"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:42:31 +00:00
parent 35434e0113
commit 0d5f7ed9e8
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 3972 additions and 3972 deletions

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20010410 multiple vulnerabilities in Alcatel Speed Touch DSL modems",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/175229"
},
{
"name" : "CA-2001-08",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2001-08.html"
"name": "2566",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2566"
},
{
"name": "VU#490344",
@ -68,14 +63,19 @@
"url": "http://www.kb.cert.org/vuls/id/490344"
},
{
"name" : "2566",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2566"
"name": "20010410 multiple vulnerabilities in Alcatel Speed Touch DSL modems",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/175229"
},
{
"name": "alcatel-tftp-lan-access(6336)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6336"
},
{
"name": "CA-2001-08",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2001-08.html"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060423 Buffer-overflow and crash in Fenice OMS 1.10",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/431870/100/0/threaded"
},
{
"name" : "20060607 Re: Buffer-overflow and crash in Fenice OMS 1.10",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/436256/100/0/threaded"
},
{
"name" : "20060425 Fenice - Open Media Streaming Server remote BOF exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432002/100/0/threaded"
},
{
"name" : "http://aluigi.altervista.org/adv/fenicex-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/fenicex-adv.txt"
"name": "19770",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19770"
},
{
"name": "17678",
@ -78,20 +63,35 @@
"url": "http://www.securityfocus.com/bid/17678"
},
{
"name" : "ADV-2006-1491",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1491"
"name": "http://aluigi.altervista.org/adv/fenicex-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/fenicex-adv.txt"
},
{
"name" : "19770",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19770"
"name": "20060423 Buffer-overflow and crash in Fenice OMS 1.10",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/431870/100/0/threaded"
},
{
"name": "794",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/794"
},
{
"name": "20060425 Fenice - Open Media Streaming Server remote BOF exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432002/100/0/threaded"
},
{
"name": "ADV-2006-1491",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1491"
},
{
"name": "20060607 Re: Buffer-overflow and crash in Fenice OMS 1.10",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/436256/100/0/threaded"
},
{
"name": "fenice-parseurl-bo(26078)",
"refsource": "XF",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "19659",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19659"
},
{
"name": "http://pridels0.blogspot.com/2006/04/phpmyadmin-xss-vuln.html",
"refsource": "MISC",
@ -62,11 +67,6 @@
"refsource": "CONFIRM",
"url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-2"
},
{
"name" : "19659",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19659"
},
{
"name": "phpmyadmin-index-xss(25954)",
"refsource": "XF",

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432576/100/0/threaded"
},
{
"name" : "http://www.planetc.de/download/planetgallery/planetgallery.html",
"refsource" : "CONFIRM",
"url" : "http://www.planetc.de/download/planetgallery/planetgallery.html"
},
{
"name": "17753",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "825",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/825"
},
{
"name": "http://www.planetc.de/download/planetgallery/planetgallery.html",
"refsource": "CONFIRM",
"url": "http://www.planetc.de/download/planetgallery/planetgallery.html"
}
]
}

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "20060429 I-RATER Platinum Remote File Inclusion exploit Cod3d by R@1D3N",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432596/100/0/threaded"
},
{
"name": "20060428 [Kurdish Secure Advisory #1] I-RATER Platinum \"Admin/configsettings.tpl.php\" Remote File Include Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432404/100/0/threaded"
},
{
"name" : "17731",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17731"
"name": "irater-configsettingtpl-file-include(26203)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26203"
},
{
"name": "20060429 I-RATER Platinum Remote File Inclusion exploit Cod3d by R@1D3N",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432596/100/0/threaded"
},
{
"name": "824",
@ -73,9 +73,9 @@
"url": "http://securityreason.com/securityalert/824"
},
{
"name" : "irater-configsettingtpl-file-include(26203)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26203"
"name": "17731",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17731"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://drupal.org/node/62406",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/node/62406"
},
{
"name": "17885",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17885"
},
{
"name": "drupal-projectmodule-xss(26358)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26358"
},
{
"name": "ADV-2006-1697",
"refsource": "VUPEN",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/19997"
},
{
"name" : "drupal-projectmodule-xss(26358)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26358"
"name": "http://drupal.org/node/62406",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/62406"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2006-3126",
"STATE": "PUBLIC"
},
@ -53,19 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474",
"refsource" : "MISC",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474"
"name": "19801",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19801"
},
{
"name" : "DSA-1165",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1165"
},
{
"name" : "GLSA-200610-05",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200610-05.xml"
"name": "21726",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21726"
},
{
"name": "SUSE-SR:2007:004",
@ -73,9 +68,9 @@
"url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
},
{
"name" : "19801",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19801"
"name": "22450",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22450"
},
{
"name": "ADV-2006-3430",
@ -88,14 +83,19 @@
"url": "http://secunia.com/advisories/21722"
},
{
"name" : "21726",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21726"
"name": "GLSA-200610-05",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200610-05.xml"
},
{
"name" : "22450",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22450"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474"
},
{
"name": "DSA-1165",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1165"
}
]
}

