"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:29:56 +00:00
parent 1c928c7afa
commit 07a1c2a810
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
48 changed files with 3891 additions and 3891 deletions

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "20060426 DevBB <= 1.0.0 XSS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432096/100/0/threaded"
"name": "17703",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17703"
},
{
"name": "800",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/800"
},
{
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/DevBB-1.0.0-xss.txt",
"refsource": "MISC",
"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/DevBB-1.0.0-xss.txt"
},
{
"name" : "17703",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17703"
},
{
"name" : "ADV-2006-1544",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1544"
},
{
"name": "24994",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24994"
},
{
"name": "20060426 DevBB <= 1.0.0 XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432096/100/0/threaded"
},
{
"name": "19855",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19855"
},
{
"name" : "800",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/800"
"name": "ADV-2006-1544",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1544"
},
{
"name": "devbb-member-xss(26091)",

View File

@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060613 Chipmailer <= 1.09 Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=115024576618386&w=2"
},
{
"name" : "18463",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18463"
},
{
"name" : "ADV-2006-2359",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2359"
},
{
"name" : "1016315",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016315"
},
{
"name": "20643",
"refsource": "SECUNIA",
@ -81,6 +61,26 @@
"name": "chipmailer-main-index-sql-injection(27158)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27158"
},
{
"name": "ADV-2006-2359",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2359"
},
{
"name": "18463",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18463"
},
{
"name": "20060613 Chipmailer <= 1.09 Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=115024576618386&w=2"
},
{
"name": "1016315",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016315"
}
]
}

View File

@ -57,45 +57,45 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/438725/100/0/threaded"
},
{
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?2974027.htm",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?2974027.htm"
},
{
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974006.htm",
"refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974006.htm"
},
{
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973921.htm",
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?2974027.htm",
"refsource": "CONFIRM",
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973921.htm"
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?2974027.htm"
},
{
"name" : "18716",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18716"
},
{
"name" : "ADV-2006-2594",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2594"
"name": "groupwise-windows-client-api-security-bypass(27550)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27550"
},
{
"name": "1016404",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016404"
},
{
"name": "ADV-2006-2594",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2594"
},
{
"name": "18716",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18716"
},
{
"name": "20888",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20888"
},
{
"name" : "groupwise-windows-client-api-security-bypass(27550)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27550"
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973921.htm",
"refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973921.htm"
}
]
}

View File

@ -53,49 +53,49 @@
"references": {
"reference_data": [
{
"name" : "20060622 [MU-200606-01] Real Helix RTSP Server Heap Corruption Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0600.html"
},
{
"name" : "http://labs.musecurity.com/advisories/MU-200606-01.txt",
"refsource" : "MISC",
"url" : "http://labs.musecurity.com/advisories/MU-200606-01.txt"
"name": "helix-dna-rtsp-bo(27316)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27316"
},
{
"name": "18606",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18606"
},
{
"name": "1016365",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016365"
},
{
"name": "ADV-2006-2521",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2521"
},
{
"name": "20060622 [MU-200606-01] Real Helix RTSP Server Heap Corruption Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0600.html"
},
{
"name": "helix-dna-url-bo(27317)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27317"
},
{
"name": "26799",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26799"
},
{
"name" : "1016365",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016365"
},
{
"name": "20784",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20784"
},
{
"name" : "helix-dna-rtsp-bo(27316)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27316"
},
{
"name" : "helix-dna-url-bo(27317)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27317"
"name": "http://labs.musecurity.com/advisories/MU-200606-01.txt",
"refsource": "MISC",
"url": "http://labs.musecurity.com/advisories/MU-200606-01.txt"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2006-3864",
"STATE": "PUBLIC"
},
@ -53,45 +53,15 @@
"references": {
"reference_data": [
{
"name" : "20061011 Microsoft Office Malformed Record Memory Corruption Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/448268/100/0/threaded"
},
{
"name" : "http://secway.org/advisory/AD20061010.txt",
"refsource" : "MISC",
"url" : "http://secway.org/advisory/AD20061010.txt"
},
{
"name" : "HPSBST02161",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
"name": "oval:org.mitre.oval:def:632",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A632"
},
{
"name": "SSRT061264",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
},
{
"name" : "MS06-062",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062"
},
{
"name" : "922581",
"refsource" : "MSKB",
"url" : "http://support.microsoft.com/kb/922581"
},
{
"name" : "VU#176556",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/176556"
},
{
"name" : "20384",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20384"
},
{
"name": "ADV-2006-3981",
"refsource": "VUPEN",
@ -103,19 +73,49 @@
"url": "http://www.osvdb.org/29429"
},
{
"name" : "oval:org.mitre.oval:def:632",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A632"
"name": "VU#176556",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/176556"
},
{
"name": "http://secway.org/advisory/AD20061010.txt",
"refsource": "MISC",
"url": "http://secway.org/advisory/AD20061010.txt"
},
{
"name": "20384",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20384"
},
{
"name": "MS06-062",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062"
},
{
"name": "1017034",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017034"
},
{
"name": "HPSBST02161",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
},
{
"name": "20061011 Microsoft Office Malformed Record Memory Corruption Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/448268/100/0/threaded"
},
{
"name": "22339",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22339"
},
{
"name": "922581",
"refsource": "MSKB",
"url": "http://support.microsoft.com/kb/922581"
}
]
}

