.com/Ticket/Display.html?id=15804", "name": "http://issues.bestpractical.com/Ticket/Display.html?id=15804",
@ -103,34 +83,54 @@
"url": "http://issues.bestpractical.com/Ticket/Display.html?id=15804" "url": "http://issues.bestpractical.com/Ticket/Display.html?id=15804"
}, },
{ {
"name" : "https://github.com/bestpractical/rt/commit/057552287159e801535e59b8fbd5bd98d1322069", "name": "[oss-security] 20110224 Re: Re: CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://github.com/bestpractical/rt/commit/057552287159e801535e59b8fbd5bd98d1322069" "url": "http://openwall.com/lists/oss-security/2011/02/24/8"
}, },
{ {
"name": "https://github.com/bestpractical/rt/commit/917c211820590950f7eb0521f7f43b31aeed44c4", "name": "https://github.com/bestpractical/rt/commit/917c211820590950f7eb0521f7f43b31aeed44c4",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/bestpractical/rt/commit/917c211820590950f7eb0521f7f43b31aeed44c4" "url": "https://github.com/bestpractical/rt/commit/917c211820590950f7eb0521f7f43b31aeed44c4"
}, },
{
"name" : "71012",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/71012"
},
{ {
"name": "43438", "name": "43438",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43438" "url": "http://secunia.com/advisories/43438"
}, },
{
"name": "[oss-security] 20110222 Re: CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/02/22/16"
},
{
"name": "https://github.com/bestpractical/rt/commit/057552287159e801535e59b8fbd5bd98d1322069",
"refsource": "CONFIRM",
"url": "https://github.com/bestpractical/rt/commit/057552287159e801535e59b8fbd5bd98d1322069"
},
{
"name": "[rt-announce] 20110216 RT 3.8.9 Released",
"refsource": "MLIST",
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2011-February/000186.html"
},
{
"name": "rt-login-information-disclosure(65771)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65771"
},
{
"name": "[oss-security] 20110222 CVE Request -- rt3 -- two issues: 1) Improper management of form data resubmittion upon user log out 2) SQL queries information leak by user account transition",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/02/22/6"
},
{ {
"name": "ADV-2011-0475", "name": "ADV-2011-0475",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0475" "url": "http://www.vupen.com/english/advisories/2011/0475"
}, },
{ {
"name" : "rt-login-information-disclosure(65771)", "name": "71012",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65771" "url": "http://osvdb.org/71012"
} }
] ]
} }