View File

@ -52,35 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "20060711 VBZooM \"sendmail.php\" SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440133/100/0/threaded"
},
{
"name" : "20060711 VBZooM <=V1.11 \" ignore-pm.php\" SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440145/100/0/threaded"
},
{
"name" : "20060711 VBZooM <=V1.11 \" reply.php\" SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440141/100/0/threaded"
},
{
"name" : "20060711 VBZooM <=V1.11 \"sub-join.php\" SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440114/100/0/threaded"
},
{
"name": "20080507 VBZooM <=V1.11 \"reply.php\" SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/491770/100/0/threaded"
},
{
"name" : "18937",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18937"
"name": "20060711 VBZooM \"sendmail.php\" SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440133/100/0/threaded"
},
{
"name": "vbzoom-userid-sql-injection(42254)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42254"
},
{
"name": "28254",
@ -93,9 +78,24 @@
"url": "http://securityreason.com/securityalert/1244"
},
{
"name" : "vbzoom-userid-sql-injection(42254)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42254"
"name": "18937",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18937"
},
{
"name": "20060711 VBZooM <=V1.11 \" reply.php\" SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440141/100/0/threaded"
},
{
"name": "20060711 VBZooM <=V1.11 \" ignore-pm.php\" SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440145/100/0/threaded"
},
{
"name": "20060711 VBZooM <=V1.11 \"sub-join.php\" SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440114/100/0/threaded"
}
]
}

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20061124 Cahier de texte V2.0 SQL Code Execution Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/452600/100/0/threaded"
},
{
"name": "http://acid-root.new.fr/poc/15061124.txt",
"refsource": "MISC",
"url": "http://acid-root.new.fr/poc/15061124.txt"
},
{
"name" : "21283",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21283"
"name": "1961",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1961"
},
{
"name": "ADV-2006-4701",
@ -78,9 +73,14 @@
"url": "http://secunia.com/advisories/23122"
},
{
"name" : "1961",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1961"
"name": "20061124 Cahier de texte V2.0 SQL Code Execution Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/452600/100/0/threaded"
},
{
"name": "21283",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21283"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20061129 New report on Teredo security",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/452989/100/0/threaded"
"name": "http://www.symantec.com/avcenter/reference/Teredo_Security.pdf",
"refsource": "MISC",
"url": "http://www.symantec.com/avcenter/reference/Teredo_Security.pdf"
},
{
"name": "20061129 Re: [Full-disclosure] New report on Teredo security",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/archive/1/452996/100/0/threaded"
},
{
"name" : "http://www.symantec.com/avcenter/reference/Teredo_Security.pdf",
"refsource" : "MISC",
"url" : "http://www.symantec.com/avcenter/reference/Teredo_Security.pdf"
"name": "20061129 New report on Teredo security",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/452989/100/0/threaded"
}
]
}

