"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:42:31 +00:00
parent 35434e0113
commit 0d5f7ed9e8
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 3972 additions and 3972 deletions

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20010410 multiple vulnerabilities in Alcatel Speed Touch DSL modems", "name": "2566",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/175229" "url": "http://www.securityfocus.com/bid/2566"
},
{
"name" : "CA-2001-08",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2001-08.html"
}, },
{ {
"name": "VU#490344", "name": "VU#490344",
@ -68,14 +63,19 @@
"url": "http://www.kb.cert.org/vuls/id/490344" "url": "http://www.kb.cert.org/vuls/id/490344"
}, },
{ {
"name" : "2566", "name": "20010410 multiple vulnerabilities in Alcatel Speed Touch DSL modems",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/2566" "url": "http://www.securityfocus.com/archive/1/175229"
}, },
{ {
"name": "alcatel-tftp-lan-access(6336)", "name": "alcatel-tftp-lan-access(6336)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6336" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6336"
},
{
"name": "CA-2001-08",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2001-08.html"
} }
] ]
} }

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060423 Buffer-overflow and crash in Fenice OMS 1.10", "name": "19770",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/431870/100/0/threaded" "url": "http://secunia.com/advisories/19770"
},
{
"name" : "20060607 Re: Buffer-overflow and crash in Fenice OMS 1.10",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/436256/100/0/threaded"
},
{
"name" : "20060425 Fenice - Open Media Streaming Server remote BOF exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432002/100/0/threaded"
},
{
"name" : "http://aluigi.altervista.org/adv/fenicex-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/fenicex-adv.txt"
}, },
{ {
"name": "17678", "name": "17678",
@ -78,20 +63,35 @@
"url": "http://www.securityfocus.com/bid/17678" "url": "http://www.securityfocus.com/bid/17678"
}, },
{ {
"name" : "ADV-2006-1491", "name": "http://aluigi.altervista.org/adv/fenicex-adv.txt",
"refsource" : "VUPEN", "refsource": "MISC",
"url" : "http://www.vupen.com/english/advisories/2006/1491" "url": "http://aluigi.altervista.org/adv/fenicex-adv.txt"
}, },
{ {
"name" : "19770", "name": "20060423 Buffer-overflow and crash in Fenice OMS 1.10",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/19770" "url": "http://www.securityfocus.com/archive/1/431870/100/0/threaded"
}, },
{ {
"name": "794", "name": "794",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/794" "url": "http://securityreason.com/securityalert/794"
}, },
{
"name": "20060425 Fenice - Open Media Streaming Server remote BOF exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432002/100/0/threaded"
},
{
"name": "ADV-2006-1491",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1491"
},
{
"name": "20060607 Re: Buffer-overflow and crash in Fenice OMS 1.10",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/436256/100/0/threaded"
},
{ {
"name": "fenice-parseurl-bo(26078)", "name": "fenice-parseurl-bo(26078)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "19659",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19659"
},
{ {
"name": "http://pridels0.blogspot.com/2006/04/phpmyadmin-xss-vuln.html", "name": "http://pridels0.blogspot.com/2006/04/phpmyadmin-xss-vuln.html",
"refsource": "MISC", "refsource": "MISC",
@ -62,11 +67,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-2" "url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-2"
}, },
{
"name" : "19659",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19659"
},
{ {
"name": "phpmyadmin-index-xss(25954)", "name": "phpmyadmin-index-xss(25954)",
"refsource": "XF", "refsource": "XF",

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432576/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/432576/100/0/threaded"
}, },
{
"name" : "http://www.planetc.de/download/planetgallery/planetgallery.html",
"refsource" : "CONFIRM",
"url" : "http://www.planetc.de/download/planetgallery/planetgallery.html"
},
{ {
"name": "17753", "name": "17753",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "825", "name": "825",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/825" "url": "http://securityreason.com/securityalert/825"
},
{
"name": "http://www.planetc.de/download/planetgallery/planetgallery.html",
"refsource": "CONFIRM",
"url": "http://www.planetc.de/download/planetgallery/planetgallery.html"
} }
] ]
} }

