"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:11:25 +00:00
parent aefe4620a0
commit 0a4f6b90cd
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 4601 additions and 4601 deletions

View File

@ -57,25 +57,25 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/16897" "url": "http://www.securityfocus.com/bid/16897"
}, },
{
"name" : "ADV-2006-0784",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0784"
},
{ {
"name": "23575", "name": "23575",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/23575" "url": "http://www.osvdb.org/23575"
}, },
{ {
"name" : "19019", "name": "ADV-2006-0784",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/19019" "url": "http://www.vupen.com/english/advisories/2006/0784"
}, },
{ {
"name": "storebot-mgrlogin-sql-injection(24987)", "name": "storebot-mgrlogin-sql-injection(24987)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24987" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24987"
},
{
"name": "19019",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19019"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-1056", "ID": "CVE-2006-1056",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,89 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060419 FreeBSD Security Advisory FreeBSD-SA-06:14.fpu", "name": "oval:org.mitre.oval:def:9995",
"refsource" : "BUGTRAQ", "refsource": "OVAL",
"url" : "http://www.securityfocus.com/archive/1/431341" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9995"
},
{
"name" : "20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
},
{
"name" : "20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/451419/100/200/threaded"
},
{
"name" : "20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
},
{
"name" : "20061113 VMSA-2006-0009 - VMware ESX Server 3.0.0 AMD fxsave/restore issue",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/451421/100/0/threaded"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm"
},
{
"name" : "http://kb.vmware.com/kb/2533126",
"refsource" : "CONFIRM",
"url" : "http://kb.vmware.com/kb/2533126"
},
{
"name" : "http://www.vmware.com/download/esx/esx-213-200610-patch.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
},
{
"name" : "http://www.vmware.com/download/esx/esx-254-200610-patch.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/download/esx/esx-254-200610-patch.html"
},
{
"name" : "DSA-1097",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1097"
},
{
"name" : "DSA-1103",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1103"
},
{
"name" : "FEDORA-2006-423",
"refsource" : "FEDORA",
"url" : "http://lwn.net/Alerts/180820/"
},
{
"name" : "FreeBSD-SA-06:14",
"refsource" : "FREEBSD",
"url" : "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:14.fpu.asc"
},
{
"name" : "http://security.freebsd.org/advisories/FreeBSD-SA-06:14-amd.txt",
"refsource" : "MISC",
"url" : "http://security.freebsd.org/advisories/FreeBSD-SA-06:14-amd.txt"
},
{
"name" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.9",
"refsource" : "CONFIRM",
"url" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.9"
},
{
"name" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187910",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187910"
}, },
{ {
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187911", "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187911",
@ -143,9 +63,39 @@
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187911" "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187911"
}, },
{ {
"name" : "[linux-kernel] 20060419 RE: Linux 2.6.16.9", "name": "RHSA-2006:0437",
"refsource" : "MLIST", "refsource": "REDHAT",
"url" : "http://marc.info/?l=linux-kernel&m=114548768214478&w=2" "url": "http://www.redhat.com/support/errata/RHSA-2006-0437.html"
},
{
"name": "22876",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22876"
},
{
"name": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.9",
"refsource": "CONFIRM",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.9"
},
{
"name": "19735",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19735"
},
{
"name": "ADV-2006-4502",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4502"
},
{
"name": "ADV-2006-2554",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2554"
},
{
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187910",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187910"
}, },
{ {
"name": "RHSA-2006:0579", "name": "RHSA-2006:0579",
@ -153,9 +103,69 @@
"url": "http://www.redhat.com/support/errata/RHSA-2006-0579.html" "url": "http://www.redhat.com/support/errata/RHSA-2006-0579.html"
}, },
{ {
"name" : "RHSA-2006:0437", "name": "20716",
"refsource" : "REDHAT", "refsource": "SECUNIA",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0437.html" "url": "http://secunia.com/advisories/20716"
},
{
"name": "22875",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22875"
},
{
"name": "FEDORA-2006-423",
"refsource": "FEDORA",
"url": "http://lwn.net/Alerts/180820/"
},
{
"name": "21136",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21136"
},
{
"name": "USN-302-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-302-1"
},
{
"name": "http://kb.vmware.com/kb/2533126",
"refsource": "CONFIRM",
"url": "http://kb.vmware.com/kb/2533126"
},
{
"name": "24746",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24746"
},
{
"name": "24807",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24807"
},
{
"name": "21983",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21983"
},
{
"name": "ADV-2006-4353",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4353"
},
{
"name": "21035",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21035"
},
{
"name": "http://www.vmware.com/download/esx/esx-213-200610-patch.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
},
{
"name": "DSA-1097",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1097"
}, },
{ {
"name": "RHSA-2006:0575", "name": "RHSA-2006:0575",
@ -168,24 +178,9 @@
"url": "http://www.novell.com/linux/security/advisories/2006-05-31.html" "url": "http://www.novell.com/linux/security/advisories/2006-05-31.html"
}, },
{ {
"name" : "SUSE-SU-2014:0446", "name": "20061113 VMSA-2006-0009 - VMware ESX Server 3.0.0 AMD fxsave/restore issue",
"refsource" : "SUSE", "refsource": "BUGTRAQ",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" "url": "http://www.securityfocus.com/archive/1/451421/100/0/threaded"
},
{
"name" : "USN-302-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-302-1"
},
{
"name" : "17600",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17600"
},
{
"name" : "oval:org.mitre.oval:def:9995",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9995"
}, },
{ {
"name": "ADV-2006-1426", "name": "ADV-2006-1426",
@ -193,34 +188,9 @@
"url": "http://www.vupen.com/english/advisories/2006/1426" "url": "http://www.vupen.com/english/advisories/2006/1426"
}, },
{ {
"name" : "ADV-2006-2554", "name": "19715",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2006/2554" "url": "http://secunia.com/advisories/19715"
},
{
"name" : "ADV-2006-4353",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4353"
},
{
"name" : "ADV-2006-4502",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4502"
},
{
"name" : "ADV-2006-1475",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1475"
},
{
"name" : "24807",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24807"
},
{
"name" : "24746",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24746"
}, },
{ {
"name": "1015966", "name": "1015966",
@ -228,54 +198,84 @@
"url": "http://securitytracker.com/id?1015966" "url": "http://securitytracker.com/id?1015966"
}, },
{ {
"name" : "19724", "name": "20060419 FreeBSD Security Advisory FreeBSD-SA-06:14.fpu",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/19724" "url": "http://www.securityfocus.com/archive/1/431341"
}, },
{ {
"name" : "19715", "name": "17600",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/19715" "url": "http://www.securityfocus.com/bid/17600"
}, },
{ {
"name" : "20671", "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/20671" "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm"
}, },
{ {
"name" : "20716", "name": "DSA-1103",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/20716" "url": "http://www.debian.org/security/2006/dsa-1103"
}, },
{ {
"name" : "20914", "name": "http://www.vmware.com/download/esx/esx-254-200610-patch.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/20914" "url": "http://www.vmware.com/download/esx/esx-254-200610-patch.html"
}, },
{ {
"name" : "21035", "name": "FreeBSD-SA-06:14",
"refsource" : "SECUNIA", "refsource": "FREEBSD",
"url" : "http://secunia.com/advisories/21035" "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:14.fpu.asc"
},
{
"name" : "21136",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21136"
}, },
{ {
"name": "21465", "name": "21465",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21465" "url": "http://secunia.com/advisories/21465"
}, },
{
"name": "SUSE-SU-2014:0446",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name": "[linux-kernel] 20060419 RE: Linux 2.6.16.9",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel&m=114548768214478&w=2"
},
{
"name": "ADV-2006-1475",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1475"
},
{
"name": "20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
},
{
"name": "amd-fpu-information-disclosure(25871)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25871"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm"
},
{ {
"name": "20398", "name": "20398",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20398" "url": "http://secunia.com/advisories/20398"
}, },
{ {
"name" : "21983", "name": "20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/21983" "url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
},
{
"name": "http://security.freebsd.org/advisories/FreeBSD-SA-06:14-amd.txt",
"refsource": "MISC",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-06:14-amd.txt"
}, },
{ {
"name": "22417", "name": "22417",
@ -283,24 +283,24 @@
"url": "http://secunia.com/advisories/22417" "url": "http://secunia.com/advisories/22417"
}, },
{ {
"name" : "22875", "name": "19724",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/22875" "url": "http://secunia.com/advisories/19724"
}, },
{ {
"name" : "22876", "name": "20671",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/22876" "url": "http://secunia.com/advisories/20671"
}, },
{ {
"name" : "19735", "name": "20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/19735" "url": "http://www.securityfocus.com/archive/1/451419/100/200/threaded"
}, },
{ {
"name" : "amd-fpu-information-disclosure(25871)", "name": "20914",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25871" "url": "http://secunia.com/advisories/20914"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "29506",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29506"
},
{ {
"name": "2477", "name": "2477",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -72,11 +77,6 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3916" "url": "http://www.vupen.com/english/advisories/2006/3916"
}, },
{
"name" : "29506",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/29506"
},
{ {
"name": "22269", "name": "22269",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -53,14 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20061015 Security Advisory for Bugzilla 2.18.5, 2.20.2, 2.22, and 2.23.2", "name": "22409",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/448777/100/100/threaded" "url": "http://secunia.com/advisories/22409"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=346086", "name": "1760",
"refsource" : "CONFIRM", "refsource": "SREASON",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=346086" "url": "http://securityreason.com/securityalert/1760"
}, },
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=346564", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=346564",
@ -68,19 +68,9 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=346564" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=346564"
}, },
{ {
"name" : "http://www.bugzilla.org/security/2.18.5/", "name": "1017064",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.bugzilla.org/security/2.18.5/" "url": "http://securitytracker.com/id?1017064"
},
{
"name" : "GLSA-200611-04",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200611-04.xml"
},
{
"name" : "20538",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20538"
}, },
{ {
"name": "ADV-2006-4035", "name": "ADV-2006-4035",
@ -93,14 +83,14 @@
"url": "http://www.osvdb.org/29546" "url": "http://www.osvdb.org/29546"
}, },
{ {
"name" : "29547", "name": "20538",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://www.osvdb.org/29547" "url": "http://www.securityfocus.com/bid/20538"
}, },
{ {
"name" : "1017064", "name": "http://www.bugzilla.org/security/2.18.5/",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://securitytracker.com/id?1017064" "url": "http://www.bugzilla.org/security/2.18.5/"
}, },
{ {
"name": "22790", "name": "22790",
@ -108,14 +98,24 @@
"url": "http://secunia.com/advisories/22790" "url": "http://secunia.com/advisories/22790"
}, },
{ {
"name" : "22409", "name": "29547",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/22409" "url": "http://www.osvdb.org/29547"
}, },
{ {
"name" : "1760", "name": "GLSA-200611-04",
"refsource" : "SREASON", "refsource": "GENTOO",
"url" : "http://securityreason.com/securityalert/1760" "url": "http://security.gentoo.org/glsa/glsa-200611-04.xml"
},
{
"name": "20061015 Security Advisory for Bugzilla 2.18.5, 2.20.2, 2.22, and 2.23.2",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/448777/100/100/threaded"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=346086",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=346086"
} }
] ]
} }