View File

@ -53,15 +53,45 @@
"references": {
"reference_data": [
{
"name" : "20060723 Two crash vulnerabilities in Freeciv 2.1.0-beta1 (SVN 15 Jul 2006)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/441042/100/0/threaded"
"name": "ADV-2006-2942",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2942"
},
{
"name": "http://aluigi.altervista.org/adv/freecivx-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/freecivx-adv.txt"
},
{
"name": "21254",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21254"
},
{
"name": "freeciv-packetsc-dos(27955)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27955"
},
{
"name": "21352",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21352"
},
{
"name": "20060723 Two crash vulnerabilities in Freeciv 2.1.0-beta1 (SVN 15 Jul 2006)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/441042/100/0/threaded"
},
{
"name": "freeciv-unithand-dos(27956)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27956"
},
{
"name": "19117",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19117"
},
{
"name": "DSA-1142",
"refsource": "DEBIAN",
@ -72,45 +102,15 @@
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:135"
},
{
"name" : "19117",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19117"
},
{
"name" : "ADV-2006-2942",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2942"
},
{
"name" : "21171",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21171"
},
{
"name" : "21254",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21254"
},
{
"name" : "21352",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21352"
},
{
"name": "1296",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1296"
},
{
"name" : "freeciv-packetsc-dos(27955)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27955"
},
{
"name" : "freeciv-unithand-dos(27956)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27956"
"name": "21171",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21171"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951",
"refsource" : "CONFIRM",
"url" : "http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951"
"name": "PK28408",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=PK28408&apar=only"
},
{
"name": "ADV-2006-3262",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3262"
},
{
"name": "PK27547",
@ -68,20 +73,15 @@
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=PK27857&apar=only"
},
{
"name" : "PK28408",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=PK28408&apar=only"
"name": "http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951",
"refsource": "CONFIRM",
"url": "http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951"
},
{
"name": "19463",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19463"
},
{
"name" : "ADV-2006-3262",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3262"
},
{
"name": "21440",
"refsource": "SECUNIA",