View File

@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060429 I-RATER Platinum Remote File Inclusion exploit Cod3d by R@1D3N",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432596/100/0/threaded"
},
{ {
"name": "20060428 [Kurdish Secure Advisory #1] I-RATER Platinum \"Admin/configsettings.tpl.php\" Remote File Include Vulnerability", "name": "20060428 [Kurdish Secure Advisory #1] I-RATER Platinum \"Admin/configsettings.tpl.php\" Remote File Include Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432404/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/432404/100/0/threaded"
}, },
{ {
"name" : "17731", "name": "irater-configsettingtpl-file-include(26203)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/17731" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26203"
},
{
"name": "20060429 I-RATER Platinum Remote File Inclusion exploit Cod3d by R@1D3N",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432596/100/0/threaded"
}, },
{ {
"name": "824", "name": "824",
@ -73,9 +73,9 @@
"url": "http://securityreason.com/securityalert/824" "url": "http://securityreason.com/securityalert/824"
}, },
{ {
"name" : "irater-configsettingtpl-file-include(26203)", "name": "17731",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26203" "url": "http://www.securityfocus.com/bid/17731"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://drupal.org/node/62406",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/node/62406"
},
{ {
"name": "17885", "name": "17885",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/17885" "url": "http://www.securityfocus.com/bid/17885"
}, },
{
"name": "drupal-projectmodule-xss(26358)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26358"
},
{ {
"name": "ADV-2006-1697", "name": "ADV-2006-1697",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/19997" "url": "http://secunia.com/advisories/19997"
}, },
{ {
"name" : "drupal-projectmodule-xss(26358)", "name": "http://drupal.org/node/62406",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26358" "url": "http://drupal.org/node/62406"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2006-3126", "ID": "CVE-2006-3126",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474", "name": "19801",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474" "url": "http://www.securityfocus.com/bid/19801"
}, },
{ {
"name" : "DSA-1165", "name": "21726",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2006/dsa-1165" "url": "http://secunia.com/advisories/21726"
},
{
"name" : "GLSA-200610-05",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200610-05.xml"
}, },
{ {
"name": "SUSE-SR:2007:004", "name": "SUSE-SR:2007:004",
@ -73,9 +68,9 @@
"url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
}, },
{ {
"name" : "19801", "name": "22450",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/19801" "url": "http://secunia.com/advisories/22450"
}, },
{ {
"name": "ADV-2006-3430", "name": "ADV-2006-3430",
@ -88,14 +83,19 @@
"url": "http://secunia.com/advisories/21722" "url": "http://secunia.com/advisories/21722"
}, },
{ {
"name" : "21726", "name": "GLSA-200610-05",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/21726" "url": "http://security.gentoo.org/glsa/glsa-200610-05.xml"
}, },
{ {
"name" : "22450", "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/22450" "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474"
},
{
"name": "DSA-1165",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1165"
} }
] ]
} }

View File

@ -52,35 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060711 VBZooM \"sendmail.php\" SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440133/100/0/threaded"
},
{
"name" : "20060711 VBZooM <=V1.11 \" ignore-pm.php\" SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440145/100/0/threaded"
},
{
"name" : "20060711 VBZooM <=V1.11 \" reply.php\" SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440141/100/0/threaded"
},
{
"name" : "20060711 VBZooM <=V1.11 \"sub-join.php\" SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440114/100/0/threaded"
},
{ {
"name": "20080507 VBZooM <=V1.11 \"reply.php\" SQL Injection Vulnerability", "name": "20080507 VBZooM <=V1.11 \"reply.php\" SQL Injection Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/491770/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/491770/100/0/threaded"
}, },
{ {
"name" : "18937", "name": "20060711 VBZooM \"sendmail.php\" SQL Injection",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/18937" "url": "http://www.securityfocus.com/archive/1/440133/100/0/threaded"
},
{
"name": "vbzoom-userid-sql-injection(42254)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42254"
}, },
{ {
"name": "28254", "name": "28254",
@ -93,9 +78,24 @@
"url": "http://securityreason.com/securityalert/1244" "url": "http://securityreason.com/securityalert/1244"
}, },
{ {
"name" : "vbzoom-userid-sql-injection(42254)", "name": "18937",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42254" "url": "http://www.securityfocus.com/bid/18937"
},
{
"name": "20060711 VBZooM <=V1.11 \" reply.php\" SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440141/100/0/threaded"
},
{
"name": "20060711 VBZooM <=V1.11 \" ignore-pm.php\" SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440145/100/0/threaded"
},
{
"name": "20060711 VBZooM <=V1.11 \"sub-join.php\" SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440114/100/0/threaded"
} }
] ]
} }