View File

@ -53,25 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070427 AFFLIB(TM): Multiple Buffer Overflows", "name": "2655",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/467038/100/0/threaded" "url": "http://securityreason.com/securityalert/2655"
},
{
"name" : "http://www.vsecurity.com/bulletins/advisories/2007/afflib-overflows.txt",
"refsource" : "MISC",
"url" : "http://www.vsecurity.com/bulletins/advisories/2007/afflib-overflows.txt"
},
{
"name" : "23695",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23695"
}, },
{ {
"name": "35613", "name": "35613",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/35613" "url": "http://osvdb.org/35613"
}, },
{
"name": "http://www.vsecurity.com/bulletins/advisories/2007/afflib-overflows.txt",
"refsource": "MISC",
"url": "http://www.vsecurity.com/bulletins/advisories/2007/afflib-overflows.txt"
},
{ {
"name": "35614", "name": "35614",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -82,15 +77,20 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/35615" "url": "http://osvdb.org/35615"
}, },
{
"name" : "2655",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2655"
},
{ {
"name": "afflib-multiple-bo(33961)", "name": "afflib-multiple-bo(33961)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33961" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33961"
},
{
"name": "20070427 AFFLIB(TM): Multiple Buffer Overflows",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/467038/100/0/threaded"
},
{
"name": "23695",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23695"
} }
] ]
} }

View File

@ -52,6 +52,56 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2007-1534",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1534"
},
{
"name": "1017955",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017955"
},
{
"name": "SUSE-SA:2007:034",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
},
{
"name": "35369",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/35369"
},
{
"name": "2646",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2646"
},
{
"name": "25582",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25582"
},
{
"name": "asterisk-interface-dos(33886)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886"
},
{
"name": "24977",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24977"
},
{
"name": "23649",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23649"
},
{
"name": "DSA-1358",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1358"
},
{ {
"name": "20070425 ASA-2007-012: Remote Crash Vulnerability in Manager Interface", "name": "20070425 ASA-2007-012: Remote Crash Vulnerability in Manager Interface",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,56 +111,6 @@
"name": "http://www.asterisk.org/files/ASA-2007-012.pdf", "name": "http://www.asterisk.org/files/ASA-2007-012.pdf",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.asterisk.org/files/ASA-2007-012.pdf" "url": "http://www.asterisk.org/files/ASA-2007-012.pdf"
},
{
"name" : "DSA-1358",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1358"
},
{
"name" : "SUSE-SA:2007:034",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
},
{
"name" : "23649",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23649"
},
{
"name" : "ADV-2007-1534",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1534"
},
{
"name" : "35369",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/35369"
},
{
"name" : "1017955",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017955"
},
{
"name" : "24977",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24977"
},
{
"name" : "25582",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25582"
},
{
"name" : "2646",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2646"
},
{
"name" : "asterisk-interface-dos(33886)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/484803/100/100/threaded" "url": "http://www.securityfocus.com/archive/1/484803/100/100/threaded"
}, },
{
"name": "43675",
"refsource": "OSVDB",
"url": "http://osvdb.org/43675"
},
{ {
"name": "4705", "name": "4705",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -66,11 +71,6 @@
"name": "26782", "name": "26782",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26782" "url": "http://www.securityfocus.com/bid/26782"
},
{
"name" : "43675",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/43675"
} }
] ]
} }