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm"
},
{
"name" : "102593",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102593-1"
},
{
"name": "19705",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19705"
},
{
"name" : "ADV-2006-3390",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3390"
},
{
"name" : "28227",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/28227"
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm"
},
{
"name": "1016751",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016751"
},
{
"name" : "21628",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21628"
},
{
"name": "sun-java-cds-information-disclosure(28570)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28570"
},
{
"name": "28227",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28227"
},
{
"name": "102593",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102593-1"
},
{
"name": "ADV-2006-3390",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3390"
},
{
"name": "21628",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21628"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-4790",
"STATE": "PUBLIC"
},
@ -53,34 +53,44 @@
"references": {
"reference_data": [
{
"name" : "[gnutls-dev] 20060908 Variant of Bleichenbacher's crypto 06 rump session attack",
"refsource" : "MLIST",
"url" : "http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001205.html"
"name": "25762",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25762"
},
{
"name" : "[gnutls-dev] 20060912 Re: Variant of Bleichenbacher's crypto 06 rump session attack",
"refsource" : "MLIST",
"url" : "http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001212.html"
"name": "22992",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22992"
},
{
"name" : "http://www.gnu.org/software/gnutls/security.html",
"refsource" : "CONFIRM",
"url" : "http://www.gnu.org/software/gnutls/security.html"
"name": "21937",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21937"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm"
"name": "22049",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22049"
},
{
"name" : "DSA-1182",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1182"
"name": "1016844",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016844"
},
{
"name" : "GLSA-200609-15",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200609-15.xml"
"name": "ADV-2006-3899",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3899"
},
{
"name": "20027",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20027"
},
{
"name": "SUSE-SR:2006:023",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"name": "MDKSA-2006:166",
@ -93,94 +103,34 @@
"url": "http://www.redhat.com/support/errata/RHSA-2006-0680.html"
},
{
"name" : "102648",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1"
},
{
"name" : "102970",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102970-1"
},
{
"name" : "SUSE-SR:2006:023",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"name" : "SUSE-SA:2007:010",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html"
},
{
"name" : "USN-348-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-348-1"
},
{
"name" : "20027",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20027"
"name": "http://www.gnu.org/software/gnutls/security.html",
"refsource": "CONFIRM",
"url": "http://www.gnu.org/software/gnutls/security.html"
},
{
"name": "oval:org.mitre.oval:def:9937",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9937"
},
{
"name": "102970",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102970-1"
},
{
"name": "ADV-2006-3635",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3635"
},
{
"name" : "ADV-2006-3899",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3899"
},
{
"name" : "ADV-2007-2289",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2289"
},
{
"name" : "1016844",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016844"
},
{
"name": "21942",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21942"
},
{
"name" : "21937",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21937"
},
{
"name" : "21973",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21973"
},
{
"name" : "22049",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22049"
},
{
"name" : "22084",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22084"
},
{
"name" : "22097",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22097"
},
{
"name" : "22226",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22226"
"name": "[gnutls-dev] 20060908 Variant of Bleichenbacher's crypto 06 rump session attack",
"refsource": "MLIST",
"url": "http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001205.html"
},
{
"name": "22080",
@ -188,19 +138,69 @@
"url": "http://secunia.com/advisories/22080"
},
{
"name" : "22992",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22992"
"name": "GLSA-200609-15",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200609-15.xml"
},
{
"name" : "25762",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25762"
"name": "SUSE-SA:2007:010",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html"
},
{
"name": "DSA-1182",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1182"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm"
},
{
"name": "gnutls-rsakey-security-bypass(28953)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28953"
},
{
"name": "102648",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1"
},
{
"name": "21973",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21973"
},
{
"name": "22226",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22226"
},
{
"name": "22084",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22084"
},
{
"name": "[gnutls-dev] 20060912 Re: Variant of Bleichenbacher's crypto 06 rump session attack",
"refsource": "MLIST",
"url": "http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001212.html"
},
{
"name": "USN-348-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-348-1"
},
{
"name": "ADV-2007-2289",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2289"
},
{
"name": "22097",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22097"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2006-4683",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4683"
},
{
"name": "2829",
"refsource": "EXPLOIT-DB",
@ -62,11 +67,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21254"
},
{
"name" : "ADV-2006-4683",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4683"
},
{
"name": "23056",
"refsource": "SECUNIA",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20061202 [Aria-Security Team] DuWare DuNews SQL Injection Vuln",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/453317/100/0/threaded"
"name": "23228",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23228"
},
{
"name": "http://www.aria-security.com/forum/showthread.php?t=61",
@ -73,19 +73,19 @@
"url": "http://www.vupen.com/english/advisories/2006/4834"
},
{
"name" : "23228",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23228"
},
{
"name" : "1996",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1996"
"name": "20061202 [Aria-Security Team] DuWare DuNews SQL Injection Vuln",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/453317/100/0/threaded"
},
{
"name": "dunews-type-detail-sql-injection(30673)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30673"
},
{
"name": "1996",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1996"
}
]
}