View File

@ -52,20 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061124 Cahier de texte V2.0 SQL Code Execution Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/452600/100/0/threaded"
},
{ {
"name": "http://acid-root.new.fr/poc/15061124.txt", "name": "http://acid-root.new.fr/poc/15061124.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://acid-root.new.fr/poc/15061124.txt" "url": "http://acid-root.new.fr/poc/15061124.txt"
}, },
{ {
"name" : "21283", "name": "1961",
"refsource" : "BID", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/bid/21283" "url": "http://securityreason.com/securityalert/1961"
}, },
{ {
"name": "ADV-2006-4701", "name": "ADV-2006-4701",
@ -78,9 +73,14 @@
"url": "http://secunia.com/advisories/23122" "url": "http://secunia.com/advisories/23122"
}, },
{ {
"name" : "1961", "name": "20061124 Cahier de texte V2.0 SQL Code Execution Exploit",
"refsource" : "SREASON", "refsource": "BUGTRAQ",
"url" : "http://securityreason.com/securityalert/1961" "url": "http://www.securityfocus.com/archive/1/452600/100/0/threaded"
},
{
"name": "21283",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21283"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20061129 New report on Teredo security", "name": "http://www.symantec.com/avcenter/reference/Teredo_Security.pdf",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://www.securityfocus.com/archive/1/452989/100/0/threaded" "url": "http://www.symantec.com/avcenter/reference/Teredo_Security.pdf"
}, },
{ {
"name": "20061129 Re: [Full-disclosure] New report on Teredo security", "name": "20061129 Re: [Full-disclosure] New report on Teredo security",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/archive/1/452996/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/452996/100/0/threaded"
}, },
{ {
"name" : "http://www.symantec.com/avcenter/reference/Teredo_Security.pdf", "name": "20061129 New report on Teredo security",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://www.symantec.com/avcenter/reference/Teredo_Security.pdf" "url": "http://www.securityfocus.com/archive/1/452989/100/0/threaded"
} }
] ]
} }

View File

@ -53,29 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities", "name": "1017276",
"refsource" : "BUGTRAQ", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/archive/1/453118/100/100/threaded" "url": "http://securitytracker.com/id?1017276"
},
{
"name" : "http://secunia.com/secunia_research/2006-71/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2006-71/advisory/"
},
{
"name" : "http://www.mailenable.com/hotfix/",
"refsource" : "CONFIRM",
"url" : "http://www.mailenable.com/hotfix/"
},
{
"name" : "21362",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21362"
},
{
"name" : "ADV-2006-4673",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4673"
}, },
{ {
"name": "ADV-2006-4778", "name": "ADV-2006-4778",
@ -83,29 +63,49 @@
"url": "http://www.vupen.com/english/advisories/2006/4778" "url": "http://www.vupen.com/english/advisories/2006/4778"
}, },
{ {
"name" : "1017276", "name": "23080",
"refsource" : "SECTRACK", "refsource": "SECUNIA",
"url" : "http://securitytracker.com/id?1017276" "url": "http://secunia.com/advisories/23080"
},
{
"name": "21362",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21362"
}, },
{ {
"name": "1017319", "name": "1017319",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017319" "url": "http://securitytracker.com/id?1017319"
}, },
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2006-4673",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4673"
},
{
"name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
},
{ {
"name": "23047", "name": "23047",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23047" "url": "http://secunia.com/advisories/23047"
}, },
{
"name" : "23080",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23080"
},
{ {
"name": "mailenable-meimaps-bo(30614)", "name": "mailenable-meimaps-bo(30614)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
},
{
"name": "http://secunia.com/secunia_research/2006-71/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-71/advisory/"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "21461",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21461"
},
{ {
"name": "20061206 Multiple Vendor Unusual MIME Encoding Content Filter Bypass", "name": "20061206 Multiple Vendor Unusual MIME Encoding Content Filter Bypass",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "http://www.quantenblog.net/security/virus-scanner-bypass", "name": "http://www.quantenblog.net/security/virus-scanner-bypass",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.quantenblog.net/security/virus-scanner-bypass" "url": "http://www.quantenblog.net/security/virus-scanner-bypass"
},
{
"name" : "21461",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21461"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.firebirdsql.org/rlsnotes/Firebird-2.0-ReleaseNotes.pdf" "url": "http://www.firebirdsql.org/rlsnotes/Firebird-2.0-ReleaseNotes.pdf"
}, },
{
"name" : "DSA-1529",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1529"
},
{ {
"name": "28474", "name": "28474",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "29501", "name": "29501",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29501" "url": "http://secunia.com/advisories/29501"
},
{
"name": "DSA-1529",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1529"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0145", "ID": "CVE-2011-0145",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT4554",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4554"
},
{ {
"name": "http://support.apple.com/kb/HT4564", "name": "http://support.apple.com/kb/HT4564",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -77,6 +72,11 @@
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
}, },
{
"name": "http://support.apple.com/kb/HT4554",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4554"
},
{ {
"name": "APPLE-SA-2011-03-09-2", "name": "APPLE-SA-2011-03-09-2",
"refsource": "APPLE", "refsource": "APPLE",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0182", "ID": "CVE-2011-0182",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT4581",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4581"
},
{ {
"name": "APPLE-SA-2011-03-21-1", "name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE", "refsource": "APPLE",
@ -66,6 +61,11 @@
"name": "8402", "name": "8402",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8402" "url": "http://securityreason.com/securityalert/8402"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://code.google.com/p/chromium/issues/detail?id=67100", "name": "chrome-pdf-pages-code-execution(64666)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://code.google.com/p/chromium/issues/detail?id=67100" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64666"
}, },
{ {
"name": "http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html", "name": "http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html",
@ -63,9 +63,9 @@
"url": "http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html" "url": "http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html"
}, },
{ {
"name" : "http://www.srware.net/forum/viewtopic.php?f=18&t=2054", "name": "70458",
"refsource" : "CONFIRM", "refsource": "OSVDB",
"url" : "http://www.srware.net/forum/viewtopic.php?f=18&t=2054" "url": "http://osvdb.org/70458"
}, },
{ {
"name": "45788", "name": "45788",
@ -73,9 +73,14 @@
"url": "http://www.securityfocus.com/bid/45788" "url": "http://www.securityfocus.com/bid/45788"
}, },
{ {
"name" : "70458", "name": "http://www.srware.net/forum/viewtopic.php?f=18&t=2054",
"refsource" : "OSVDB", "refsource": "CONFIRM",
"url" : "http://osvdb.org/70458" "url": "http://www.srware.net/forum/viewtopic.php?f=18&t=2054"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=67100",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=67100"
}, },
{ {
"name": "oval:org.mitre.oval:def:14606", "name": "oval:org.mitre.oval:def:14606",
@ -86,11 +91,6 @@
"name": "42951", "name": "42951",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42951" "url": "http://secunia.com/advisories/42951"
},
{
"name" : "chrome-pdf-pages-code-execution(64666)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64666"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3369", "ID": "CVE-2011-3369",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20110919 CVE Request? etherape remote crash (denial of service)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/09/19/4"
},
{ {
"name": "[oss-security] 20110922 Re: CVE Request? etherape remote crash (denial of service)", "name": "[oss-security] 20110922 Re: CVE Request? etherape remote crash (denial of service)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/09/22/1" "url": "http://www.openwall.com/lists/oss-security/2011/09/22/1"
}, },
{ {
"name" : "http://etherape.sourceforge.net/NEWS.html", "name": "45989",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://etherape.sourceforge.net/NEWS.html" "url": "http://secunia.com/advisories/45989"
},
{
"name": "[oss-security] 20110919 CVE Request? etherape remote crash (denial of service)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/09/19/4"
}, },
{ {
"name": "http://sourceforge.net/tracker/?func=detail&aid=3309061&group_id=2712&atid=102712", "name": "http://sourceforge.net/tracker/?func=detail&aid=3309061&group_id=2712&atid=102712",
@ -73,9 +73,9 @@
"url": "http://sourceforge.net/tracker/?func=detail&aid=3309061&group_id=2712&atid=102712" "url": "http://sourceforge.net/tracker/?func=detail&aid=3309061&group_id=2712&atid=102712"
}, },
{ {
"name" : "45989", "name": "http://etherape.sourceforge.net/NEWS.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/45989" "url": "http://etherape.sourceforge.net/NEWS.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-3409", "ID": "CVE-2011-3409",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb", "name": "FEDORA-2011-13633",
"refsource" : "CONFIRM", "refsource": "FEDORA",
"url" : "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html"
},
{
"name" : "https://puppet.com/security/cve/cve-2011-3869",
"refsource" : "CONFIRM",
"url" : "https://puppet.com/security/cve/cve-2011-3869"
},
{
"name" : "DSA-2314",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2314"
}, },
{ {
"name": "FEDORA-2011-13623", "name": "FEDORA-2011-13623",
@ -73,15 +63,25 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html"
}, },
{ {
"name" : "FEDORA-2011-13633", "name": "DSA-2314",
"refsource" : "FEDORA", "refsource": "DEBIAN",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html" "url": "http://www.debian.org/security/2011/dsa-2314"
},
{
"name": "46458",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46458"
}, },
{ {
"name": "FEDORA-2011-13636", "name": "FEDORA-2011-13636",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html"
}, },
{
"name": "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb",
"refsource": "CONFIRM",
"url": "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb"
},
{ {
"name": "USN-1223-1", "name": "USN-1223-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -93,9 +93,9 @@
"url": "http://www.ubuntu.com/usn/USN-1223-2" "url": "http://www.ubuntu.com/usn/USN-1223-2"
}, },
{ {
"name" : "46458", "name": "https://puppet.com/security/cve/cve-2011-3869",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/46458" "url": "https://puppet.com/security/cve/cve-2011-3869"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4324", "ID": "CVE-2011-4324",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20120206 Re: CVE-2011-4324 kernel: nfsv4: mknod(2) DoS", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2012/02/06/3" "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9"
}, },
{ {
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29", "name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29",
@ -63,9 +63,9 @@
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29" "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29"
}, },
{ {
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9", "name": "[oss-security] 20120206 Re: CVE-2011-4324 kernel: nfsv4: mknod(2) DoS",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9" "url": "http://www.openwall.com/lists/oss-security/2012/02/06/3"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=755440", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=755440",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4622", "ID": "CVE-2011-4622",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[kvm] 20111214 [PATCH 1/2] KVM: x86: Prevent starting PIT timers in the absence of irqchip support", "name": "RHSA-2012:0051",
"refsource" : "MLIST", "refsource": "REDHAT",
"url" : "http://permalink.gmane.org/gmane.comp.emulators.kvm.devel/83564" "url": "http://www.redhat.com/support/errata/RHSA-2012-0051.html"
},
{
"name" : "[oss-security] 20111221 Re: kernel: kvm: pit timer with no irqchip crashes the system",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/12/21/7"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=769721", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=769721",
@ -68,14 +63,19 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769721" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769721"
}, },
{ {
"name" : "RHSA-2012:0051", "name": "51172",
"refsource" : "REDHAT", "refsource": "BID",
"url" : "http://www.redhat.com/support/errata/RHSA-2012-0051.html" "url": "http://www.securityfocus.com/bid/51172"
}, },
{ {
"name" : "openSUSE-SU-2013:0925", "name": "[oss-security] 20111221 Re: kernel: kvm: pit timer with no irqchip crashes the system",
"refsource" : "SUSE", "refsource": "MLIST",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" "url": "http://www.openwall.com/lists/oss-security/2011/12/21/7"
},
{
"name": "[kvm] 20111214 [PATCH 1/2] KVM: x86: Prevent starting PIT timers in the absence of irqchip support",
"refsource": "MLIST",
"url": "http://permalink.gmane.org/gmane.comp.emulators.kvm.devel/83564"
}, },
{ {
"name": "SUSE-SU-2012:0616", "name": "SUSE-SU-2012:0616",
@ -83,9 +83,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html"
}, },
{ {
"name" : "51172", "name": "openSUSE-SU-2013:0925",
"refsource" : "BID", "refsource": "SUSE",
"url" : "http://www.securityfocus.com/bid/51172" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
}, },
{ {
"name": "1026559", "name": "1026559",

View File

@ -53,44 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20111130 Sql injection in SugarCRM", "name": "sugarcrm-index-sql-injection(71586)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/520685/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71586"
},
{
"name" : "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html",
"refsource" : "MISC",
"url" : "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html"
},
{
"name" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800",
"refsource" : "CONFIRM",
"url" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800"
},
{
"name" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805",
"refsource" : "CONFIRM",
"url" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805"
},
{
"name" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806",
"refsource" : "CONFIRM",
"url" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806"
}, },
{ {
"name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47839", "name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47839",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47839" "url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47839"
}, },
{
"name": "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html",
"refsource": "MISC",
"url": "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html"
},
{ {
"name": "77459", "name": "77459",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/77459" "url": "http://www.osvdb.org/77459"
}, },
{ {
"name" : "1026369", "name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://securitytracker.com/id?1026369" "url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805"
}, },
{ {
"name": "47011", "name": "47011",
@ -98,9 +83,24 @@
"url": "http://secunia.com/advisories/47011" "url": "http://secunia.com/advisories/47011"
}, },
{ {
"name" : "sugarcrm-index-sql-injection(71586)", "name": "1026369",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71586" "url": "http://securitytracker.com/id?1026369"
},
{
"name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806",
"refsource": "CONFIRM",
"url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806"
},
{
"name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800",
"refsource": "CONFIRM",
"url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800"
},
{
"name": "20111130 Sql injection in SugarCRM",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520685/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4947", "ID": "CVE-2011-4947",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,25 +57,25 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/03/28/4" "url": "http://www.openwall.com/lists/oss-security/2012/03/28/4"
}, },
{
"name" : "[oss-security] 20120328 Re: CVE-request: e107 HTB23004",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/03/29/3"
},
{ {
"name": "https://www.htbridge.com/advisory/multiple_vulnerabilities_in_e107_1.html", "name": "https://www.htbridge.com/advisory/multiple_vulnerabilities_in_e107_1.html",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.htbridge.com/advisory/multiple_vulnerabilities_in_e107_1.html" "url": "https://www.htbridge.com/advisory/multiple_vulnerabilities_in_e107_1.html"
}, },
{
"name": "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306",
"refsource": "CONFIRM",
"url": "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306"
},
{ {
"name": "http://e107.org/svn_changelog.php?version=0.7.26", "name": "http://e107.org/svn_changelog.php?version=0.7.26",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://e107.org/svn_changelog.php?version=0.7.26" "url": "http://e107.org/svn_changelog.php?version=0.7.26"
}, },
{ {
"name" : "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306", "name": "[oss-security] 20120328 Re: CVE-request: e107 HTB23004",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306" "url": "http://www.openwall.com/lists/oss-security/2012/03/29/3"
}, },
{ {
"name": "e107-usersextended-xss(68062)", "name": "e107-usersextended-xss(68062)",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5806", "ID": "CVE-2013-5806",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{ {
"name": "GLSA-201406-32", "name": "GLSA-201406-32",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
}, },
{
"name" : "HPSBUX02944",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name" : "SUSE-SU-2013:1666",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name" : "openSUSE-SU-2013:1663",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{ {
"name": "USN-2089-1", "name": "USN-2089-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2089-1" "url": "http://www.ubuntu.com/usn/USN-2089-1"
}, },
{ {
"name" : "63122", "name": "HPSBUX02944",
"refsource" : "BID", "refsource": "HP",
"url" : "http://www.securityfocus.com/bid/63122" "url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name": "openSUSE-SU-2013:1663",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
}, },
{ {
"name": "oval:org.mitre.oval:def:18501", "name": "oval:org.mitre.oval:def:18501",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18501" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18501"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "63122",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63122"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5883", "ID": "CVE-2013-5883",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name" : "64758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64758"
},
{ {
"name": "64862", "name": "64862",
"refsource": "BID", "refsource": "BID",
@ -76,6 +66,16 @@
"name": "oracle-cpujan2014-cve20135883(90363)", "name": "oracle-cpujan2014-cve20135883(90363)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90363" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90363"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20130828 Drupal Node View Permissions module and Flag module Vulnerabilities", "name": "https://drupal.org/node/2031621",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-08/0184.html" "url": "https://drupal.org/node/2031621"
}, },
{ {
"name": "[oss-security] 20130911 Re: CVE request for Drupal contrib modules", "name": "[oss-security] 20130911 Re: CVE request for Drupal contrib modules",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/09/11/9" "url": "http://www.openwall.com/lists/oss-security/2013/09/11/9"
}, },
{
"name" : "https://drupal.org/node/2076315",
"refsource" : "MISC",
"url" : "https://drupal.org/node/2076315"
},
{
"name" : "https://drupal.org/node/2031621",
"refsource" : "CONFIRM",
"url" : "https://drupal.org/node/2031621"
},
{ {
"name": "54550", "name": "54550",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54550" "url": "http://secunia.com/advisories/54550"
},
{
"name": "20130828 Drupal Node View Permissions module and Flag module Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0184.html"
},
{
"name": "https://drupal.org/node/2076315",
"refsource": "MISC",
"url": "https://drupal.org/node/2076315"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-2349", "ID": "CVE-2014-2349",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-2355", "ID": "CVE-2014-2355",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-2766", "ID": "CVE-2014-2766",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS14-035", "name": "1030370",
"refsource" : "MS", "refsource": "SECTRACK",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035" "url": "http://www.securitytracker.com/id/1030370"
}, },
{ {
"name": "67850", "name": "67850",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/67850" "url": "http://www.securityfocus.com/bid/67850"
}, },
{ {
"name" : "1030370", "name": "MS14-035",
"refsource" : "SECTRACK", "refsource": "MS",
"url" : "http://www.securitytracker.com/id/1030370" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "GLSA-201812-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201812-10"
},
{
"name": "https://launchpad.net/bugs/1186676",
"refsource": "MISC",
"url": "https://launchpad.net/bugs/1186676"
},
{ {
"name": "http://savannah.nongnu.org/bugs/?40023", "name": "http://savannah.nongnu.org/bugs/?40023",
"refsource": "MISC", "refsource": "MISC",
@ -61,16 +71,6 @@
"name": "https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu", "name": "https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu",
"refsource": "MISC", "refsource": "MISC",
"url": "https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu" "url": "https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu"
},
{
"name" : "https://launchpad.net/bugs/1186676",
"refsource" : "MISC",
"url" : "https://launchpad.net/bugs/1186676"
},
{
"name" : "GLSA-201812-10",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201812-10"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-6146", "ID": "CVE-2014-6146",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "62190",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62190"
},
{ {
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21689082", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21689082",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04337" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04337"
}, },
{
"name" : "62190",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62190"
},
{ {
"name": "ibm-sterling-cve20146146-info-disc(96916)", "name": "ibm-sterling-cve20146146-info-disc(96916)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010",
"refsource" : "MISC",
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010"
},
{
"name" : "http://typo3.org/extensions/repository/view/cwt_feedit",
"refsource" : "CONFIRM",
"url" : "http://typo3.org/extensions/repository/view/cwt_feedit"
},
{ {
"name": "69562", "name": "69562",
"refsource": "BID", "refsource": "BID",
@ -72,10 +62,20 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60888" "url": "http://secunia.com/advisories/60888"
}, },
{
"name": "http://typo3.org/extensions/repository/view/cwt_feedit",
"refsource": "CONFIRM",
"url": "http://typo3.org/extensions/repository/view/cwt_feedit"
},
{ {
"name": "cwtfeedit-unspecified-code-exec(95700)", "name": "cwtfeedit-unspecified-code-exec(95700)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95700" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95700"
},
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010",
"refsource": "MISC",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/34861" "url": "http://www.exploit-db.com/exploits/34861"
}, },
{
"name" : "20141001 CVE-2014-6389 - Remote Command Execution in PHPCompta/NOALYSS",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Oct/7"
},
{ {
"name": "http://packetstormsecurity.com/files/128526/PHPCompta-NOALYSS-6.7.1-5638-Remote-Command-Execution.html", "name": "http://packetstormsecurity.com/files/128526/PHPCompta-NOALYSS-6.7.1-5638-Remote-Command-Execution.html",