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071213 Hosting Controller - Multiple Security Bugs (Extremely Critical)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/485028/100/0/threaded"
},
{
"name" : "4730",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4730"
},
{
"name" : "http://hostingcontroller.com/english/logs/Post-Hotfix-3_3-sec-Patch-ReleaseNotes.html",
"refsource" : "CONFIRM",
"url" : "http://hostingcontroller.com/english/logs/Post-Hotfix-3_3-sec-Patch-ReleaseNotes.html"
},
{
"name" : "26862",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26862"
},
{ {
"name": "44184", "name": "44184",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/44184" "url": "http://osvdb.org/44184"
}, },
{
"name" : "1019222",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019222"
},
{ {
"name": "28973", "name": "28973",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28973" "url": "http://secunia.com/advisories/28973"
}, },
{
"name": "20071213 Hosting Controller - Multiple Security Bugs (Extremely Critical)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485028/100/0/threaded"
},
{
"name": "http://hostingcontroller.com/english/logs/Post-Hotfix-3_3-sec-Patch-ReleaseNotes.html",
"refsource": "CONFIRM",
"url": "http://hostingcontroller.com/english/logs/Post-Hotfix-3_3-sec-Patch-ReleaseNotes.html"
},
{ {
"name": "3474", "name": "3474",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3474" "url": "http://securityreason.com/securityalert/3474"
},
{
"name": "4730",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4730"
},
{
"name": "26862",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26862"
},
{
"name": "1019222",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019222"
} }
] ]
} }