View File

@ -53,15 +53,20 @@
"references": {
"reference_data": [
{
"name" : "http://drupal.org/node/87101",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/node/87101"
"name": "imce-delete-file-deletion(29324)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29324"
},
{
"name": "20312",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20312"
},
{
"name": "http://drupal.org/node/87101",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/87101"
},
{
"name": "ADV-2006-3892",
"refsource": "VUPEN",
@ -71,11 +76,6 @@
"name": "22261",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22261"
},
{
"name" : "imce-delete-file-deletion(29324)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29324"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20100609 TPTI-10-03: Sophos Anti-Virus SAVOnAccessFilter Local Privilege Escalation Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/511773/100/0/threaded"
"name": "40085",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40085"
},
{
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-03",
@ -67,16 +67,16 @@
"refsource": "CONFIRM",
"url": "http://www.sophos.com/support/knowledgebase/article/111126.html"
},
{
"name": "20100609 TPTI-10-03: Sophos Anti-Virus SAVOnAccessFilter Local Privilege Escalation Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/511773/100/0/threaded"
},
{
"name": "1024089",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024089"
},
{
"name" : "40085",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40085"
},
{
"name": "ADV-2010-1412",
"refsource": "VUPEN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2493",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html",
"refsource" : "CONFIRM",
"url" : "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=614774",
"refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "40681",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40681"
},
{
"name": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html",
"refsource": "CONFIRM",
"url": "http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2791",
"STATE": "PUBLIC"
},
@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20100730 CVE-2010-2791: mod_proxy information leak affecting 2.2.9 only",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/07/30/1"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
},
{
"name" : "MDVSA-2013:150",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
"name": "apache-modproxy-info-disclsoure(60883)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60883"
},
{
"name": "RHSA-2010:0659",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0659.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
},
{
"name": "42102",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42102"
},
{
"name" : "apache-modproxy-info-disclsoure(60883)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/60883"
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "[oss-security] 20100730 CVE-2010-2791: mod_proxy information leak affecting 2.2.9 only",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/30/1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2011-0273",
"STATE": "PUBLIC"
},
@ -52,35 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-11-024/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-11-024/"
},
{
"name" : "HPSBMA02625",
"refsource" : "HP",
"url" : "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02688353"
},
{
"name" : "SSRT100138",
"refsource" : "HP",
"url" : "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02688353"
},
{
"name" : "70621",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/70621"
},
{
"name": "1024983",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024983"
},
{
"name" : "42997",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42997"
"name": "hp-openview-storage-code-execution(64818)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64818"
},
{
"name": "ADV-2011-0177",
@ -88,9 +68,29 @@
"url": "http://www.vupen.com/english/advisories/2011/0177"
},
{
"name" : "hp-openview-storage-code-execution(64818)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64818"
"name": "70621",
"refsource": "OSVDB",
"url": "http://osvdb.org/70621"
},
{
"name": "HPSBMA02625",
"refsource": "HP",
"url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02688353"
},
{
"name": "42997",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42997"
},
{
"name": "SSRT100138",
"refsource": "HP",
"url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02688353"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-11-024/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-024/"
}
]
}

View File

@ -58,24 +58,24 @@
"url": "http://zerodayinitiative.com/advisories/ZDI-11-051/"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21461514",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21461514"
"name": "43222",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43222"
},
{
"name": "oval:org.mitre.oval:def:14348",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14348"
},
{
"name" : "43222",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43222"
},
{
"name": "ADV-2011-0295",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0295"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21461514",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21461514"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "47104",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47104"
},
{
"name": "interrablogmachine-subject-xss(66562)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66562"
},
{
"name": "20110331 HTB22931: XSS vulnerability in InTerra Blog Machine",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/517271/100/0/threaded"
},
{
"name" : "17098",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/17098"
},
{
"name": "http://www.htbridge.ch/advisory/xss_vulnerability_in_interra_blog_machine.html",
"refsource": "MISC",
"url": "http://www.htbridge.ch/advisory/xss_vulnerability_in_interra_blog_machine.html"
},
{
"name" : "47104",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/47104"
"name": "17098",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/17098"
},
{
"name": "8195",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8195"
},
{
"name" : "interrablogmachine-subject-xss(66562)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66562"
}
]
}