View File

@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-71/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2006-71/advisory/"
},
{
"name" : "http://www.mailenable.com/hotfix/",
"refsource" : "CONFIRM",
"url" : "http://www.mailenable.com/hotfix/"
},
{
"name" : "21362",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21362"
},
{
"name" : "ADV-2006-4673",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4673"
"name": "1017276",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017276"
},
{
"name": "ADV-2006-4778",
@ -83,29 +63,49 @@
"url": "http://www.vupen.com/english/advisories/2006/4778"
},
{
"name" : "1017276",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017276"
"name": "23080",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23080"
},
{
"name": "21362",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21362"
},
{
"name": "1017319",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017319"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2006-4673",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4673"
},
{
"name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
},
{
"name": "23047",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23047"
},
{
"name" : "23080",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23080"
},
{
"name": "mailenable-meimaps-bo(30614)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
},
{
"name": "http://secunia.com/secunia_research/2006-71/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-71/advisory/"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "21461",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21461"
},
{
"name": "20061206 Multiple Vendor Unusual MIME Encoding Content Filter Bypass",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "http://www.quantenblog.net/security/virus-scanner-bypass",
"refsource": "MISC",
"url": "http://www.quantenblog.net/security/virus-scanner-bypass"
},
{
"name" : "21461",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21461"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "CONFIRM",
"url": "http://www.firebirdsql.org/rlsnotes/Firebird-2.0-ReleaseNotes.pdf"
},
{
"name" : "DSA-1529",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1529"
},
{
"name": "28474",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "29501",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29501"
},
{
"name": "DSA-1529",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1529"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0145",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT4554",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4554"
},
{
"name": "http://support.apple.com/kb/HT4564",
"refsource": "CONFIRM",
@ -77,6 +72,11 @@
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT4554",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4554"
},
{
"name": "APPLE-SA-2011-03-09-2",
"refsource": "APPLE",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0182",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT4581",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4581"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
@ -66,6 +61,11 @@
"name": "8402",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8402"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=67100",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=67100"
"name": "chrome-pdf-pages-code-execution(64666)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64666"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html",
@ -63,9 +63,9 @@
"url": "http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html"
},
{
"name" : "http://www.srware.net/forum/viewtopic.php?f=18&t=2054",
"refsource" : "CONFIRM",
"url" : "http://www.srware.net/forum/viewtopic.php?f=18&t=2054"
"name": "70458",
"refsource": "OSVDB",
"url": "http://osvdb.org/70458"
},
{
"name": "45788",
@ -73,9 +73,14 @@
"url": "http://www.securityfocus.com/bid/45788"
},
{
"name" : "70458",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/70458"
"name": "http://www.srware.net/forum/viewtopic.php?f=18&t=2054",
"refsource": "CONFIRM",
"url": "http://www.srware.net/forum/viewtopic.php?f=18&t=2054"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=67100",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=67100"
},
{
"name": "oval:org.mitre.oval:def:14606",
@ -86,11 +91,6 @@
"name": "42951",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42951"
},
{
"name" : "chrome-pdf-pages-code-execution(64666)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64666"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3369",
"STATE": "PUBLIC"
},
@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110919 CVE Request? etherape remote crash (denial of service)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/09/19/4"
},
{
"name": "[oss-security] 20110922 Re: CVE Request? etherape remote crash (denial of service)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/09/22/1"
},
{
"name" : "http://etherape.sourceforge.net/NEWS.html",
"refsource" : "CONFIRM",
"url" : "http://etherape.sourceforge.net/NEWS.html"
"name": "45989",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45989"
},
{
"name": "[oss-security] 20110919 CVE Request? etherape remote crash (denial of service)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/09/19/4"
},
{
"name": "http://sourceforge.net/tracker/?func=detail&aid=3309061&group_id=2712&atid=102712",
@ -73,9 +73,9 @@
"url": "http://sourceforge.net/tracker/?func=detail&aid=3309061&group_id=2712&atid=102712"
},
{
"name" : "45989",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/45989"
"name": "http://etherape.sourceforge.net/NEWS.html",
"refsource": "CONFIRM",
"url": "http://etherape.sourceforge.net/NEWS.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-3409",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb",
"refsource" : "CONFIRM",
"url" : "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb"
},
{
"name" : "https://puppet.com/security/cve/cve-2011-3869",
"refsource" : "CONFIRM",
"url" : "https://puppet.com/security/cve/cve-2011-3869"
},
{
"name" : "DSA-2314",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2314"
"name": "FEDORA-2011-13633",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html"
},
{
"name": "FEDORA-2011-13623",
@ -73,15 +63,25 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html"
},
{
"name" : "FEDORA-2011-13633",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html"
"name": "DSA-2314",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2314"
},
{
"name": "46458",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46458"
},
{
"name": "FEDORA-2011-13636",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html"
},
{
"name": "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb",
"refsource": "CONFIRM",
"url": "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb"
},
{
"name": "USN-1223-1",
"refsource": "UBUNTU",
@ -93,9 +93,9 @@
"url": "http://www.ubuntu.com/usn/USN-1223-2"
},
{
"name" : "46458",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46458"
"name": "https://puppet.com/security/cve/cve-2011-3869",
"refsource": "CONFIRM",
"url": "https://puppet.com/security/cve/cve-2011-3869"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4324",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20120206 Re: CVE-2011-4324 kernel: nfsv4: mknod(2) DoS",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/02/06/3"
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9"
},
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29",
@ -63,9 +63,9 @@
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9"
"name": "[oss-security] 20120206 Re: CVE-2011-4324 kernel: nfsv4: mknod(2) DoS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/02/06/3"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=755440",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4622",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[kvm] 20111214 [PATCH 1/2] KVM: x86: Prevent starting PIT timers in the absence of irqchip support",
"refsource" : "MLIST",
"url" : "http://permalink.gmane.org/gmane.comp.emulators.kvm.devel/83564"
},
{
"name" : "[oss-security] 20111221 Re: kernel: kvm: pit timer with no irqchip crashes the system",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/12/21/7"
"name": "RHSA-2012:0051",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2012-0051.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=769721",
@ -68,14 +63,19 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769721"
},
{
"name" : "RHSA-2012:0051",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2012-0051.html"
"name": "51172",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/51172"
},
{
"name" : "openSUSE-SU-2013:0925",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
"name": "[oss-security] 20111221 Re: kernel: kvm: pit timer with no irqchip crashes the system",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/12/21/7"
},
{
"name": "[kvm] 20111214 [PATCH 1/2] KVM: x86: Prevent starting PIT timers in the absence of irqchip support",
"refsource": "MLIST",
"url": "http://permalink.gmane.org/gmane.comp.emulators.kvm.devel/83564"
},
{
"name": "SUSE-SU-2012:0616",
@ -83,9 +83,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html"
},
{
"name" : "51172",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/51172"
"name": "openSUSE-SU-2013:0925",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"name": "1026559",