View File

@ -57,25 +57,25 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://gallery.menalto.com/gallery_2.2.4_released" "url": "http://gallery.menalto.com/gallery_2.2.4_released"
}, },
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=203217",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=203217"
},
{ {
"name": "GLSA-200802-04", "name": "GLSA-200802-04",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200802-04.xml" "url": "http://security.gentoo.org/glsa/glsa-200802-04.xml"
}, },
{
"name" : "41659",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/41659"
},
{ {
"name": "28898", "name": "28898",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28898" "url": "http://secunia.com/advisories/28898"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=203217",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=203217"
},
{
"name": "41659",
"refsource": "OSVDB",
"url": "http://osvdb.org/41659"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2010-0134", "ID": "CVE-2010-0134",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://secunia.com/secunia_research/2010-27/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2010-27/"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21440812",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21440812"
},
{ {
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01", "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "41928", "name": "41928",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/41928" "url": "http://www.securityfocus.com/bid/41928"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812"
},
{
"name": "http://secunia.com/secunia_research/2010-27/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2010-27/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-0304", "ID": "CVE-2010-0304",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20100129 Re: CVE id request: Wireshark", "name": "DSA-1983",
"refsource" : "MLIST", "refsource": "DEBIAN",
"url" : "http://www.openwall.com/lists/oss-security/2010/01/29/4" "url": "http://www.debian.org/security/2010/dsa-1983"
},
{
"name" : "http://anonsvn.wireshark.org/viewvc/trunk-1.2/epan/dissectors/packet-lwres.c?view=diff&r1=31596&r2=28492&diff_format=h",
"refsource" : "MISC",
"url" : "http://anonsvn.wireshark.org/viewvc/trunk-1.2/epan/dissectors/packet-lwres.c?view=diff&r1=31596&r2=28492&diff_format=h"
},
{
"name" : "http://www.metasploit.com/modules/exploit/multi/misc/wireshark_lwres_getaddrbyname",
"refsource" : "MISC",
"url" : "http://www.metasploit.com/modules/exploit/multi/misc/wireshark_lwres_getaddrbyname"
}, },
{ {
"name": "http://www.wireshark.org/security/wnpa-sec-2010-02.html", "name": "http://www.wireshark.org/security/wnpa-sec-2010-02.html",
@ -73,54 +63,14 @@
"url": "http://www.wireshark.org/security/wnpa-sec-2010-02.html" "url": "http://www.wireshark.org/security/wnpa-sec-2010-02.html"
}, },
{ {
"name" : "http://www.wireshark.org/security/wnpa-sec-2010-01.html", "name": "[oss-security] 20100129 Re: CVE id request: Wireshark",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "http://www.wireshark.org/security/wnpa-sec-2010-01.html" "url": "http://www.openwall.com/lists/oss-security/2010/01/29/4"
}, },
{ {
"name" : "DSA-1983", "name": "http://www.metasploit.com/modules/exploit/multi/misc/wireshark_lwres_getaddrbyname",
"refsource" : "DEBIAN", "refsource": "MISC",
"url" : "http://www.debian.org/security/2010/dsa-1983" "url": "http://www.metasploit.com/modules/exploit/multi/misc/wireshark_lwres_getaddrbyname"
},
{
"name" : "FEDORA-2010-3556",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036415.html"
},
{
"name" : "MDVSA-2010:031",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:031"
},
{
"name" : "37985",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37985"
},
{
"name" : "61987",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/61987"
},
{
"name" : "oval:org.mitre.oval:def:8490",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8490"
},
{
"name" : "oval:org.mitre.oval:def:9933",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9933"
},
{
"name" : "1023516",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1023516"
},
{
"name" : "38257",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38257"
}, },
{ {
"name": "38348", "name": "38348",
@ -132,15 +82,65 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38829" "url": "http://secunia.com/advisories/38829"
}, },
{
"name": "37985",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37985"
},
{
"name": "oval:org.mitre.oval:def:9933",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9933"
},
{
"name": "61987",
"refsource": "OSVDB",
"url": "http://osvdb.org/61987"
},
{
"name": "38257",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38257"
},
{ {
"name": "ADV-2010-0239", "name": "ADV-2010-0239",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0239" "url": "http://www.vupen.com/english/advisories/2010/0239"
}, },
{
"name": "http://anonsvn.wireshark.org/viewvc/trunk-1.2/epan/dissectors/packet-lwres.c?view=diff&r1=31596&r2=28492&diff_format=h",
"refsource": "MISC",
"url": "http://anonsvn.wireshark.org/viewvc/trunk-1.2/epan/dissectors/packet-lwres.c?view=diff&r1=31596&r2=28492&diff_format=h"
},
{
"name": "1023516",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023516"
},
{
"name": "MDVSA-2010:031",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:031"
},
{ {
"name": "wireshark-lwres-bo(55951)", "name": "wireshark-lwres-bo(55951)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55951" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55951"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2010-01.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2010-01.html"
},
{
"name": "oval:org.mitre.oval:def:8490",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8490"
},
{
"name": "FEDORA-2010-3556",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036415.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-0729", "ID": "CVE-2010-0729",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,6 +57,21 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/03/12/2" "url": "http://www.openwall.com/lists/oss-security/2010/03/12/2"
}, },
{
"name": "38702",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38702"
},
{
"name": "RHSA-2010:0394",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0394.html"
},
{
"name": "oval:org.mitre.oval:def:8687",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8687"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=572007", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=572007",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,21 +81,6 @@
"name": "http://support.avaya.com/css/P8/documents/100090459", "name": "http://support.avaya.com/css/P8/documents/100090459",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100090459" "url": "http://support.avaya.com/css/P8/documents/100090459"
},
{
"name" : "RHSA-2010:0394",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0394.html"
},
{
"name" : "38702",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/38702"
},
{
"name" : "oval:org.mitre.oval:def:8687",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8687"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "acidcat-install-info-disclosure(55331)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55331"
},
{ {
"name": "http://packetstormsecurity.org/1001-exploits/acidcatcms-disclose.txt", "name": "http://packetstormsecurity.org/1001-exploits/acidcatcms-disclose.txt",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "10972", "name": "10972",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/10972" "url": "http://www.exploit-db.com/exploits/10972"
},
{
"name" : "acidcat-install-info-disclosure(55331)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55331"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2010-0988", "ID": "CVE-2010-0988",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20100324 Secunia Research: Pulse CMS Arbitrary File Writing Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/510299/100/0/threaded"
},
{ {
"name": "20100324 Secunia Research: Pulse CMS login.php Arbitrary File Writing Vulnerability", "name": "20100324 Secunia Research: Pulse CMS login.php Arbitrary File Writing Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -72,6 +67,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://secunia.com/secunia_research/2010-51/" "url": "http://secunia.com/secunia_research/2010-51/"
}, },
{
"name": "63168",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/63168"
},
{ {
"name": "38956", "name": "38956",
"refsource": "BID", "refsource": "BID",
@ -83,9 +83,9 @@
"url": "http://www.osvdb.org/63166" "url": "http://www.osvdb.org/63166"
}, },
{ {
"name" : "63168", "name": "20100324 Secunia Research: Pulse CMS Arbitrary File Writing Vulnerability",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://www.osvdb.org/63168" "url": "http://www.securityfocus.com/archive/1/510299/100/0/threaded"
}, },
{ {
"name": "39011", "name": "39011",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/",
"refsource" : "CONFIRM",
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/"
},
{ {
"name": "38795", "name": "38795",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/38795" "url": "http://www.securityfocus.com/bid/38795"
},
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/",
"refsource": "CONFIRM",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1169", "ID": "CVE-2010-1169",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,95 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20100520 CVE-2010-1974 reject request (dupe of CVE-2010-1168) and CVE-2010-1447 description modification request",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/05/20/5"
},
{
"name" : "http://www.postgresql.org/about/news.1203",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/about/news.1203"
},
{
"name" : "http://www.postgresql.org/docs/current/static/release-7-4-29.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/current/static/release-7-4-29.html"
},
{
"name" : "http://www.postgresql.org/docs/current/static/release-8-0-25.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/current/static/release-8-0-25.html"
},
{ {
"name": "http://www.postgresql.org/docs/current/static/release-8-1-21.html", "name": "http://www.postgresql.org/docs/current/static/release-8-1-21.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/current/static/release-8-1-21.html" "url": "http://www.postgresql.org/docs/current/static/release-8-1-21.html"
}, },
{
"name" : "http://www.postgresql.org/docs/current/static/release-8-2-17.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/current/static/release-8-2-17.html"
},
{
"name" : "http://www.postgresql.org/docs/current/static/release-8-3-11.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/current/static/release-8-3-11.html"
},
{
"name" : "http://www.postgresql.org/docs/current/static/release-8-4-4.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/current/static/release-8-4-4.html"
},
{
"name" : "http://www.postgresql.org/support/security",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/support/security"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=582615",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=582615"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=588269",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=588269"
},
{
"name" : "DSA-2051",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2051"
},
{
"name" : "FEDORA-2010-8696",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041559.html"
},
{ {
"name": "FEDORA-2010-8715", "name": "FEDORA-2010-8715",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041579.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041579.html"
}, },
{ {
"name" : "FEDORA-2010-8723", "name": "http://www.postgresql.org/about/news.1203",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041591.html" "url": "http://www.postgresql.org/about/news.1203"
},
{
"name" : "HPSBMU02781",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=134124585221119&w=2"
},
{
"name" : "SSRT100617",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=134124585221119&w=2"
},
{
"name" : "MDVSA-2010:103",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:103"
}, },
{ {
"name": "RHSA-2010:0427", "name": "RHSA-2010:0427",
@ -153,49 +78,19 @@
"url": "http://www.redhat.com/support/errata/RHSA-2010-0428.html" "url": "http://www.redhat.com/support/errata/RHSA-2010-0428.html"
}, },
{ {
"name" : "RHSA-2010:0429", "name": "HPSBMU02781",
"refsource" : "REDHAT", "refsource": "HP",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0429.html" "url": "http://marc.info/?l=bugtraq&m=134124585221119&w=2"
}, },
{ {
"name" : "RHSA-2010:0430", "name": "postgresql-safe-code-execution(58693)",
"refsource" : "REDHAT", "refsource": "XF",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0430.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58693"
}, },
{ {
"name" : "SUSE-SR:2010:014", "name": "DSA-2051",
"refsource" : "SUSE", "refsource": "DEBIAN",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" "url": "http://www.debian.org/security/2010/dsa-2051"
},
{
"name" : "40215",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40215"
},
{
"name" : "64755",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/64755"
},
{
"name" : "oval:org.mitre.oval:def:10645",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10645"
},
{
"name" : "1023988",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1023988"
},
{
"name" : "39845",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39845"
},
{
"name" : "39820",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39820"
}, },
{ {
"name": "39898", "name": "39898",
@ -203,29 +98,14 @@
"url": "http://secunia.com/advisories/39898" "url": "http://secunia.com/advisories/39898"
}, },
{ {
"name" : "39939", "name": "http://www.postgresql.org/docs/current/static/release-7-4-29.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/current/static/release-7-4-29.html"
},
{
"name": "39820",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/39939" "url": "http://secunia.com/advisories/39820"
},
{
"name" : "39815",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39815"
},
{
"name" : "ADV-2010-1167",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1167"
},
{
"name" : "ADV-2010-1207",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1207"
},
{
"name" : "ADV-2010-1197",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1197"
}, },
{ {
"name": "ADV-2010-1198", "name": "ADV-2010-1198",
@ -233,9 +113,14 @@
"url": "http://www.vupen.com/english/advisories/2010/1198" "url": "http://www.vupen.com/english/advisories/2010/1198"
}, },
{ {
"name" : "ADV-2010-1182", "name": "http://www.postgresql.org/docs/current/static/release-8-0-25.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/current/static/release-8-0-25.html"
},
{
"name": "ADV-2010-1167",
"refsource": "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1182" "url": "http://www.vupen.com/english/advisories/2010/1167"
}, },
{ {
"name": "ADV-2010-1221", "name": "ADV-2010-1221",
@ -243,9 +128,124 @@
"url": "http://www.vupen.com/english/advisories/2010/1221" "url": "http://www.vupen.com/english/advisories/2010/1221"
}, },
{ {
"name" : "postgresql-safe-code-execution(58693)", "name": "39845",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58693" "url": "http://secunia.com/advisories/39845"
},
{
"name": "40215",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40215"
},
{
"name": "http://www.postgresql.org/docs/current/static/release-8-3-11.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/current/static/release-8-3-11.html"
},
{
"name": "ADV-2010-1207",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1207"
},
{
"name": "http://www.postgresql.org/docs/current/static/release-8-2-17.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/current/static/release-8-2-17.html"
},
{
"name": "RHSA-2010:0430",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0430.html"
},
{
"name": "http://www.postgresql.org/support/security",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/support/security"
},
{
"name": "FEDORA-2010-8696",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041559.html"
},
{
"name": "FEDORA-2010-8723",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041591.html"
},
{
"name": "http://www.postgresql.org/docs/current/static/release-8-4-4.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/current/static/release-8-4-4.html"
},
{
"name": "SUSE-SR:2010:014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
},
{
"name": "ADV-2010-1182",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1182"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=582615",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=582615"
},
{
"name": "39815",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39815"
},
{
"name": "oval:org.mitre.oval:def:10645",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10645"
},
{
"name": "RHSA-2010:0429",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0429.html"
},
{
"name": "MDVSA-2010:103",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:103"
},
{
"name": "1023988",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023988"
},
{
"name": "[oss-security] 20100520 CVE-2010-1974 reject request (dupe of CVE-2010-1168) and CVE-2010-1447 description modification request",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/05/20/5"
},
{
"name": "39939",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39939"
},
{
"name": "SSRT100617",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134124585221119&w=2"
},
{
"name": "64755",
"refsource": "OSVDB",
"url": "http://osvdb.org/64755"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=588269",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=588269"
},
{
"name": "ADV-2010-1197",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1197"
} }
] ]
} }