View File

@ -52,35 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "20110403 Xymon monitor cross-site scripting vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/517316/100/0/threaded"
},
{
"name": "20110404 Re: Xymon monitor cross-site scripting vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/517325/100/0/threaded"
},
{
"name" : "http://xymon.svn.sourceforge.net/viewvc/xymon/branches/4.3.2/Changes?revision=6673&view=markup",
"refsource" : "CONFIRM",
"url" : "http://xymon.svn.sourceforge.net/viewvc/xymon/branches/4.3.2/Changes?revision=6673&view=markup"
},
{
"name": "47156",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47156"
},
{
"name": "xymonmonitor-multiple-xss(66542)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66542"
},
{
"name": "71489",
"refsource": "OSVDB",
"url": "http://osvdb.org/71489"
},
{
"name" : "44036",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44036"
"name": "20110403 Xymon monitor cross-site scripting vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/517316/100/0/threaded"
},
{
"name": "8209",
@ -88,9 +83,14 @@
"url": "http://securityreason.com/securityalert/8209"
},
{
"name" : "xymonmonitor-multiple-xss(66542)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66542"
"name": "http://xymon.svn.sourceforge.net/viewvc/xymon/branches/4.3.2/Changes?revision=6673&view=markup",
"refsource": "CONFIRM",
"url": "http://xymon.svn.sourceforge.net/viewvc/xymon/branches/4.3.2/Changes?revision=6673&view=markup"
},
{
"name": "44036",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44036"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-3910",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=101494",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=101494"
"name": "oval:org.mitre.oval:def:14517",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14517"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html",
@ -63,9 +63,9 @@
"url": "http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html"
},
{
"name" : "oval:org.mitre.oval:def:14517",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14517"
"name": "http://code.google.com/p/chromium/issues/detail?id=101494",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=101494"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4363",
"STATE": "PUBLIC"
},
@ -58,14 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2011/11/30/2"
},
{
"name" : "[oss-security] 20111130 Re: CVE request: Proc::ProcessTable perl module",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/11/30/3"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650500",
"refsource" : "MISC",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650500"
"name": "50868",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50868"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4363",
@ -73,14 +68,19 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4363"
},
{
"name" : "https://rt.cpan.org/Public/Bug/Display.html?id=72862",
"refsource" : "CONFIRM",
"url" : "https://rt.cpan.org/Public/Bug/Display.html?id=72862"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650500",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650500"
},
{
"name" : "50868",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/50868"
"name": "47015",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47015"
},
{
"name": "[oss-security] 20111130 Re: CVE request: Proc::ProcessTable perl module",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/11/30/3"
},
{
"name": "77428",
@ -88,9 +88,9 @@
"url": "http://www.osvdb.org/77428"
},
{
"name" : "47015",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/47015"
"name": "https://rt.cpan.org/Public/Bug/Display.html?id=72862",
"refsource": "CONFIRM",
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=72862"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "MLIST",
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html"
},
{
"name": "49259",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49259"
},
{
"name": "[rt-announce] 20120522 RT 4.0.6 Released - Security Release",
"refsource": "MLIST",
@ -71,11 +76,6 @@
"name": "53660",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53660"
},
{
"name" : "49259",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/49259"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4587",
"STATE": "PUBLIC"
},
@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://git.moodle.org/gw?p=moodle.git;a=commit;h=e079e82c087becf06d902089d14f3f76686bde19",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "CONFIRM",
"url" : "http://git.moodle.org/gw?p=moodle.git;a=commit;h=e079e82c087becf06d902089d14f3f76686bde19"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=191755",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=191755"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
},
{
"name": "DSA-2421",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2421"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=e079e82c087becf06d902089d14f3f76686bde19",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=e079e82c087becf06d902089d14f3f76686bde19"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20111116 wordpress Flexible Custom Post Type plugin Xss Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/520542/100/0/threaded"
},
{
"name" : "http://plugins.trac.wordpress.org/changeset?reponame=&new=466252%40flexible-custom-post-type&old=465583%40flexible-custom-post-type",
"refsource" : "CONFIRM",
"url" : "http://plugins.trac.wordpress.org/changeset?reponame=&new=466252%40flexible-custom-post-type&old=465583%40flexible-custom-post-type"
},
{
"name" : "http://wordpress.org/extend/plugins/flexible-custom-post-type/changelog/",
"refsource" : "CONFIRM",
"url" : "http://wordpress.org/extend/plugins/flexible-custom-post-type/changelog/"
"name": "flexiblecustomposttype-editpost-xss(71415)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71415"
},
{
"name": "50719",
@ -73,9 +63,19 @@
"url": "http://www.securityfocus.com/bid/50719"
},
{
"name" : "flexiblecustomposttype-editpost-xss(71415)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71415"
"name": "20111116 wordpress Flexible Custom Post Type plugin Xss Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520542/100/0/threaded"
},
{
"name": "http://wordpress.org/extend/plugins/flexible-custom-post-type/changelog/",
"refsource": "CONFIRM",
"url": "http://wordpress.org/extend/plugins/flexible-custom-post-type/changelog/"
},
{
"name": "http://plugins.trac.wordpress.org/changeset?reponame=&new=466252%40flexible-custom-post-type&old=465583%40flexible-custom-post-type",
"refsource": "CONFIRM",
"url": "http://plugins.trac.wordpress.org/changeset?reponame=&new=466252%40flexible-custom-post-type&old=465583%40flexible-custom-post-type"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "rapidleech-notes-xss(72072)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72072"
},
{
"name": "47434",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47434"
},
{
"name": "http://code.google.com/p/rapidleech/source/detail?r=399",
"refsource": "CONFIRM",
@ -61,16 +71,6 @@
"name": "http://code.google.com/p/rapidleech/source/diff?spec=svn399&r=399&format=side&path=/trunk/notes.php",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/rapidleech/source/diff?spec=svn399&r=399&format=side&path=/trunk/notes.php"
},
{
"name" : "47434",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/47434"
},
{
"name" : "rapidleech-notes-xss(72072)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72072"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2014-2509",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20140630 ESA-2014-055: EMC Network Configuration Manager (NCM) Session Fixation Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-06/0168.html"
},
{
"name" : "20140808 ESA-2014-055: EMC Network Configuration Manager (NCM) Report Advisor Session Fixation Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/533077/100/0/threaded"
"name": "59423",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59423"
},
{
"name": "http://packetstormsecurity.com/files/127301/EMC-Network-Configuration-Manager-NCM-Session-Fixation.html",
@ -73,9 +68,14 @@
"url": "http://www.securitytracker.com/id/1030494"
},
{
"name" : "59423",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59423"
"name": "20140630 ESA-2014-055: EMC Network Configuration Manager (NCM) Session Fixation Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0168.html"
},
{
"name": "20140808 ESA-2014-055: EMC Network Configuration Manager (NCM) Report Advisor Session Fixation Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533077/100/0/threaded"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2014-2516",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2014-2744",
"STATE": "PUBLIC"
},
@ -52,36 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140407 Re: Possible CVE Request: Uncontrolled Resource Consumption with XMPP-Layer Compression",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2014/04/07/7"
},
{
"name" : "[oss-security] 20140408 Re: (Openfire M-Link Metronome Prosody Tigase) Possible CVE Request: Uncontrolled Resource Consumption with XMPP-Layer Compression",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2014/04/09/1"
},
{
"name": "http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/",
"refsource": "MISC",
"url": "http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/"
},
{
"name" : "http://blog.prosody.im/prosody-0-9-4-released/",
"refsource" : "CONFIRM",
"url" : "http://blog.prosody.im/prosody-0-9-4-released/"
},
{
"name" : "http://code.lightwitch.org/metronome/rev/49f47277a411",
"refsource" : "CONFIRM",
"url" : "http://code.lightwitch.org/metronome/rev/49f47277a411"
},
{
"name" : "http://hg.prosody.im/0.9/rev/b3b1c9da38fb",
"refsource" : "CONFIRM",
"url" : "http://hg.prosody.im/0.9/rev/b3b1c9da38fb"
},
{
"name": "DSA-2895",
"refsource": "DEBIAN",
@ -91,6 +66,31 @@
"name": "57710",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57710"
},
{
"name": "http://code.lightwitch.org/metronome/rev/49f47277a411",
"refsource": "CONFIRM",
"url": "http://code.lightwitch.org/metronome/rev/49f47277a411"
},
{
"name": "http://blog.prosody.im/prosody-0-9-4-released/",
"refsource": "CONFIRM",
"url": "http://blog.prosody.im/prosody-0-9-4-released/"
},
{
"name": "http://hg.prosody.im/0.9/rev/b3b1c9da38fb",
"refsource": "CONFIRM",
"url": "http://hg.prosody.im/0.9/rev/b3b1c9da38fb"
},
{
"name": "[oss-security] 20140408 Re: (Openfire M-Link Metronome Prosody Tigase) Possible CVE Request: Uncontrolled Resource Consumption with XMPP-Layer Compression",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/04/09/1"
},
{
"name": "[oss-security] 20140407 Re: Possible CVE Request: Uncontrolled Resource Consumption with XMPP-Layer Compression",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/04/07/7"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3262",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=34233",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=34233"
"name": "1030243",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030243"
},
{
"name": "20140514 Cisco IOS Software and IOS XE Software LISP Denial of Service Vulnerability",
@ -63,9 +63,9 @@
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3262"
},
{
"name" : "1030243",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030243"
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34233",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34233"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-6328",
"STATE": "PUBLIC"
},