"refsource": "MISC", "refsource": "MISC",
@ -71,6 +66,11 @@
"name": "phpcompta-cve20146389-command-exec(96791)", "name": "phpcompta-cve20146389-command-exec(96791)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96791" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96791"
},
{
"name": "20141001 CVE-2014-6389 - Remote Command Execution in PHPCompta/NOALYSS",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Oct/7"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-6478", "ID": "CVE-2014-6478",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", "name": "70489",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" "url": "http://www.securityfocus.com/bid/70489"
}, },
{ {
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698", "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698" "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698"
}, },
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{ {
"name": "SUSE-SU-2015:0743", "name": "SUSE-SU-2015:0743",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
}, },
{ {
"name" : "70489", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/70489" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7375", "ID": "CVE-2014-7375",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{ {
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "VU#281889", "name": "VU#281889",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/281889" "url": "http://www.kb.cert.org/vuls/id/281889"
},
{
"name" : "VU#582497",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/582497"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2017-0455", "ID": "CVE-2017-0455",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-03-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-03-01"
},
{
"name" : "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f"
},
{ {
"name": "96812", "name": "96812",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/96812" "url": "http://www.securityfocus.com/bid/96812"
}, },
{
"name": "https://source.android.com/security/bulletin/2017-03-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01"
},
{ {
"name": "1037968", "name": "1037968",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037968" "url": "http://www.securitytracker.com/id/1037968"
},
{
"name": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2017-0550", "ID": "CVE-2017-0550",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -62,9 +62,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51", "name": "97336",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51" "url": "http://www.securityfocus.com/bid/97336"
}, },
{ {
"name": "https://source.android.com/security/bulletin/2017-04-01", "name": "https://source.android.com/security/bulletin/2017-04-01",
@ -72,9 +72,9 @@
"url": "https://source.android.com/security/bulletin/2017-04-01" "url": "https://source.android.com/security/bulletin/2017-04-01"
}, },
{ {
"name" : "97336", "name": "https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/97336" "url": "https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51"
}, },
{ {
"name": "1038201", "name": "1038201",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2017-0636", "ID": "CVE-2017-0636",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-10-02T00:00:00", "DATE_PUBLIC": "2017-10-02T00:00:00",
"ID": "CVE-2017-0825", "ID": "CVE-2017-0825",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29", "DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000466", "ID": "CVE-2017-1000466",
"REQUESTER": "sajeeb.lohani@bulletproof.sh", "REQUESTER": "sajeeb.lohani@bulletproof.sh",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "invoiceninja", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "<= invoiceninja v3.8.1" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "invoiceninja" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-79" "value": "n/a"
} }
] ]
} }

View File

@ -59,6 +59,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "101663",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101663"
},
{ {
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/122200", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/122200",
"refsource": "MISC", "refsource": "MISC",
@ -68,11 +73,6 @@
"name": "http://www.ibm.com/support/docview.wss?uid=swg21997685", "name": "http://www.ibm.com/support/docview.wss?uid=swg21997685",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21997685" "url": "http://www.ibm.com/support/docview.wss?uid=swg21997685"
},
{
"name" : "101663",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101663"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1822", "ID": "CVE-2017-1822",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4070", "ID": "CVE-2017-4070",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4311", "ID": "CVE-2017-4311",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4434", "ID": "CVE-2017-4434",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.securityfocus.com/archive/1/540338/30/0/threaded",
"refsource" : "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/540338/30/0/threaded"
},
{ {
"name": "97222", "name": "97222",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/97222" "url": "http://www.securityfocus.com/bid/97222"
},
{
"name": "http://www.securityfocus.com/archive/1/540338/30/0/threaded",
"refsource": "CONFIRM",
"url": "http://www.securityfocus.com/archive/1/540338/30/0/threaded"
} }
] ]
} }