View File

@ -52,55 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20100420 MITKRB5-SA-2010-004 [CVE-2010-1320] double free in KDC",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/510843/100/0/threaded"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490"
},
{
"name" : "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt",
"refsource" : "CONFIRM",
"url" : "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt"
},
{
"name" : "http://support.apple.com/kb/HT4188",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4188"
},
{ {
"name": "APPLE-SA-2010-06-15-1", "name": "APPLE-SA-2010-06-15-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html"
}, },
{ {
"name" : "SUSE-SR:2010:010", "name": "20100420 MITKRB5-SA-2010-004 [CVE-2010-1320] double free in KDC",
"refsource" : "SUSE", "refsource": "BUGTRAQ",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" "url": "http://www.securityfocus.com/archive/1/510843/100/0/threaded"
},
{
"name" : "USN-940-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-940-1"
},
{
"name" : "39599",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39599"
},
{
"name" : "1023904",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1023904"
},
{
"name" : "39656",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39656"
}, },
{ {
"name": "39784", "name": "39784",
@ -108,14 +68,29 @@
"url": "http://secunia.com/advisories/39784" "url": "http://secunia.com/advisories/39784"
}, },
{ {
"name" : "40220", "name": "USN-940-1",
"refsource" : "SECUNIA", "refsource": "UBUNTU",
"url" : "http://secunia.com/advisories/40220" "url": "http://www.ubuntu.com/usn/USN-940-1"
}, },
{ {
"name" : "ADV-2010-1001", "name": "ADV-2010-1481",
"refsource": "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1001" "url": "http://www.vupen.com/english/advisories/2010/1481"
},
{
"name": "39656",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39656"
},
{
"name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt",
"refsource": "CONFIRM",
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490"
}, },
{ {
"name": "ADV-2010-1192", "name": "ADV-2010-1192",
@ -123,9 +98,34 @@
"url": "http://www.vupen.com/english/advisories/2010/1192" "url": "http://www.vupen.com/english/advisories/2010/1192"
}, },
{ {
"name" : "ADV-2010-1481", "name": "http://support.apple.com/kb/HT4188",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4188"
},
{
"name": "40220",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40220"
},
{
"name": "SUSE-SR:2010:010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html"
},
{
"name": "1023904",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023904"
},
{
"name": "ADV-2010-1001",
"refsource": "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1481" "url": "http://www.vupen.com/english/advisories/2010/1001"
},
{
"name": "39599",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39599"
} }
] ]
} }