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "http://www.elasticsearch.org/blog/elasticsearch-1-4-0-beta-released/",
"refsource": "CONFIRM",
"url": "http://www.elasticsearch.org/blog/elasticsearch-1-4-0-beta-released/"
},
{
"name": "20141002 Elasticsearch vulnerability CVE-2014-6439",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533602/100/0/threaded"
},
{
"name": "70233",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70233"
},
{
"name": "http://packetstormsecurity.com/files/128556/Elasticsearch-1.3.x-CORS-Issue.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128556/Elasticsearch-1.3.x-CORS-Issue.html"
},
{
"name" : "http://www.elasticsearch.org/blog/elasticsearch-1-4-0-beta-released/",
"refsource" : "CONFIRM",
"url" : "http://www.elasticsearch.org/blog/elasticsearch-1-4-0-beta-released/"
},
{
"name": "https://www.elastic.co/community/security/",
"refsource": "CONFIRM",
"url": "https://www.elastic.co/community/security/"
},
{
"name" : "70233",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70233"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7024",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#885657",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/885657"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#885657",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/885657"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7106",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#713353",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/713353"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#713353",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/713353"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20141229 CVE-2014-7294 Ex Libris Patron Directory Services (PDS) Open Redirect Security Vulnerability",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/127"
},
{
"name": "http://packetstormsecurity.com/files/129756/Ex-Libris-Patron-Directory-Services-2.1-Open-Redirect.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/129756/Ex-Libris-Patron-Directory-Services-2.1-Open-Redirect.html"
},
{
"name": "20141229 CVE-2014-7294 Ex Libris Patron Directory Services (PDS) Open Redirect Security Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/127"
},
{
"name": "http://tetraph.com/security/cves/cve-2014-7294-ex-libris-patron-directory-services-pds-open-redirect-security-vulnerability/",
"refsource": "MISC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7392",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#539201",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2014-7929",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
"name": "62665",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62665"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=443115",
@ -68,19 +68,14 @@
"url": "https://src.chromium.org/viewvc/blink?revision=187458&view=revision"
},
{
"name" : "GLSA-201502-13",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201502-13.xml"
"name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
},
{
"name" : "RHSA-2015:0093",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
},
{
"name" : "openSUSE-SU-2015:0441",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html"
"name": "62575",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62575"
},
{
"name": "USN-2476-1",
@ -92,25 +87,30 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72288"
},
{
"name": "GLSA-201502-13",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
},
{
"name": "1031623",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031623"
},
{
"name" : "62575",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62575"
"name": "openSUSE-SU-2015:0441",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html"
},
{
"name": "RHSA-2015:0093",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
},
{
"name": "62383",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62383"
},
{
"name" : "62665",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62665"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0409",
"STATE": "PUBLIC"
},
@ -62,9 +62,9 @@
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-02-01.html",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-02-01.html"
"name": "1037798",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037798"
},
{
"name": "96091",
@ -72,9 +72,9 @@
"url": "http://www.securityfocus.com/bid/96091"
},
{
"name" : "1037798",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037798"
"name": "https://source.android.com/security/bulletin/2017-02-01.html",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-02-01.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-09-05T00:00:00",
"ID": "CVE-2017-0792",
"STATE": "PUBLIC"

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "45175",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45175/"
},
{
"name" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8",
"refsource" : "MISC",
"url" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8"
},
{
"name" : "https://github.com/torvalds/linux/commit/cef31d9af908243421258f1df35a4a644604efbe",
"refsource" : "MISC",
"url" : "https://github.com/torvalds/linux/commit/cef31d9af908243421258f1df35a4a644604efbe"
},
{
"name" : "RHSA-2018:2948",
"name": "RHSA-2018:3540",
"refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2948"
"url": "https://access.redhat.com/errata/RHSA-2018:3540"
},
{
"name": "RHSA-2018:3083",
@ -78,9 +63,9 @@
"url": "https://access.redhat.com/errata/RHSA-2018:3083"
},
{
"name" : "RHSA-2018:3096",
"name": "RHSA-2018:3591",
"refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3096"
"url": "https://access.redhat.com/errata/RHSA-2018:3591"
},
{
"name": "RHSA-2018:3459",
@ -88,14 +73,14 @@
"url": "https://access.redhat.com/errata/RHSA-2018:3459"
},
{
"name" : "RHSA-2018:3540",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3540"
"name": "1041414",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041414"
},
{
"name" : "RHSA-2018:3586",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3586"
"name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8",
"refsource": "MISC",
"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8"
},
{
"name": "RHSA-2018:3590",
@ -103,14 +88,14 @@
"url": "https://access.redhat.com/errata/RHSA-2018:3590"
},
{
"name" : "RHSA-2018:3591",
"name": "RHSA-2018:2948",
"refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3591"
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"name" : "USN-3742-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3742-1/"
"name": "https://github.com/torvalds/linux/commit/cef31d9af908243421258f1df35a4a644604efbe",
"refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/cef31d9af908243421258f1df35a4a644604efbe"
},
{
"name": "USN-3742-2",
@ -123,9 +108,24 @@
"url": "http://www.securityfocus.com/bid/104909"
},
{
"name" : "1041414",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041414"
"name": "USN-3742-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3742-1/"
},
{
"name": "RHSA-2018:3586",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3586"
},
{
"name": "45175",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45175/"
},
{
"name": "RHSA-2018:3096",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3096"
}
]
}

View File

@ -65,11 +65,6 @@
},
"references": {
"reference_data": [
{
"name" : "42604",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/42604/"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/121371",
"refsource": "MISC",
@ -80,6 +75,11 @@
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21999384"
},
{
"name": "42604",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42604/"
},
{
"name": "100632",
"refsource": "BID",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1824",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1857",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1926",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-012-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-012-01"
},
{
"name": "https://www.tenable.com/security/research/tra-2017-04",
"refsource": "MISC",
@ -66,6 +61,11 @@
"name": "95410",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95410"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-012-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-012-01"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@microfocus.com",
"ASSIGNER": "security@suse.com",
"ID": "CVE-2017-5191",
"STATE": "PUBLIC"
},

View File

@ -62,25 +62,25 @@
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9dc6f65bc5e232d1c05fe34b5daadc7e8bbf1fb"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1416116",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416116"
},
{
"name": "95716",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95716"
},
{
"name": "https://github.com/torvalds/linux/commit/b9dc6f65bc5e232d1c05fe34b5daadc7e8bbf1fb",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/b9dc6f65bc5e232d1c05fe34b5daadc7e8bbf1fb"
},
{
"name" : "95716",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95716"
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugs.ghostscript.com/show_bug.cgi?id=697548",
"refsource" : "MISC",
"url" : "https://bugs.ghostscript.com/show_bug.cgi?id=697548"
},
{
"name": "DSA-3838",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3838"
},
{
"name" : "GLSA-201708-06",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201708-06"
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=697548",
"refsource": "MISC",
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=697548"
},
{
"name": "98665",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98665"
},
{
"name": "GLSA-201708-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201708-06"
}
]
}