View File

@ -53,44 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20111130 Sql injection in SugarCRM",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/520685/100/0/threaded"
},
{
"name" : "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html",
"refsource" : "MISC",
"url" : "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html"
},
{
"name" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800",
"refsource" : "CONFIRM",
"url" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800"
},
{
"name" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805",
"refsource" : "CONFIRM",
"url" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805"
},
{
"name" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806",
"refsource" : "CONFIRM",
"url" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806"
"name": "sugarcrm-index-sql-injection(71586)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71586"
},
{
"name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47839",
"refsource": "CONFIRM",
"url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47839"
},
{
"name": "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html",
"refsource": "MISC",
"url": "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html"
},
{
"name": "77459",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/77459"
},
{
"name" : "1026369",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1026369"
"name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805",
"refsource": "CONFIRM",
"url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805"
},
{
"name": "47011",
@ -98,9 +83,24 @@
"url": "http://secunia.com/advisories/47011"
},
{
"name" : "sugarcrm-index-sql-injection(71586)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71586"
"name": "1026369",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1026369"
},
{
"name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806",
"refsource": "CONFIRM",
"url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806"
},
{
"name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800",
"refsource": "CONFIRM",
"url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800"
},
{
"name": "20111130 Sql injection in SugarCRM",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520685/100/0/threaded"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4947",
"STATE": "PUBLIC"
},
@ -57,25 +57,25 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/03/28/4"
},
{
"name" : "[oss-security] 20120328 Re: CVE-request: e107 HTB23004",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/03/29/3"
},
{
"name": "https://www.htbridge.com/advisory/multiple_vulnerabilities_in_e107_1.html",
"refsource": "MISC",
"url": "https://www.htbridge.com/advisory/multiple_vulnerabilities_in_e107_1.html"
},
{
"name": "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306",
"refsource": "CONFIRM",
"url": "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306"
},
{
"name": "http://e107.org/svn_changelog.php?version=0.7.26",
"refsource": "CONFIRM",
"url": "http://e107.org/svn_changelog.php?version=0.7.26"
},
{
"name" : "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306",
"refsource" : "CONFIRM",
"url" : "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306"
"name": "[oss-security] 20120328 Re: CVE-request: e107 HTB23004",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/03/29/3"
},
{
"name": "e107-usersextended-xss(68062)",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5806",
"STATE": "PUBLIC"
},
@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBUX02944",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name" : "SUSE-SU-2013:1666",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name" : "openSUSE-SU-2013:1663",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "USN-2089-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name" : "63122",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/63122"
"name": "HPSBUX02944",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name": "openSUSE-SU-2013:1663",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name": "oval:org.mitre.oval:def:18501",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18501"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "63122",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63122"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5883",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name" : "64758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64758"
},
{
"name": "64862",
"refsource": "BID",
@ -76,6 +66,16 @@
"name": "oracle-cpujan2014-cve20135883(90363)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90363"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20130828 Drupal Node View Permissions module and Flag module Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-08/0184.html"
"name": "https://drupal.org/node/2031621",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/2031621"
},
{
"name": "[oss-security] 20130911 Re: CVE request for Drupal contrib modules",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/09/11/9"
},
{
"name" : "https://drupal.org/node/2076315",
"refsource" : "MISC",
"url" : "https://drupal.org/node/2076315"
},
{
"name" : "https://drupal.org/node/2031621",
"refsource" : "CONFIRM",
"url" : "https://drupal.org/node/2031621"
},
{
"name": "54550",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54550"
},
{
"name": "20130828 Drupal Node View Permissions module and Flag module Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0184.html"
},
{
"name": "https://drupal.org/node/2076315",
"refsource": "MISC",
"url": "https://drupal.org/node/2076315"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-2349",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-2355",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-2766",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MS14-035",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
"name": "1030370",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030370"
},
{
"name": "67850",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/67850"
},
{
"name" : "1030370",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030370"
"name": "MS14-035",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "GLSA-201812-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201812-10"
},
{
"name": "https://launchpad.net/bugs/1186676",
"refsource": "MISC",
"url": "https://launchpad.net/bugs/1186676"
},
{
"name": "http://savannah.nongnu.org/bugs/?40023",
"refsource": "MISC",
@ -61,16 +71,6 @@
"name": "https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu",
"refsource": "MISC",
"url": "https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu"
},
{
"name" : "https://launchpad.net/bugs/1186676",
"refsource" : "MISC",
"url" : "https://launchpad.net/bugs/1186676"
},
{
"name" : "GLSA-201812-10",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201812-10"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-6146",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "62190",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62190"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21689082",
"refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04337"
},
{
"name" : "62190",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62190"
},
{
"name": "ibm-sterling-cve20146146-info-disc(96916)",
"refsource": "XF",

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010",
"refsource" : "MISC",
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010"
},
{
"name" : "http://typo3.org/extensions/repository/view/cwt_feedit",
"refsource" : "CONFIRM",
"url" : "http://typo3.org/extensions/repository/view/cwt_feedit"
},
{
"name": "69562",
"refsource": "BID",
@ -72,10 +62,20 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60888"
},
{
"name": "http://typo3.org/extensions/repository/view/cwt_feedit",
"refsource": "CONFIRM",
"url": "http://typo3.org/extensions/repository/view/cwt_feedit"
},
{
"name": "cwtfeedit-unspecified-code-exec(95700)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95700"
},
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010",
"refsource": "MISC",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/34861"
},
{
"name" : "20141001 CVE-2014-6389 - Remote Command Execution in PHPCompta/NOALYSS",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Oct/7"
},
{
"name": "http://packetstormsecurity.com/files/128526/PHPCompta-NOALYSS-6.7.1-5638-Remote-Command-Execution.html",
"refsource": "MISC",
@ -71,6 +66,11 @@
"name": "phpcompta-cve20146389-command-exec(96791)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96791"
},
{
"name": "20141001 CVE-2014-6389 - Remote Command Execution in PHPCompta/NOALYSS",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Oct/7"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-6478",
"STATE": "PUBLIC"
},
@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
"name": "70489",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70489"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name": "SUSE-SU-2015:0743",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
},
{
"name" : "70489",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70489"
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7375",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "VU#281889",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/281889"
},
{
"name" : "VU#582497",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/582497"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0455",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-03-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-03-01"
},
{
"name" : "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f"
},
{
"name": "96812",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96812"
},
{
"name": "https://source.android.com/security/bulletin/2017-03-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01"
},
{
"name": "1037968",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037968"
},
{
"name": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0550",
"STATE": "PUBLIC"
},
@ -62,9 +62,9 @@
"references": {
"reference_data": [
{
"name" : "https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51",
"refsource" : "CONFIRM",
"url" : "https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51"
"name": "97336",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97336"
},
{
"name": "https://source.android.com/security/bulletin/2017-04-01",
@ -72,9 +72,9 @@
"url": "https://source.android.com/security/bulletin/2017-04-01"
},
{
"name" : "97336",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97336"
"name": "https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51"
},
{
"name": "1038201",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0636",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-10-02T00:00:00",
"ID": "CVE-2017-0825",
"STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000466",
"REQUESTER": "sajeeb.lohani@bulletproof.sh",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "invoiceninja",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "<= invoiceninja v3.8.1"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "invoiceninja"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-79"
"value": "n/a"
}
]
}

View File

@ -59,6 +59,11 @@
},
"references": {
"reference_data": [
{
"name": "101663",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101663"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/122200",
"refsource": "MISC",
@ -68,11 +73,6 @@
"name": "http://www.ibm.com/support/docview.wss?uid=swg21997685",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21997685"
},
{
"name" : "101663",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101663"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1822",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4070",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4311",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4434",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.securityfocus.com/archive/1/540338/30/0/threaded",
"refsource" : "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/540338/30/0/threaded"
},
{
"name": "97222",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97222"
},
{
"name": "http://www.securityfocus.com/archive/1/540338/30/0/threaded",
"refsource": "CONFIRM",
"url": "http://www.securityfocus.com/archive/1/540338/30/0/threaded"
}
]
}