View File

@ -53,39 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20101130 MITKRB5-SA-2010-007 Multiple checksum handling vulnerabilities [CVE-2010-1324 CVE-2010-1323 CVE-2010-4020 CVE-2010-4021]", "name": "ADV-2010-3094",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/514953/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2010/3094"
},
{
"name" : "20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/517739/100/0/threaded"
},
{
"name" : "[security-announce] 20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console",
"refsource" : "MLIST",
"url" : "http://lists.vmware.com/pipermail/security-announce/2011/000133.html"
},
{
"name" : "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt",
"refsource" : "CONFIRM",
"url" : "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt"
},
{
"name" : "http://support.apple.com/kb/HT4581",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4581"
},
{
"name" : "http://kb.vmware.com/kb/1035108",
"refsource" : "CONFIRM",
"url" : "http://kb.vmware.com/kb/1035108"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0007.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0007.html"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
@ -93,14 +63,9 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
}, },
{ {
"name" : "APPLE-SA-2011-03-21-1", "name": "MDVSA-2010:246",
"refsource" : "APPLE", "refsource": "MANDRIVA",
"url" : "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:246"
},
{
"name" : "FEDORA-2010-18409",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html"
}, },
{ {
"name": "FEDORA-2010-18425", "name": "FEDORA-2010-18425",
@ -108,89 +73,124 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html"
}, },
{ {
"name" : "HPSBUX02623", "name": "http://kb.vmware.com/kb/1035108",
"refsource" : "HP", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=bugtraq&m=129562442714657&w=2" "url": "http://kb.vmware.com/kb/1035108"
},
{
"name" : "SSRT100355",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=129562442714657&w=2"
},
{
"name" : "MDVSA-2010:246",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:246"
},
{
"name" : "RHSA-2010:0925",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0925.html"
},
{
"name" : "SUSE-SR:2010:023",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"
},
{
"name" : "SUSE-SR:2010:024",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name" : "USN-1030-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1030-1"
},
{
"name" : "45116",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/45116"
},
{
"name" : "69609",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/69609"
},
{
"name" : "oval:org.mitre.oval:def:11936",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11936"
},
{
"name" : "1024803",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024803"
},
{
"name" : "42399",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42399"
},
{
"name" : "43015",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43015"
},
{
"name" : "ADV-2010-3094",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/3094"
},
{
"name" : "ADV-2010-3095",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/3095"
}, },
{ {
"name": "ADV-2010-3118", "name": "ADV-2010-3118",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3118" "url": "http://www.vupen.com/english/advisories/2010/3118"
}, },
{
"name": "oval:org.mitre.oval:def:11936",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11936"
},
{ {
"name": "ADV-2011-0187", "name": "ADV-2011-0187",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0187" "url": "http://www.vupen.com/english/advisories/2011/0187"
},
{
"name": "20101130 MITKRB5-SA-2010-007 Multiple checksum handling vulnerabilities [CVE-2010-1324 CVE-2010-1323 CVE-2010-4020 CVE-2010-4021]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/514953/100/0/threaded"
},
{
"name": "SUSE-SR:2010:023",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0007.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0007.html"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "69609",
"refsource": "OSVDB",
"url": "http://osvdb.org/69609"
},
{
"name": "HPSBUX02623",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=129562442714657&w=2"
},
{
"name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt",
"refsource": "CONFIRM",
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt"
},
{
"name": "SSRT100355",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=129562442714657&w=2"
},
{
"name": "ADV-2010-3095",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3095"
},
{
"name": "42399",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42399"
},
{
"name": "45116",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45116"
},
{
"name": "[security-announce] 20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console",
"refsource": "MLIST",
"url": "http://lists.vmware.com/pipermail/security-announce/2011/000133.html"
},
{
"name": "1024803",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024803"
},
{
"name": "20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/517739/100/0/threaded"
},
{
"name": "FEDORA-2010-18409",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html"
},
{
"name": "SUSE-SR:2010:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name": "RHSA-2010:0925",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0925.html"
},
{
"name": "USN-1030-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1030-1"
},
{
"name": "43015",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43015"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.org/1004-exploits/joomlahoroscope-lfi.txt", "name": "ADV-2010-0859",
"refsource" : "MISC", "refsource": "VUPEN",
"url" : "http://packetstormsecurity.org/1004-exploits/joomlahoroscope-lfi.txt" "url": "http://www.vupen.com/english/advisories/2010/0859"
}, },
{ {
"name": "12167", "name": "12167",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/39406" "url": "http://secunia.com/advisories/39406"
}, },
{ {
"name" : "ADV-2010-0859", "name": "http://packetstormsecurity.org/1004-exploits/joomlahoroscope-lfi.txt",
"refsource" : "VUPEN", "refsource": "MISC",
"url" : "http://www.vupen.com/english/advisories/2010/0859" "url": "http://packetstormsecurity.org/1004-exploits/joomlahoroscope-lfi.txt"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1643", "ID": "CVE-2010-1643",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,40 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20100526 CVE request - kernel: nfsd: fix vm overcommit crash",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/05/26/2"
},
{ {
"name": "[oss-security] 20100526 Re: CVE request - kernel: nfsd: fix vm overcommit crash", "name": "[oss-security] 20100526 Re: CVE request - kernel: nfsd: fix vm overcommit crash",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/05/26/6" "url": "http://www.openwall.com/lists/oss-security/2010/05/26/6"
}, },
{
"name" : "http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-knfsd-9666",
"refsource" : "MISC",
"url" : "http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-knfsd-9666"
},
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=731572d39fcd3498702eda4600db4c43d51e0b26", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=731572d39fcd3498702eda4600db4c43d51e0b26",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=731572d39fcd3498702eda4600db4c43d51e0b26" "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=731572d39fcd3498702eda4600db4c43d51e0b26"
}, },
{ {
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.28/ChangeLog-2.6.28-rc3", "name": "[oss-security] 20100526 CVE request - kernel: nfsd: fix vm overcommit crash",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.28/ChangeLog-2.6.28-rc3" "url": "http://www.openwall.com/lists/oss-security/2010/05/26/2"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=595970",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=595970"
},
{
"name" : "MDVSA-2010:198",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"
}, },
{ {
"name": "SUSE-SA:2010:031", "name": "SUSE-SA:2010:031",
@ -93,24 +73,44 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html"
}, },
{ {
"name" : "40377", "name": "MDVSA-2010:198",
"refsource" : "BID", "refsource": "MANDRIVA",
"url" : "http://www.securityfocus.com/bid/40377" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=595970",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=595970"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.28/ChangeLog-2.6.28-rc3",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.28/ChangeLog-2.6.28-rc3"
}, },
{ {
"name": "40645", "name": "40645",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40645" "url": "http://secunia.com/advisories/40645"
}, },
{
"name" : "ADV-2010-1857",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1857"
},
{ {
"name": "linux-kernel-knfsd-dos(58957)", "name": "linux-kernel-knfsd-dos(58957)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58957" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58957"
},
{
"name": "http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-knfsd-9666",
"refsource": "MISC",
"url": "http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-knfsd-9666"
},
{
"name": "40377",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40377"
},
{
"name": "ADV-2010-1857",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1857"
} }
] ]
} }