View File

@ -53,15 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "PM05187", "name": "43180",
"refsource" : "AIXAPAR", "refsource": "SECUNIA",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1PM05187" "url": "http://secunia.com/advisories/43180"
},
{
"name": "ADV-2011-0276",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0276"
}, },
{ {
"name": "46125", "name": "46125",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/46125" "url": "http://www.securityfocus.com/bid/46125"
}, },
{
"name": "PM05187",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM05187"
},
{ {
"name": "70763", "name": "70763",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -71,16 +81,6 @@
"name": "1025019", "name": "1025019",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025019" "url": "http://securitytracker.com/id?1025019"
},
{
"name" : "43180",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43180"
},
{
"name" : "ADV-2011-0276",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0276"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1779", "ID": "CVE-2011-1779",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2011-1860", "ID": "CVE-2011-1860",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBMA02674", "name": "hp-service-unspec-session-hijacking(67911)",
"refsource" : "HP", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=130755929821099&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67911"
},
{
"name" : "SSRT100487",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=130755929821099&w=2"
},
{
"name" : "48168",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/48168"
},
{
"name" : "1025611",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025611"
}, },
{ {
"name": "44836", "name": "44836",
@ -83,9 +68,24 @@
"url": "http://securityreason.com/securityalert/8273" "url": "http://securityreason.com/securityalert/8273"
}, },
{ {
"name" : "hp-service-unspec-session-hijacking(67911)", "name": "1025611",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67911" "url": "http://www.securitytracker.com/id?1025611"
},
{
"name": "SSRT100487",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=130755929821099&w=2"
},
{
"name": "HPSBMA02674",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=130755929821099&w=2"
},
{
"name": "48168",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48168"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-4410", "ID": "CVE-2011-4410",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2011-4787", "ID": "CVE-2011-4787",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://drupal.org/node/1357354", "name": "webformvalidation-unspecified-xss(71597)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://drupal.org/node/1357354" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71597"
},
{
"name": "47035",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47035"
}, },
{ {
"name": "http://drupal.org/node/1357356", "name": "http://drupal.org/node/1357356",
@ -73,14 +78,9 @@
"url": "http://www.osvdb.org/77426" "url": "http://www.osvdb.org/77426"
}, },
{ {
"name" : "47035", "name": "http://drupal.org/node/1357354",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/47035" "url": "http://drupal.org/node/1357354"
},
{
"name" : "webformvalidation-unspecified-xss(71597)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71597"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2014-2520", "ID": "CVE-2014-2520",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20140818 ESA-2014-079: EMC Documentum Content Server Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/533162/30/0/threaded"
},
{
"name" : "69274",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69274"
},
{ {
"name": "1030743", "name": "1030743",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030743" "url": "http://www.securitytracker.com/id/1030743"
}, },
{
"name": "emc-documentum-cve20142520-dql-injection(95369)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95369"
},
{
"name": "20140818 ESA-2014-079: EMC Documentum Content Server Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533162/30/0/threaded"
},
{ {
"name": "60571", "name": "60571",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60571" "url": "http://secunia.com/advisories/60571"
}, },
{ {
"name" : "emc-documentum-cve20142520-dql-injection(95369)", "name": "69274",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95369" "url": "http://www.securityfocus.com/bid/69274"
} }
] ]
} }

View File

@ -62,16 +62,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b" "url": "https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b"
}, },
{
"name" : "openSUSE-SU-2014:0515",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-04/msg00032.html"
},
{ {
"name": "66314", "name": "66314",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/66314" "url": "http://www.securityfocus.com/bid/66314"
}, },
{
"name": "openSUSE-SU-2014:0515",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00032.html"
},
{ {
"name": "57466", "name": "57466",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2014-2641", "ID": "CVE-2014-2641",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -57,11 +57,6 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/04/16/2" "url": "http://www.openwall.com/lists/oss-security/2014/04/16/2"
}, },
{
"name" : "[oss-security] 20140420 Re: Bug#744817: CVE request: insecure temporary file handling in clang's scan-build utility",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/04/20/1"
},
{ {
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744817", "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744817",
"refsource": "MISC", "refsource": "MISC",
@ -71,6 +66,11 @@
"name": "openSUSE-SU-2015:0245", "name": "openSUSE-SU-2015:0245",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00038.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00038.html"
},
{
"name": "[oss-security] 20140420 Re: Bug#744817: CVE request: insecure temporary file handling in clang's scan-build utility",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/04/20/1"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20140411 CSRF/XSS vulnerability in Twitget 3.3.1 (WordPress plugin)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Apr/172"
},
{
"name" : "http://packetstormsecurity.com/files/126134",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/126134"
},
{
"name" : "https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1",
"refsource" : "MISC",
"url" : "https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1"
},
{ {
"name": "http://wordpress.org/plugins/twitget/changelog", "name": "http://wordpress.org/plugins/twitget/changelog",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -76,6 +61,21 @@
"name": "twitget-wordpress-xss(92392)", "name": "twitget-wordpress-xss(92392)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92392" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92392"
},
{
"name": "http://packetstormsecurity.com/files/126134",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/126134"
},
{
"name": "20140411 CSRF/XSS vulnerability in Twitget 3.3.1 (WordPress plugin)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Apr/172"
},
{
"name": "https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1",
"refsource": "MISC",
"url": "https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3312", "ID": "CVE-2014-3312",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20140708 Cisco Small Business SPA300 and SPA500 Series IP Phones Local Code Execution Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3312"
},
{
"name" : "68465",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68465"
},
{ {
"name": "1030552", "name": "1030552",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030552" "url": "http://www.securitytracker.com/id/1030552"
}, },
{
"name": "20140708 Cisco Small Business SPA300 and SPA500 Series IP Phones Local Code Execution Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3312"
},
{ {
"name": "cisco-small-cve20143312-code-exec(94421)", "name": "cisco-small-cve20143312-code-exec(94421)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94421" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94421"
},
{
"name": "68465",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68465"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/infrastation/mrlg4php/issues/1",
"refsource": "CONFIRM",
"url": "https://github.com/infrastation/mrlg4php/issues/1"
},
{ {
"name": "http://www.s3.eurecom.fr/cve/CVE-2014-3927.txt", "name": "http://www.s3.eurecom.fr/cve/CVE-2014-3927.txt",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://hackerone.com/reports/16330", "name": "https://hackerone.com/reports/16330",
"refsource": "MISC", "refsource": "MISC",
"url": "https://hackerone.com/reports/16330" "url": "https://hackerone.com/reports/16330"
},
{
"name" : "https://github.com/infrastation/mrlg4php/issues/1",
"refsource" : "CONFIRM",
"url" : "https://github.com/infrastation/mrlg4php/issues/1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6014", "ID": "CVE-2014-6014",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#821065", "name": "VU#821065",
"refsource": "CERT-VN", "refsource": "CERT-VN",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6019", "ID": "CVE-2014-6019",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#342345", "name": "VU#342345",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-6109", "ID": "CVE-2014-6109",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10652", "name": "1031008",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10652" "url": "http://www.securitytracker.com/id/1031008"
}, },
{ {
"name": "70363", "name": "70363",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/70363" "url": "http://www.securityfocus.com/bid/70363"
}, },
{ {
"name" : "1031008", "name": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10652",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1031008" "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10652"
}, },
{ {
"name": "juniper-junos-cve20146378-dos(96906)", "name": "juniper-junos-cve20146378-dos(96906)",

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20141216 \"Ettercap 8.0 - 8.1\" multiple vulnerabilities", "name": "GLSA-201505-01",
"refsource" : "BUGTRAQ", "refsource": "GENTOO",
"url" : "http://www.securityfocus.com/archive/1/534248/100/0/threaded" "url": "https://security.gentoo.org/glsa/201505-01"
},
{
"name": "71689",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71689"
}, },
{ {
"name": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", "name": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/",
@ -68,14 +73,9 @@
"url": "https://github.com/Ettercap/ettercap/commit/e3abe7d7585ecc420a7cab73313216613aadad5a" "url": "https://github.com/Ettercap/ettercap/commit/e3abe7d7585ecc420a7cab73313216613aadad5a"
}, },
{ {
"name" : "GLSA-201505-01", "name": "20141216 \"Ettercap 8.0 - 8.1\" multiple vulnerabilities",
"refsource" : "GENTOO", "refsource": "BUGTRAQ",
"url" : "https://security.gentoo.org/glsa/201505-01" "url": "http://www.securityfocus.com/archive/1/534248/100/0/threaded"
},
{
"name" : "71689",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71689"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-7270", "ID": "CVE-2014-7270",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR",
"refsource" : "CONFIRM",
"url" : "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR"
},
{ {
"name": "JVN#32631078", "name": "JVN#32631078",
"refsource": "JVN", "refsource": "JVN",
@ -66,6 +61,11 @@
"name": "JVNDB-2015-000012", "name": "JVNDB-2015-000012",
"refsource": "JVNDB", "refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000012" "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000012"
},
{
"name": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR",
"refsource": "CONFIRM",
"url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7787", "ID": "CVE-2014-7787",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#649377",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/649377"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#649377", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/649377" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components"
},
{ {
"name": "https://www.qualcomm.com/company/product-security/bulletins", "name": "https://www.qualcomm.com/company/product-security/bulletins",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "1041432", "name": "1041432",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041432" "url": "http://www.securitytracker.com/id/1041432"
},
{
"name": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components"
} }
] ]
} }

View File

@ -75,15 +75,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/123667" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/123667"
}, },
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22004202",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22004202"
},
{ {
"name": "99229", "name": "99229",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/99229" "url": "http://www.securityfocus.com/bid/99229"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22004202",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22004202"
} }
] ]
} }

View File

@ -62,16 +62,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/124744",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/124744"
},
{ {
"name": "http://www.ibm.com/support/docview.wss?uid=swg22004462", "name": "http://www.ibm.com/support/docview.wss?uid=swg22004462",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22004462" "url": "http://www.ibm.com/support/docview.wss?uid=swg22004462"
}, },
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/124744",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/124744"
},
{ {
"name": "99361", "name": "99361",
"refsource": "BID", "refsource": "BID",

View File

@ -55,6 +55,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "98834",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98834"
},
{ {
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/125459", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/125459",
"refsource": "MISC", "refsource": "MISC",
@ -64,11 +69,6 @@
"name": "http://www.ibm.com/support/docview.wss?uid=swg22002799", "name": "http://www.ibm.com/support/docview.wss?uid=swg22002799",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22002799" "url": "http://www.ibm.com/support/docview.wss?uid=swg22002799"
},
{
"name" : "98834",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/98834"
} }
] ]
} }

View File

@ -71,11 +71,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/128613",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/128613"
},
{ {
"name": "http://www.ibm.com/support/docview.wss?uid=swg22012323", "name": "http://www.ibm.com/support/docview.wss?uid=swg22012323",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -86,6 +81,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102502" "url": "http://www.securityfocus.com/bid/102502"
}, },
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/128613",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/128613"
},
{ {
"name": "1040172", "name": "1040172",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html", "name": "98861",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html" "url": "http://www.securityfocus.com/bid/98861"
}, },
{ {
"name": "https://crbug.com/709417", "name": "https://crbug.com/709417",
"refsource": "MISC", "refsource": "MISC",
"url": "https://crbug.com/709417" "url": "https://crbug.com/709417"
}, },
{
"name" : "GLSA-201706-20",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201706-20"
},
{ {
"name": "RHSA-2017:1399", "name": "RHSA-2017:1399",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1399" "url": "https://access.redhat.com/errata/RHSA-2017:1399"
}, },
{
"name" : "98861",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/98861"
},
{ {
"name": "1038622", "name": "1038622",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038622" "url": "http://www.securitytracker.com/id/1038622"
},
{
"name": "GLSA-201706-20",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-20"
},
{
"name": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
} }
] ]
} }

View File

@ -76,14 +76,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%2C1285833%2C1285960%2C1328251%2C1331058%2C1325938%2C1325877", "name": "https://www.mozilla.org/security/advisories/mfsa2017-03/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%2C1285833%2C1285960%2C1328251%2C1331058%2C1325938%2C1325877" "url": "https://www.mozilla.org/security/advisories/mfsa2017-03/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-01/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-01/"
}, },
{ {
"name": "https://www.mozilla.org/security/advisories/mfsa2017-02/", "name": "https://www.mozilla.org/security/advisories/mfsa2017-02/",
@ -91,49 +86,54 @@
"url": "https://www.mozilla.org/security/advisories/mfsa2017-02/" "url": "https://www.mozilla.org/security/advisories/mfsa2017-02/"
}, },
{ {
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-03/", "name": "GLSA-201702-22",
"refsource" : "CONFIRM", "refsource": "GENTOO",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-03/" "url": "https://security.gentoo.org/glsa/201702-22"
},
{
"name" : "DSA-3771",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2017/dsa-3771"
}, },
{ {
"name": "DSA-3832", "name": "DSA-3832",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3832" "url": "https://www.debian.org/security/2017/dsa-3832"
}, },
{
"name": "95762",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95762"
},
{ {
"name": "GLSA-201702-13", "name": "GLSA-201702-13",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-13" "url": "https://security.gentoo.org/glsa/201702-13"
}, },
{ {
"name" : "GLSA-201702-22", "name": "DSA-3771",
"refsource" : "GENTOO", "refsource": "DEBIAN",
"url" : "https://security.gentoo.org/glsa/201702-22" "url": "https://www.debian.org/security/2017/dsa-3771"
},
{
"name": "1037693",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037693"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-01/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-01/"
}, },
{ {
"name": "RHSA-2017:0190", "name": "RHSA-2017:0190",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0190.html" "url": "http://rhn.redhat.com/errata/RHSA-2017-0190.html"
}, },
{
"name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%2C1285833%2C1285960%2C1328251%2C1331058%2C1325938%2C1325877",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%2C1285833%2C1285960%2C1328251%2C1331058%2C1325938%2C1325877"
},
{ {
"name": "RHSA-2017:0238", "name": "RHSA-2017:0238",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0238.html" "url": "http://rhn.redhat.com/errata/RHSA-2017-0238.html"
},
{
"name" : "95762",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95762"
},
{
"name" : "1037693",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037693"
} }
] ]
} }

View File

@ -79,60 +79,60 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "RHSA-2017:1106",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1106"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1344461", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1344461",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1344461" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1344461"
}, },
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-10/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-10/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-11/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-11/"
},
{ {
"name": "https://www.mozilla.org/security/advisories/mfsa2017-12/", "name": "https://www.mozilla.org/security/advisories/mfsa2017-12/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-12/" "url": "https://www.mozilla.org/security/advisories/mfsa2017-12/"
}, },
{ {
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-13/", "name": "https://www.mozilla.org/security/advisories/mfsa2017-11/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-13/" "url": "https://www.mozilla.org/security/advisories/mfsa2017-11/"
}, },
{ {
"name" : "DSA-3831", "name": "https://www.mozilla.org/security/advisories/mfsa2017-10/",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "https://www.debian.org/security/2017/dsa-3831" "url": "https://www.mozilla.org/security/advisories/mfsa2017-10/"
},
{
"name" : "RHSA-2017:1104",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1104"
},
{
"name" : "RHSA-2017:1106",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1106"
},
{
"name" : "RHSA-2017:1201",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1201"
}, },
{ {
"name": "97940", "name": "97940",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/97940" "url": "http://www.securityfocus.com/bid/97940"
}, },
{
"name": "DSA-3831",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3831"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-13/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-13/"
},
{ {
"name": "1038320", "name": "1038320",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038320" "url": "http://www.securitytracker.com/id/1038320"
},
{
"name": "RHSA-2017:1104",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1104"
},
{
"name": "RHSA-2017:1201",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1201"
} }
] ]
} }

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03711en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03711en_us"
},
{ {
"name": "96813", "name": "96813",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/96813" "url": "http://www.securityfocus.com/bid/96813"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03711en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03711en_us"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://logback.qos.ch/news.html", "name": "RHSA-2017:1832",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://logback.qos.ch/news.html" "url": "https://access.redhat.com/errata/RHSA-2017:1832"
}, },
{ {
"name": "RHSA-2017:1675", "name": "RHSA-2017:1675",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1675" "url": "https://access.redhat.com/errata/RHSA-2017:1675"
}, },
{
"name" : "RHSA-2017:1676",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1676"
},
{
"name" : "RHSA-2017:1832",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1832"
},
{ {
"name": "RHSA-2018:2927", "name": "RHSA-2018:2927",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2927" "url": "https://access.redhat.com/errata/RHSA-2018:2927"
},
{
"name": "https://logback.qos.ch/news.html",
"refsource": "CONFIRM",
"url": "https://logback.qos.ch/news.html"
},
{
"name": "RHSA-2017:1676",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1676"
} }
] ]
} }