View File

@ -52,125 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=63444",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=63444"
},
{
"name" : "http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html"
},
{
"name" : "http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html",
"refsource" : "CONFIRM",
"url" : "http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html"
},
{
"name" : "http://support.apple.com/kb/HT4554",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4554"
},
{
"name" : "http://support.apple.com/kb/HT4564",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4564"
},
{
"name" : "http://support.apple.com/kb/HT4566",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4566"
},
{
"name" : "http://support.apple.com/kb/HT4581",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4581"
},
{
"name" : "APPLE-SA-2011-03-02-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html"
},
{
"name" : "APPLE-SA-2011-03-09-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
},
{
"name" : "APPLE-SA-2011-03-09-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"name" : "APPLE-SA-2011-03-21-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name" : "DSA-2137",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2137"
},
{
"name" : "FEDORA-2011-2697",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055775.html"
},
{
"name" : "HPSBGN02970",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139447903326211&w=2"
},
{ {
"name": "MDVSA-2010:260", "name": "MDVSA-2010:260",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:260" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:260"
}, },
{
"name" : "RHSA-2011:1749",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1749.html"
},
{
"name" : "RHSA-2013:0217",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
},
{
"name" : "SUSE-SR:2011:005",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name" : "oval:org.mitre.oval:def:11916",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11916"
},
{
"name" : "42721",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42721"
},
{
"name" : "42762",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42762"
},
{ {
"name": "40775", "name": "40775",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40775" "url": "http://secunia.com/advisories/40775"
}, },
{ {
"name" : "42472", "name": "http://support.apple.com/kb/HT4564",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/42472" "url": "http://support.apple.com/kb/HT4564"
},
{
"name" : "ADV-2010-3319",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/3319"
}, },
{ {
"name": "ADV-2010-3336", "name": "ADV-2010-3336",
@ -181,6 +76,111 @@
"name": "ADV-2011-0230", "name": "ADV-2011-0230",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0230" "url": "http://www.vupen.com/english/advisories/2011/0230"
},
{
"name": "DSA-2137",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2137"
},
{
"name": "RHSA-2013:0217",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
},
{
"name": "http://support.apple.com/kb/HT4566",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4566"
},
{
"name": "42721",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42721"
},
{
"name": "RHSA-2011:1749",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1749.html"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "SUSE-SR:2011:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "APPLE-SA-2011-03-02-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html"
},
{
"name": "http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html",
"refsource": "CONFIRM",
"url": "http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html"
},
{
"name": "FEDORA-2011-2697",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055775.html"
},
{
"name": "APPLE-SA-2011-03-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
},
{
"name": "42472",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42472"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=63444",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=63444"
},
{
"name": "oval:org.mitre.oval:def:11916",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11916"
},
{
"name": "http://support.apple.com/kb/HT4554",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4554"
},
{
"name": "APPLE-SA-2011-03-09-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"name": "42762",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42762"
},
{
"name": "ADV-2010-3319",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3319"
},
{
"name": "HPSBGN02970",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2"
},
{
"name": "http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4520", "ID": "CVE-2010-4520",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://drupal.org/node/829840",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/829840"
},
{ {
"name": "[oss-security] 20101216 CVE request: Drupal views module CSRF/XSS before 2.11, XSS before 2.12", "name": "[oss-security] 20101216 CVE request: Drupal views module CSRF/XSS before 2.11, XSS before 2.12",
"refsource": "MLIST", "refsource": "MLIST",
@ -61,11 +66,6 @@
"name": "[oss-security] 20101221 Re: CVE request: Drupal views module CSRF/XSS before 2.11, XSS before 2.12", "name": "[oss-security] 20101221 Re: CVE request: Drupal views module CSRF/XSS before 2.11, XSS before 2.12",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/12/22/1" "url": "http://www.openwall.com/lists/oss-security/2010/12/22/1"
},
{
"name" : "http://drupal.org/node/829840",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/node/829840"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-0070", "ID": "CVE-2014-0070",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0218", "ID": "CVE-2014-0218",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20140519 Moodle security notifications public",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2014/05/19/1"
},
{
"name" : "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45332",
"refsource" : "CONFIRM",
"url" : "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45332"
},
{ {
"name": "https://moodle.org/mod/forum/discuss.php?d=260366", "name": "https://moodle.org/mod/forum/discuss.php?d=260366",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "67479", "name": "67479",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/67479" "url": "http://www.securityfocus.com/bid/67479"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45332",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45332"
},
{
"name": "[oss-security] 20140519 Moodle security notifications public",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/05/19/1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-0707", "ID": "CVE-2014-0707",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-0839", "ID": "CVE-2014-0839",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1314", "ID": "CVE-2014-1314",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@symantec.com",
"ID": "CVE-2014-1652", "ID": "CVE-2014-1652",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "67755",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67755"
},
{
"name": "1030443",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030443"
},
{ {
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2014&suid=20140616_00", "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2014&suid=20140616_00",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,16 +76,6 @@
"name": "VU#719172", "name": "VU#719172",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/719172" "url": "http://www.kb.cert.org/vuls/id/719172"
},
{
"name" : "67755",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/67755"
},
{
"name" : "1030443",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030443"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-1659", "ID": "CVE-2014-1659",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,39 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20140129 CVE Request: otrs: CSRF issue in customer web interface", "name": "102632",
"refsource" : "MLIST", "refsource": "OSVDB",
"url" : "http://www.openwall.com/lists/oss-security/2014/01/29/7" "url": "http://osvdb.org/102632"
},
{
"name" : "[oss-security] 20140129 Re: CVE Request: otrs: CSRF issue in customer web interface",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/01/29/15"
},
{
"name" : "http://bugs.otrs.org/show_bug.cgi?id=10099",
"refsource" : "CONFIRM",
"url" : "http://bugs.otrs.org/show_bug.cgi?id=10099"
},
{
"name" : "https://github.com/OTRS/otrs/commit/6f324aaf8647729d509eebf063a0181f9f9196f7",
"refsource" : "CONFIRM",
"url" : "https://github.com/OTRS/otrs/commit/6f324aaf8647729d509eebf063a0181f9f9196f7"
},
{
"name" : "https://github.com/OTRS/otrs/commit/92f417277f43832f1a0462f2485fe1fd3fd52312",
"refsource" : "CONFIRM",
"url" : "https://github.com/OTRS/otrs/commit/92f417277f43832f1a0462f2485fe1fd3fd52312"
},
{
"name" : "https://github.com/OTRS/otrs/commit/ca2c3390fd60d9a3f810ed2c22cbc2c193457b77",
"refsource" : "CONFIRM",
"url" : "https://github.com/OTRS/otrs/commit/ca2c3390fd60d9a3f810ed2c22cbc2c193457b77"
},
{
"name" : "https://www.otrs.com/release-notes-otrs-help-desk-3-3-4",
"refsource" : "CONFIRM",
"url" : "https://www.otrs.com/release-notes-otrs-help-desk-3-3-4"
}, },
{ {
"name": "https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface", "name": "https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface",
@ -93,14 +63,39 @@
"url": "https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface" "url": "https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface"
}, },
{ {
"name" : "DSA-2867", "name": "https://github.com/OTRS/otrs/commit/6f324aaf8647729d509eebf063a0181f9f9196f7",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2014/dsa-2867" "url": "https://github.com/OTRS/otrs/commit/6f324aaf8647729d509eebf063a0181f9f9196f7"
}, },
{ {
"name" : "102632", "name": "[oss-security] 20140129 Re: CVE Request: otrs: CSRF issue in customer web interface",
"refsource" : "OSVDB", "refsource": "MLIST",
"url" : "http://osvdb.org/102632" "url": "http://www.openwall.com/lists/oss-security/2014/01/29/15"
},
{
"name": "https://www.otrs.com/release-notes-otrs-help-desk-3-3-4",
"refsource": "CONFIRM",
"url": "https://www.otrs.com/release-notes-otrs-help-desk-3-3-4"
},
{
"name": "https://github.com/OTRS/otrs/commit/92f417277f43832f1a0462f2485fe1fd3fd52312",
"refsource": "CONFIRM",
"url": "https://github.com/OTRS/otrs/commit/92f417277f43832f1a0462f2485fe1fd3fd52312"
},
{
"name": "56655",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56655"
},
{
"name": "[oss-security] 20140129 CVE Request: otrs: CSRF issue in customer web interface",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/01/29/7"
},
{
"name": "https://github.com/OTRS/otrs/commit/ca2c3390fd60d9a3f810ed2c22cbc2c193457b77",
"refsource": "CONFIRM",
"url": "https://github.com/OTRS/otrs/commit/ca2c3390fd60d9a3f810ed2c22cbc2c193457b77"
}, },
{ {
"name": "56644", "name": "56644",
@ -108,9 +103,14 @@
"url": "http://secunia.com/advisories/56644" "url": "http://secunia.com/advisories/56644"
}, },
{ {
"name" : "56655", "name": "DSA-2867",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/56655" "url": "http://www.debian.org/security/2014/dsa-2867"
},
{
"name": "http://bugs.otrs.org/show_bug.cgi?id=10099",
"refsource": "CONFIRM",
"url": "http://bugs.otrs.org/show_bug.cgi?id=10099"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-1979", "ID": "CVE-2014-1979",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-4295", "ID": "CVE-2014-4295",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20140708 Re: CVE request: WordPress plugin wysija-newsletters remote file upload", "name": "https://wordpress.org/plugins/wysija-newsletters/changelog/",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2014/07/08/7" "url": "https://wordpress.org/plugins/wysija-newsletters/changelog/"
},
{
"name" : "http://arstechnica.com/security/2014/07/mass-exploit-of-wordpress-plugin-backdoors-sites-running-joomla-magento-too/",
"refsource" : "MISC",
"url" : "http://arstechnica.com/security/2014/07/mass-exploit-of-wordpress-plugin-backdoors-sites-running-joomla-magento-too/"
},
{
"name" : "http://blog.sucuri.net/2014/07/mailpoet-vulnerability-exploited-in-the-wild-breaking-thousands-of-wordpress-sites.html",
"refsource" : "MISC",
"url" : "http://blog.sucuri.net/2014/07/mailpoet-vulnerability-exploited-in-the-wild-breaking-thousands-of-wordpress-sites.html"
},
{
"name" : "http://blog.sucuri.net/2014/07/malware-infection-breaking-wordpress-sites.html",
"refsource" : "MISC",
"url" : "http://blog.sucuri.net/2014/07/malware-infection-breaking-wordpress-sites.html"
}, },
{ {
"name": "http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html", "name": "http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html",
@ -78,9 +63,24 @@
"url": "http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html" "url": "http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html"
}, },
{ {
"name" : "https://wordpress.org/plugins/wysija-newsletters/changelog/", "name": "http://blog.sucuri.net/2014/07/malware-infection-breaking-wordpress-sites.html",
"refsource" : "CONFIRM", "refsource": "MISC",
"url" : "https://wordpress.org/plugins/wysija-newsletters/changelog/" "url": "http://blog.sucuri.net/2014/07/malware-infection-breaking-wordpress-sites.html"
},
{
"name": "http://arstechnica.com/security/2014/07/mass-exploit-of-wordpress-plugin-backdoors-sites-running-joomla-magento-too/",
"refsource": "MISC",
"url": "http://arstechnica.com/security/2014/07/mass-exploit-of-wordpress-plugin-backdoors-sites-running-joomla-magento-too/"
},
{
"name": "[oss-security] 20140708 Re: CVE request: WordPress plugin wysija-newsletters remote file upload",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/07/08/7"
},
{
"name": "http://blog.sucuri.net/2014/07/mailpoet-vulnerability-exploited-in-the-wild-breaking-thousands-of-wordpress-sites.html",
"refsource": "MISC",
"url": "http://blog.sucuri.net/2014/07/mailpoet-vulnerability-exploited-in-the-wild-breaking-thousands-of-wordpress-sites.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.com/files/127658/WordPress-WhyDoWork-AdSense-1.2-XSS-CSRF.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/127658/WordPress-WhyDoWork-AdSense-1.2-XSS-CSRF.html"
},
{ {
"name": "68954", "name": "68954",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/68954" "url": "http://www.securityfocus.com/bid/68954"
},
{
"name": "http://packetstormsecurity.com/files/127658/WordPress-WhyDoWork-AdSense-1.2-XSS-CSRF.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127658/WordPress-WhyDoWork-AdSense-1.2-XSS-CSRF.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@symantec.com",
"ID": "CVE-2014-9227", "ID": "CVE-2014-9227",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150617_00" "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150617_00"
}, },
{
"name" : "75203",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75203"
},
{ {
"name": "1032616", "name": "1032616",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032616" "url": "http://www.securitytracker.com/id/1032616"
},
{
"name": "75203",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75203"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-3316", "ID": "CVE-2016-3316",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1036559",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036559"
},
{
"name": "92300",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92300"
},
{ {
"name": "40238", "name": "40238",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -61,16 +71,6 @@
"name": "MS16-099", "name": "MS16-099",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-099" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-099"
},
{
"name" : "92300",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92300"
},
{
"name" : "1036559",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036559"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-3372", "ID": "CVE-2016-3372",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-3462", "ID": "CVE-2016-3462",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{ {
"name": "1035629", "name": "1035629",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035629" "url": "http://www.securitytracker.com/id/1035629"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-3808", "ID": "CVE-2016-3808",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160904 CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/09/04/3"
},
{
"name" : "[oss-security] 20160905 Re: CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/09/05/8"
},
{ {
"name": "http://www.inspircd.org/2016/09/03/v2023-released.html", "name": "http://www.inspircd.org/2016/09/03/v2023-released.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,6 +62,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/inspircd/inspircd/commit/74fafb7f11b06747f69f182ad5e3769b665eea7a" "url": "https://github.com/inspircd/inspircd/commit/74fafb7f11b06747f69f182ad5e3769b665eea7a"
}, },
{
"name": "[oss-security] 20160905 Re: CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/09/05/8"
},
{
"name": "[oss-security] 20160904 CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/09/04/3"
},
{ {
"name": "DSA-3662", "name": "DSA-3662",
"refsource": "DEBIAN", "refsource": "DEBIAN",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7325", "ID": "CVE-2016-7325",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "40911",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40911/"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10181",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10181"
},
{ {
"name": "94823", "name": "94823",
"refsource": "BID", "refsource": "BID",
@ -71,6 +61,16 @@
"name": "1037433", "name": "1037433",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037433" "url": "http://www.securitytracker.com/id/1037433"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10181",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10181"
},
{
"name": "40911",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40911/"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8269", "ID": "CVE-2016-8269",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "94257",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94257"
},
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-606", "name": "http://www.zerodayinitiative.com/advisories/ZDI-16-606",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html", "name": "https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html" "url": "https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html"
},
{
"name" : "94257",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94257"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-9912", "ID": "CVE-2016-9912",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },