"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:03:39 +00:00
parent 0c03322d2e
commit 12860897c2
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 4804 additions and 4804 deletions

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060307 Loudblog 0.41 SQL Injection, Local file read/include",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/426973/100/0/threaded"
},
{ {
"name": "http://loudblog.de/forum/viewtopic.php?id=590", "name": "http://loudblog.de/forum/viewtopic.php?id=590",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/17023" "url": "http://www.securityfocus.com/bid/17023"
}, },
{ {
"name" : "ADV-2006-0878", "name": "20060307 Loudblog 0.41 SQL Injection, Local file read/include",
"refsource" : "VUPEN", "refsource": "BUGTRAQ",
"url" : "http://www.vupen.com/english/advisories/2006/0878" "url": "http://www.securityfocus.com/archive/1/426973/100/0/threaded"
},
{
"name": "loudblog-index-directory-traversal(25103)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25103"
}, },
{ {
"name": "19172", "name": "19172",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/19172" "url": "http://secunia.com/advisories/19172"
}, },
{ {
"name" : "loudblog-index-directory-traversal(25103)", "name": "ADV-2006-0878",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25103" "url": "http://www.vupen.com/english/advisories/2006/0878"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060407 SQL Injection in Chipmunk Guestbook", "name": "19584",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/430315/100/0/threaded" "url": "http://secunia.com/advisories/19584"
}, },
{ {
"name": "17483", "name": "17483",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/17483" "url": "http://www.securityfocus.com/bid/17483"
}, },
{
"name": "chipmunk-guestbook-login-sql-injection(25695)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25695"
},
{ {
"name": "ADV-2006-1323", "name": "ADV-2006-1323",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1323" "url": "http://www.vupen.com/english/advisories/2006/1323"
}, },
{ {
"name" : "19584", "name": "20060407 SQL Injection in Chipmunk Guestbook",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/19584" "url": "http://www.securityfocus.com/archive/1/430315/100/0/threaded"
},
{
"name" : "chipmunk-guestbook-login-sql-injection(25695)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25695"
} }
] ]
} }

View File

@ -52,36 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://pridels0.blogspot.com/2006/04/shopweezle-20-multiple-vuln.html",
"refsource" : "MISC",
"url" : "http://pridels0.blogspot.com/2006/04/shopweezle-20-multiple-vuln.html"
},
{
"name" : "17441",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17441"
},
{
"name" : "ADV-2006-1291",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1291"
},
{
"name" : "24470",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24470"
},
{
"name" : "24471",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24471"
},
{
"name" : "24472",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24472"
},
{ {
"name": "24473", "name": "24473",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -93,14 +63,44 @@
"url": "http://secunia.com/advisories/19593" "url": "http://secunia.com/advisories/19593"
}, },
{ {
"name" : "shopweezle-multiple-path-disclosure(25724)", "name": "24472",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25724" "url": "http://www.osvdb.org/24472"
},
{
"name": "17441",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17441"
},
{
"name": "24471",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24471"
},
{
"name": "http://pridels0.blogspot.com/2006/04/shopweezle-20-multiple-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2006/04/shopweezle-20-multiple-vuln.html"
}, },
{ {
"name": "shopweezle-multiple-sql-injection(25723)", "name": "shopweezle-multiple-sql-injection(25723)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25723" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25723"
},
{
"name": "24470",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24470"
},
{
"name": "ADV-2006-1291",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1291"
},
{
"name": "shopweezle-multiple-path-disclosure(25724)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25724"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-1723", "ID": "CVE-2006-1723",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,9 +58,14 @@
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-20.html" "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-20.html"
}, },
{ {
"name" : "DSA-1046", "name": "ADV-2006-3748",
"refsource" : "DEBIAN", "refsource": "VUPEN",
"url" : "http://www.debian.org/security/2006/dsa-1046" "url": "http://www.vupen.com/english/advisories/2006/3748"
},
{
"name": "19941",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19941"
}, },
{ {
"name": "DSA-1051", "name": "DSA-1051",
@ -68,69 +73,44 @@
"url": "http://www.debian.org/security/2006/dsa-1051" "url": "http://www.debian.org/security/2006/dsa-1051"
}, },
{ {
"name" : "HPSBUX02153", "name": "oval:org.mitre.oval:def:1574",
"refsource" : "HP", "refsource": "OVAL",
"url" : "http://www.securityfocus.com/archive/1/446658/100/200/threaded" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1574"
},
{
"name" : "SSRT061181",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name" : "HPSBUX02156",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name" : "SSRT061236",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name" : "SCOSA-2006.26",
"refsource" : "SCO",
"url" : "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt"
},
{
"name" : "VU#350262",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/350262"
},
{
"name" : "17516",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17516"
},
{
"name" : "ADV-2006-1356",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1356"
},
{
"name" : "ADV-2006-3748",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3748"
}, },
{ {
"name": "ADV-2006-3749", "name": "ADV-2006-3749",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3749" "url": "http://www.vupen.com/english/advisories/2006/3749"
}, },
{
"name": "21033",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21033"
},
{
"name": "VU#350262",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/350262"
},
{ {
"name": "ADV-2008-0083", "name": "ADV-2008-0083",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0083" "url": "http://www.vupen.com/english/advisories/2008/0083"
}, },
{ {
"name" : "oval:org.mitre.oval:def:1574", "name": "SSRT061181",
"refsource" : "OVAL", "refsource": "HP",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1574" "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
}, },
{ {
"name" : "1015919", "name": "ADV-2006-1356",
"refsource" : "SECTRACK", "refsource": "VUPEN",
"url" : "http://securitytracker.com/id?1015919" "url": "http://www.vupen.com/english/advisories/2006/1356"
},
{
"name": "SSRT061236",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
}, },
{ {
"name": "1015921", "name": "1015921",
@ -138,14 +118,9 @@
"url": "http://securitytracker.com/id?1015921" "url": "http://securitytracker.com/id?1015921"
}, },
{ {
"name" : "1015920", "name": "HPSBUX02153",
"refsource" : "SECTRACK", "refsource": "HP",
"url" : "http://securitytracker.com/id?1015920" "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name" : "19631",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19631"
}, },
{ {
"name": "19649", "name": "19649",
@ -158,14 +133,34 @@
"url": "http://secunia.com/advisories/19863" "url": "http://secunia.com/advisories/19863"
}, },
{ {
"name" : "19941", "name": "HPSBUX02156",
"refsource" : "SECUNIA", "refsource": "HP",
"url" : "http://secunia.com/advisories/19941" "url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
}, },
{ {
"name" : "21033", "name": "SCOSA-2006.26",
"refsource": "SCO",
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt"
},
{
"name": "17516",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17516"
},
{
"name": "1015919",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015919"
},
{
"name": "22066",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/21033" "url": "http://secunia.com/advisories/22066"
},
{
"name": "1015920",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015920"
}, },
{ {
"name": "22065", "name": "22065",
@ -173,9 +168,14 @@
"url": "http://secunia.com/advisories/22065" "url": "http://secunia.com/advisories/22065"
}, },
{ {
"name" : "22066", "name": "19631",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/22066" "url": "http://secunia.com/advisories/19631"
},
{
"name": "DSA-1046",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1046"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060929 Mercury SiteScope 8.2 (8.1.2.0) Cross Site Scripting (XSS) Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/447397/100/0/threaded"
},
{
"name" : "20275",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20275"
},
{ {
"name": "1670", "name": "1670",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1670" "url": "http://securityreason.com/securityalert/1670"
}, },
{
"name": "20060929 Mercury SiteScope 8.2 (8.1.2.0) Cross Site Scripting (XSS) Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/447397/100/0/threaded"
},
{ {
"name": "mercurysitescope-newmonitor-dos(29298)", "name": "mercurysitescope-newmonitor-dos(29298)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29298" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29298"
},
{
"name": "20275",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20275"
} }
] ]
} }

View File

@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1680",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1680"
},
{ {
"name": "20060930 OlateDownload 3.4.0 Multiple Vulnerabilities", "name": "20060930 OlateDownload 3.4.0 Multiple Vulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/447424/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/447424/100/0/threaded"
}, },
{
"name": "olate-download-detailes-search-sql-injection(29294)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29294"
},
{ {
"name": "20278", "name": "20278",
"refsource": "BID", "refsource": "BID",
@ -66,16 +76,6 @@
"name": "22241", "name": "22241",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22241" "url": "http://secunia.com/advisories/22241"
},
{
"name" : "1680",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1680"
},
{
"name" : "olate-download-detailes-search-sql-injection(29294)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29294"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-5465", "ID": "CVE-2006-5465",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,154 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20061102 Advisory 13/2006: PHP HTML Entity Encoder Heap Overflow Vulnerability", "name": "22881",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/450431/100/0/threaded" "url": "http://secunia.com/advisories/22881"
},
{
"name" : "20061109 rPSA-2006-0205-1 php php-mysql php-pgsql",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/451098/100/0/threaded"
},
{
"name" : "20061129 SYM06-023, Symantec NetBackup PureDisk: PHP update to Address Reported Security Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/453024/100/0/threaded"
},
{
"name" : "http://www.hardened-php.net/advisory_132006.138.html",
"refsource" : "MISC",
"url" : "http://www.hardened-php.net/advisory_132006.138.html"
},
{
"name" : "http://www.php.net/releases/5_2_0.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/releases/5_2_0.php"
},
{
"name" : "http://issues.rpath.com/browse/RPL-761",
"refsource" : "CONFIRM",
"url" : "http://issues.rpath.com/browse/RPL-761"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=304829",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=304829"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm"
},
{
"name" : "APPLE-SA-2006-11-28",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html"
},
{
"name" : "20070425 Cisco Applied Intelligence Response: Identifying and Mitigating Exploitation of the PHP HTML Entity Encoder Heap Overflow Vulnerability in Multiple Web-Based Management Interfaces",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml"
},
{
"name" : "20070425 PHP HTML Entity Encoder Heap Overflow Vulnerability in Multiple Web-Based Management Interfaces",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html"
},
{
"name" : "DSA-1206",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1206"
},
{
"name" : "GLSA-200703-21",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200703-21.xml"
},
{
"name" : "MDKSA-2006:196",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:196"
},
{
"name" : "OpenPKG-SA-2006.028",
"refsource" : "OPENPKG",
"url" : "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html"
},
{
"name" : "RHSA-2006:0730",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0730.html"
},
{
"name" : "RHSA-2006:0736",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2006-0736.html"
},
{
"name" : "RHSA-2006:0731",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0731.html"
},
{
"name" : "20061101-01-P",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P"
},
{
"name" : "SUSE-SA:2006:067",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_67_php.html"
},
{
"name" : "2006-0061",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2006/0061/"
},
{
"name" : "TLSA-2006-38",
"refsource" : "TURBO",
"url" : "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt"
},
{
"name" : "USN-375-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-375-1"
},
{
"name" : "TA06-333A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-333A.html"
},
{
"name" : "20879",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20879"
},
{
"name" : "oval:org.mitre.oval:def:10240",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240"
},
{
"name" : "ADV-2006-4317",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4317"
},
{
"name" : "ADV-2006-4749",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4749"
},
{
"name" : "ADV-2006-4750",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4750"
},
{
"name" : "ADV-2007-1546",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1546"
}, },
{ {
"name": "1017152", "name": "1017152",
@ -208,9 +63,64 @@
"url": "http://securitytracker.com/id?1017152" "url": "http://securitytracker.com/id?1017152"
}, },
{ {
"name" : "1017296", "name": "ADV-2006-4750",
"refsource" : "SECTRACK", "refsource": "VUPEN",
"url" : "http://securitytracker.com/id?1017296" "url": "http://www.vupen.com/english/advisories/2006/4750"
},
{
"name": "ADV-2006-4749",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4749"
},
{
"name": "20061102 Advisory 13/2006: PHP HTML Entity Encoder Heap Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/450431/100/0/threaded"
},
{
"name": "RHSA-2006:0731",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0731.html"
},
{
"name": "22759",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22759"
},
{
"name": "24606",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24606"
},
{
"name": "ADV-2007-1546",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1546"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=304829",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=304829"
},
{
"name": "TLSA-2006-38",
"refsource": "TURBO",
"url": "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt"
},
{
"name": "DSA-1206",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1206"
},
{
"name": "22693",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22693"
},
{
"name": "23247",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23247"
}, },
{ {
"name": "22653", "name": "22653",
@ -223,14 +133,24 @@
"url": "http://secunia.com/advisories/22688" "url": "http://secunia.com/advisories/22688"
}, },
{ {
"name" : "22693", "name": "2006-0061",
"refsource" : "SECUNIA", "refsource": "TRUSTIX",
"url" : "http://secunia.com/advisories/22693" "url": "http://www.trustix.org/errata/2006/0061/"
}, },
{ {
"name" : "22753", "name": "20061129 SYM06-023, Symantec NetBackup PureDisk: PHP update to Address Reported Security Vulnerability",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/22753" "url": "http://www.securityfocus.com/archive/1/453024/100/0/threaded"
},
{
"name": "GLSA-200703-21",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200703-21.xml"
},
{
"name": "20061109 rPSA-2006-0205-1 php php-mysql php-pgsql",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/451098/100/0/threaded"
}, },
{ {
"name": "22713", "name": "22713",
@ -238,19 +158,44 @@
"url": "http://secunia.com/advisories/22713" "url": "http://secunia.com/advisories/22713"
}, },
{ {
"name" : "22759", "name": "22685",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/22759" "url": "http://secunia.com/advisories/22685"
}, },
{ {
"name" : "22929", "name": "ADV-2006-4317",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/22929" "url": "http://www.vupen.com/english/advisories/2006/4317"
}, },
{ {
"name" : "23139", "name": "http://www.hardened-php.net/advisory_132006.138.html",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/23139" "url": "http://www.hardened-php.net/advisory_132006.138.html"
},
{
"name": "20070425 PHP HTML Entity Encoder Heap Overflow Vulnerability in Multiple Web-Based Management Interfaces",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html"
},
{
"name": "http://issues.rpath.com/browse/RPL-761",
"refsource": "CONFIRM",
"url": "http://issues.rpath.com/browse/RPL-761"
},
{
"name": "20061101-01-P",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P"
},
{
"name": "SUSE-SA:2006:067",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_67_php.html"
},
{
"name": "php-htmlentities-bo(29971)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29971"
}, },
{ {
"name": "23155", "name": "23155",
@ -258,29 +203,9 @@
"url": "http://secunia.com/advisories/23155" "url": "http://secunia.com/advisories/23155"
}, },
{ {
"name" : "23247", "name": "MDKSA-2006:196",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/23247" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:196"
},
{
"name" : "22685",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22685"
},
{
"name" : "22779",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22779"
},
{
"name" : "22881",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22881"
},
{
"name" : "24606",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24606"
}, },
{ {
"name": "25047", "name": "25047",
@ -288,9 +213,84 @@
"url": "http://secunia.com/advisories/25047" "url": "http://secunia.com/advisories/25047"
}, },
{ {
"name" : "php-htmlentities-bo(29971)", "name": "1017296",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29971" "url": "http://securitytracker.com/id?1017296"
},
{
"name": "22779",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22779"
},
{
"name": "RHSA-2006:0730",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0730.html"
},
{
"name": "20879",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20879"
},
{
"name": "USN-375-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-375-1"
},
{
"name": "APPLE-SA-2006-11-28",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html"
},
{
"name": "20070425 Cisco Applied Intelligence Response: Identifying and Mitigating Exploitation of the PHP HTML Entity Encoder Heap Overflow Vulnerability in Multiple Web-Based Management Interfaces",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml"
},
{
"name": "TA06-333A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html"
},
{
"name": "OpenPKG-SA-2006.028",
"refsource": "OPENPKG",
"url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html"
},
{
"name": "22929",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22929"
},
{
"name": "22753",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22753"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm"
},
{
"name": "oval:org.mitre.oval:def:10240",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240"
},
{
"name": "23139",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23139"
},
{
"name": "RHSA-2006:0736",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0736.html"
},
{
"name": "http://www.php.net/releases/5_2_0.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/releases/5_2_0.php"
} }
] ]
} }

View File

@ -58,9 +58,14 @@
"url": "http://www.securityfocus.com/archive/1/466649/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/466649/100/0/threaded"
}, },
{ {
"name" : "23593", "name": "tjschat-you-xss(33845)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/23593" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33845"
},
{
"name": "2620",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2620"
}, },
{ {
"name": "ADV-2007-1517", "name": "ADV-2007-1517",
@ -73,14 +78,9 @@
"url": "http://secunia.com/advisories/24998" "url": "http://secunia.com/advisories/24998"
}, },
{ {
"name" : "2620", "name": "23593",
"refsource" : "SREASON", "refsource": "BID",
"url" : "http://securityreason.com/securityalert/2620" "url": "http://www.securityfocus.com/bid/23593"
},
{
"name" : "tjschat-you-xss(33845)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33845"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070424 [MajorSecurity Advisory #46]Plogger - Session fixation Issue", "name": "plogger-phpsessid-weak-security(33863)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/466772/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33863"
}, },
{ {
"name": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls46", "name": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls46",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls46" "url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls46"
}, },
{
"name": "20070424 [MajorSecurity Advisory #46]Plogger - Session fixation Issue",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/466772/100/0/threaded"
},
{ {
"name": "2614", "name": "2614",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2614" "url": "http://securityreason.com/securityalert/2614"
},
{
"name" : "plogger-phpsessid-weak-security(33863)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33863"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-099/" "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-099/"
}, },
{
"name": "37396",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37396"
},
{ {
"name": "HPSBMA02252", "name": "HPSBMA02252",
"refsource": "HP", "refsource": "HP",
@ -67,16 +72,6 @@
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=126106261622540&w=2" "url": "http://marc.info/?l=bugtraq&m=126106261622540&w=2"
}, },
{
"name" : "SSRT061259",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=126106261622540&w=2"
},
{
"name" : "37396",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37396"
},
{ {
"name": "1023361", "name": "1023361",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -86,6 +81,11 @@
"name": "ADV-2009-3594", "name": "ADV-2009-3594",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3594" "url": "http://www.vupen.com/english/advisories/2009/3594"
},
{
"name": "SSRT061259",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=126106261622540&w=2"
} }
] ]
} }

View File

@ -53,20 +53,30 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080212 Adobe Flash Media Server 2 Multiple Integer Overflow Vulnerabilities", "name": "1019399",
"refsource" : "IDEFENSE", "refsource": "SECTRACK",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=662" "url": "http://www.securitytracker.com/id?1019399"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb08-03.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb08-03.html"
}, },
{ {
"name": "http://www.adobe.com/support/security/bulletins/apsb08-04.html", "name": "http://www.adobe.com/support/security/bulletins/apsb08-04.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb08-04.html" "url": "http://www.adobe.com/support/security/bulletins/apsb08-04.html"
}, },
{
"name": "20080212 Adobe Flash Media Server 2 Multiple Integer Overflow Vulnerabilities",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=662"
},
{
"name": "ADV-2008-0539",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0539"
},
{
"name": "28947",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28947"
},
{ {
"name": "27762", "name": "27762",
"refsource": "BID", "refsource": "BID",
@ -78,14 +88,9 @@
"url": "http://www.vupen.com/english/advisories/2008/0538/references" "url": "http://www.vupen.com/english/advisories/2008/0538/references"
}, },
{ {
"name" : "ADV-2008-0539", "name": "adobe-connect-edge-bo(40471)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2008/0539" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40471"
},
{
"name" : "1019399",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019399"
}, },
{ {
"name": "28946", "name": "28946",
@ -93,14 +98,9 @@
"url": "http://secunia.com/advisories/28946" "url": "http://secunia.com/advisories/28946"
}, },
{ {
"name" : "28947", "name": "http://www.adobe.com/support/security/bulletins/apsb08-03.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/28947" "url": "http://www.adobe.com/support/security/bulletins/apsb08-03.html"
},
{
"name" : "adobe-connect-edge-bo(40471)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/40471"
} }
] ]
} }

View File

@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071218 Appian Enterprise Business Suite 5.6 SP1 is",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=119794961212714&w=2"
},
{ {
"name": "26913", "name": "26913",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26913" "url": "http://www.securityfocus.com/bid/26913"
}, },
{ {
"name" : "39500", "name": "20071218 Appian Enterprise Business Suite 5.6 SP1 is",
"refsource" : "OSVDB", "refsource": "FULLDISC",
"url" : "http://www.osvdb.org/39500" "url": "http://marc.info/?l=full-disclosure&m=119794961212714&w=2"
}, },
{ {
"name": "28121", "name": "28121",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28121" "url": "http://secunia.com/advisories/28121"
}, },
{
"name": "39500",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/39500"
},
{ {
"name": "bpms-packet-dos(39145)", "name": "bpms-packet-dos(39145)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-0267", "ID": "CVE-2010-0267",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS10-018",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018"
},
{
"name" : "TA10-068A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-068A.html"
},
{ {
"name": "TA10-089A", "name": "TA10-089A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-089A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA10-089A.html"
}, },
{
"name" : "39023",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39023"
},
{ {
"name": "oval:org.mitre.oval:def:8554", "name": "oval:org.mitre.oval:def:8554",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8554" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8554"
}, },
{ {
"name" : "1023773", "name": "TA10-068A",
"refsource" : "SECTRACK", "refsource": "CERT",
"url" : "http://securitytracker.com/id?1023773" "url": "http://www.us-cert.gov/cas/techalerts/TA10-068A.html"
},
{
"name": "MS10-018",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018"
}, },
{ {
"name": "ADV-2010-0744", "name": "ADV-2010-0744",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0744" "url": "http://www.vupen.com/english/advisories/2010/0744"
},
{
"name": "1023773",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023773"
},
{
"name": "39023",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39023"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-0290", "ID": "CVE-2010-0290",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,75 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=557121",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=557121"
},
{
"name": "ADV-2010-0176",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0176"
},
{
"name": "RHSA-2010:0062",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0062.html"
},
{ {
"name": "[oss-security] 20100119 BIND CVE-2009-4022 fix incomplete", "name": "[oss-security] 20100119 BIND CVE-2009-4022 fix incomplete",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=126393609503704&w=2" "url": "http://marc.info/?l=oss-security&m=126393609503704&w=2"
}, },
{ {
"name" : "[oss-security] 20100120 Re: BIND CVE-2009-4022 fix incomplete", "name": "https://www.isc.org/advisories/CVE-2009-4022v6",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=oss-security&m=126399602810086&w=2" "url": "https://www.isc.org/advisories/CVE-2009-4022v6"
},
{
"name": "38240",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38240"
},
{
"name": "oval:org.mitre.oval:def:6815",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6815"
},
{
"name": "ADV-2010-1352",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1352"
},
{
"name": "USN-888-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-888-1"
},
{
"name": "40086",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40086"
},
{
"name": "ADV-2010-0622",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0622"
},
{
"name": "38219",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38219"
},
{
"name": "MDVSA-2010:021",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:021"
},
{
"name": "oval:org.mitre.oval:def:8884",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8884"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=554851", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=554851",
@ -68,14 +128,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554851" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554851"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=557121", "name": "[oss-security] 20100120 Re: BIND CVE-2009-4022 fix incomplete",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=557121" "url": "http://marc.info/?l=oss-security&m=126399602810086&w=2"
},
{
"name" : "https://www.isc.org/advisories/CVE-2009-4022v6",
"refsource" : "CONFIRM",
"url" : "https://www.isc.org/advisories/CVE-2009-4022v6"
}, },
{ {
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018", "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018",
@ -87,70 +142,15 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2054" "url": "http://www.debian.org/security/2010/dsa-2054"
}, },
{
"name" : "MDVSA-2010:021",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:021"
},
{
"name" : "RHSA-2010:0062",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2010-0062.html"
},
{ {
"name": "SUSE-SA:2010:008", "name": "SUSE-SA:2010:008",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
}, },
{
"name" : "USN-888-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-888-1"
},
{ {
"name": "oval:org.mitre.oval:def:7512", "name": "oval:org.mitre.oval:def:7512",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7512" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7512"
},
{
"name" : "oval:org.mitre.oval:def:8884",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8884"
},
{
"name" : "oval:org.mitre.oval:def:6815",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6815"
},
{
"name" : "38219",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38219"
},
{
"name" : "38240",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38240"
},
{
"name" : "40086",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40086"
},
{
"name" : "ADV-2010-0176",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/0176"
},
{
"name" : "ADV-2010-0622",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/0622"
},
{
"name" : "ADV-2010-1352",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1352"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2010-0449", "ID": "CVE-2010-0449",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,25 +57,25 @@
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=126996774125378&w=2" "url": "http://marc.info/?l=bugtraq&m=126996774125378&w=2"
}, },
{
"name" : "SSRT090222",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=126996774125378&w=2"
},
{
"name" : "39060",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39060"
},
{ {
"name": "1023765", "name": "1023765",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023765" "url": "http://www.securitytracker.com/id?1023765"
}, },
{
"name": "SSRT090222",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=126996774125378&w=2"
},
{ {
"name": "39187", "name": "39187",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39187" "url": "http://secunia.com/advisories/39187"
},
{
"name": "39060",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39060"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-0887", "ID": "CVE-2010-0887",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,31 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0886.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0886.html"
},
{
"name" : "http://support.apple.com/kb/HT4170",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4170"
},
{
"name" : "http://support.apple.com/kb/HT4171",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4171"
},
{ {
"name": "APPLE-SA-2010-05-18-1", "name": "APPLE-SA-2010-05-18-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//May/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2010//May/msg00001.html"
}, },
{
"name" : "APPLE-SA-2010-05-18-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//May/msg00002.html"
},
{ {
"name": "HPSBMU02799", "name": "HPSBMU02799",
"refsource": "HP", "refsource": "HP",
@ -87,6 +67,26 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39819" "url": "http://secunia.com/advisories/39819"
}, },
{
"name": "APPLE-SA-2010-05-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//May/msg00002.html"
},
{
"name": "http://support.apple.com/kb/HT4170",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4170"
},
{
"name": "http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0886.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0886.html"
},
{
"name": "http://support.apple.com/kb/HT4171",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4171"
},
{ {
"name": "ADV-2010-1191", "name": "ADV-2010-1191",
"refsource": "VUPEN", "refsource": "VUPEN",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg24025662", "name": "ADV-2011-0834",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg24025662" "url": "http://www.vupen.com/english/advisories/2011/0834"
},
{
"name" : "IO11279",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1IO11279"
}, },
{ {
"name": "39186", "name": "39186",
@ -73,9 +68,14 @@
"url": "http://www.vupen.com/english/advisories/2010/0733" "url": "http://www.vupen.com/english/advisories/2010/0733"
}, },
{ {
"name" : "ADV-2011-0834", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24025662",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2011/0834" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24025662"
},
{
"name": "IO11279",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IO11279"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.org/1001-exploits/joomlajprojects-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1001-exploits/joomlajprojects-sql.txt"
},
{ {
"name": "10988", "name": "10988",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/10988" "url": "http://www.exploit-db.com/exploits/10988"
}, },
{
"name": "jprojects-index-sql-injection(55361)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55361"
},
{ {
"name": "37608", "name": "37608",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/37608" "url": "http://www.securityfocus.com/bid/37608"
}, },
{
"name": "http://packetstormsecurity.org/1001-exploits/joomlajprojects-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1001-exploits/joomlajprojects-sql.txt"
},
{ {
"name": "ADV-2010-0049", "name": "ADV-2010-0049",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0049" "url": "http://www.vupen.com/english/advisories/2010/0049"
},
{
"name" : "jprojects-index-sql-injection(55361)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55361"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-1391", "ID": "CVE-2010-1391",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://support.apple.com/kb/HT4196", "name": "MDVSA-2011:039",
"refsource" : "CONFIRM", "refsource": "MANDRIVA",
"url" : "http://support.apple.com/kb/HT4196" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
},
{
"name": "ADV-2010-2722",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2722"
},
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "USN-1006-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1006-1"
},
{
"name": "41856",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41856"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
}, },
{ {
"name": "http://support.apple.com/kb/HT4225", "name": "http://support.apple.com/kb/HT4225",
@ -67,80 +92,55 @@
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html"
}, },
{
"name" : "APPLE-SA-2010-06-21-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
},
{
"name" : "MDVSA-2011:039",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
},
{
"name" : "SUSE-SR:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name" : "USN-1006-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1006-1"
},
{
"name" : "40620",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40620"
},
{
"name" : "40753",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40753"
},
{
"name" : "oval:org.mitre.oval:def:7082",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7082"
},
{
"name" : "1024067",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1024067"
},
{ {
"name": "40105", "name": "40105",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40105" "url": "http://secunia.com/advisories/40105"
}, },
{
"name" : "41856",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41856"
},
{
"name" : "43068",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43068"
},
{ {
"name": "ADV-2010-1373", "name": "ADV-2010-1373",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1373" "url": "http://www.vupen.com/english/advisories/2010/1373"
}, },
{ {
"name" : "ADV-2010-2722", "name": "40753",
"refsource" : "VUPEN", "refsource": "BID",
"url" : "http://www.vupen.com/english/advisories/2010/2722" "url": "http://www.securityfocus.com/bid/40753"
}, },
{ {
"name" : "ADV-2011-0212", "name": "SUSE-SR:2011:002",
"refsource" : "VUPEN", "refsource": "SUSE",
"url" : "http://www.vupen.com/english/advisories/2011/0212" "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "oval:org.mitre.oval:def:7082",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7082"
},
{
"name": "40620",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40620"
}, },
{ {
"name": "ADV-2011-0552", "name": "ADV-2011-0552",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0552" "url": "http://www.vupen.com/english/advisories/2011/0552"
},
{
"name": "1024067",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024067"
},
{
"name": "http://support.apple.com/kb/HT4196",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4196"
},
{
"name": "APPLE-SA-2010-06-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "oval:org.mitre.oval:def:12041",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12041"
},
{
"name": "39603",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39603"
},
{
"name": "39544",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39544"
},
{ {
"name": "http://bugs.chromium.org/40136", "name": "http://bugs.chromium.org/40136",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,21 +76,6 @@
"name": "http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html", "name": "http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html" "url": "http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html"
},
{
"name" : "39603",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39603"
},
{
"name" : "oval:org.mitre.oval:def:12041",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12041"
},
{
"name" : "39544",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39544"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "freestylefaqlite-faqid-sql-injection(57588)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57588"
},
{ {
"name": "http://packetstormsecurity.org/1004-exploits/joomlafreestyle-sql.txt", "name": "http://packetstormsecurity.org/1004-exploits/joomlafreestyle-sql.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.org/1004-exploits/joomlafreestyle-sql.txt" "url": "http://packetstormsecurity.org/1004-exploits/joomlafreestyle-sql.txt"
}, },
{
"name" : "12078",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/12078"
},
{ {
"name": "39220", "name": "39220",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/39220" "url": "http://www.securityfocus.com/bid/39220"
}, },
{
"name": "12078",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/12078"
},
{ {
"name": "39288", "name": "39288",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39288" "url": "http://secunia.com/advisories/39288"
},
{
"name" : "freestylefaqlite-faqid-sql-injection(57588)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57588"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ibm-solid-database-server-dos(62590)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62590"
},
{ {
"name": "15261", "name": "15261",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15261" "url": "http://www.exploit-db.com/exploits/15261"
}, },
{
"name" : "http://aluigi.altervista.org/adv/soliddb_1-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/soliddb_1-adv.txt"
},
{
"name" : "1024597",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1024597"
},
{
"name" : "41873",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41873"
},
{ {
"name": "ADV-2010-2715", "name": "ADV-2010-2715",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2715" "url": "http://www.vupen.com/english/advisories/2010/2715"
}, },
{ {
"name" : "ibm-solid-database-server-dos(62590)", "name": "41873",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62590" "url": "http://secunia.com/advisories/41873"
},
{
"name": "1024597",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024597"
},
{
"name": "http://aluigi.altervista.org/adv/soliddb_1-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/soliddb_1-adv.txt"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0109", "ID": "CVE-2014-0109",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://cxf.apache.org/security-advisories.data/CVE-2014-0109.txt.asc?version=1&modificationDate=1398873370740&api=v2",
"refsource" : "CONFIRM",
"url" : "https://cxf.apache.org/security-advisories.data/CVE-2014-0109.txt.asc?version=1&modificationDate=1398873370740&api=v2"
},
{
"name" : "RHSA-2014:1351",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1351.html"
},
{ {
"name": "RHSA-2015:0850", "name": "RHSA-2015:0850",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -72,10 +62,20 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0851.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-0851.html"
}, },
{
"name": "https://cxf.apache.org/security-advisories.data/CVE-2014-0109.txt.asc?version=1&modificationDate=1398873370740&api=v2",
"refsource": "CONFIRM",
"url": "https://cxf.apache.org/security-advisories.data/CVE-2014-0109.txt.asc?version=1&modificationDate=1398873370740&api=v2"
},
{ {
"name": "1030201", "name": "1030201",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030201" "url": "http://www.securitytracker.com/id/1030201"
},
{
"name": "RHSA-2014:1351",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1351.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-0347", "ID": "CVE-2014-0347",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.websense.com/content/mywebsense-hotfixes.aspx?patchid=894&prodidx=20&osidx=0&intidx=0&versionidx=0",
"refsource" : "CONFIRM",
"url" : "https://www.websense.com/content/mywebsense-hotfixes.aspx?patchid=894&prodidx=20&osidx=0&intidx=0&versionidx=0"
},
{ {
"name": "VU#568252", "name": "VU#568252",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/568252" "url": "http://www.kb.cert.org/vuls/id/568252"
},
{
"name": "https://www.websense.com/content/mywebsense-hotfixes.aspx?patchid=894&prodidx=20&osidx=0&intidx=0&versionidx=0",
"refsource": "CONFIRM",
"url": "https://www.websense.com/content/mywebsense-hotfixes.aspx?patchid=894&prodidx=20&osidx=0&intidx=0&versionidx=0"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2014-0531", "ID": "CVE-2014-0531",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://helpx.adobe.com/security/products/flash-player/apsb14-16.html", "name": "67962",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://helpx.adobe.com/security/products/flash-player/apsb14-16.html" "url": "http://www.securityfocus.com/bid/67962"
},
{
"name" : "GLSA-201406-17",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201406-17.xml"
},
{
"name" : "RHSA-2014:0745",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0745.html"
},
{
"name" : "SUSE-SU-2014:0806",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html"
}, },
{ {
"name": "openSUSE-SU-2014:0798", "name": "openSUSE-SU-2014:0798",
@ -83,29 +68,19 @@
"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html"
}, },
{ {
"name" : "67962", "name": "http://helpx.adobe.com/security/products/flash-player/apsb14-16.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/67962" "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-16.html"
}, },
{ {
"name" : "1030368", "name": "RHSA-2014:0745",
"refsource" : "SECTRACK", "refsource": "REDHAT",
"url" : "http://www.securitytracker.com/id/1030368" "url": "http://rhn.redhat.com/errata/RHSA-2014-0745.html"
}, },
{ {
"name" : "58390", "name": "59304",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/58390" "url": "http://secunia.com/advisories/59304"
},
{
"name" : "58465",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/58465"
},
{
"name" : "58585",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/58585"
}, },
{ {
"name": "59053", "name": "59053",
@ -113,9 +88,34 @@
"url": "http://secunia.com/advisories/59053" "url": "http://secunia.com/advisories/59053"
}, },
{ {
"name" : "59304", "name": "58465",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/59304" "url": "http://secunia.com/advisories/58465"
},
{
"name": "1030368",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030368"
},
{
"name": "SUSE-SU-2014:0806",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html"
},
{
"name": "58585",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58585"
},
{
"name": "58390",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58390"
},
{
"name": "GLSA-201406-17",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-17.xml"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2014-0569", "ID": "CVE-2014-0569",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,36 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "openSUSE-SU-2014:1329",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html"
},
{
"name": "70441",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70441"
},
{
"name": "61980",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61980"
},
{
"name": "SUSE-SU-2014:1360",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html"
},
{
"name": "RHSA-2014:1648",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1648.html"
},
{
"name": "1031019",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031019"
},
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-14-365/", "name": "http://www.zerodayinitiative.com/advisories/ZDI-14-365/",
"refsource": "MISC", "refsource": "MISC",
@ -62,40 +92,10 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-22.html" "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-22.html"
}, },
{
"name" : "RHSA-2014:1648",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1648.html"
},
{
"name" : "SUSE-SU-2014:1360",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html"
},
{
"name" : "openSUSE-SU-2014:1329",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html"
},
{ {
"name": "openSUSE-SU-2015:0725", "name": "openSUSE-SU-2015:0725",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html"
},
{
"name" : "70441",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70441"
},
{
"name" : "1031019",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031019"
},
{
"name" : "61980",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/61980"
} }
] ]
} }

View File

@ -52,41 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20140311 CORE-2014-0002 - Oracle VirtualBox 3D Acceleration Multiple Memory Corruption Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/531418/100/0/threaded"
},
{ {
"name": "32208", "name": "32208",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/32208" "url": "http://www.exploit-db.com/exploits/32208"
}, },
{
"name" : "20140311 CORE-2014-0002 - Oracle VirtualBox 3D Acceleration Multiple Memory Corruption Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Mar/95"
},
{
"name" : "http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities",
"refsource" : "MISC",
"url" : "http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities"
},
{
"name" : "https://www.virtualbox.org/changeset/50437/vbox",
"refsource" : "CONFIRM",
"url" : "https://www.virtualbox.org/changeset/50437/vbox"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
},
{
"name" : "DSA-2904",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2904"
},
{ {
"name": "GLSA-201612-27", "name": "GLSA-201612-27",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -96,6 +66,36 @@
"name": "57384", "name": "57384",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57384" "url": "http://secunia.com/advisories/57384"
},
{
"name": "20140311 CORE-2014-0002 - Oracle VirtualBox 3D Acceleration Multiple Memory Corruption Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531418/100/0/threaded"
},
{
"name": "DSA-2904",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2904"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
},
{
"name": "https://www.virtualbox.org/changeset/50437/vbox",
"refsource": "CONFIRM",
"url": "https://www.virtualbox.org/changeset/50437/vbox"
},
{
"name": "20140311 CORE-2014-0002 - Oracle VirtualBox 3D Acceleration Multiple Memory Corruption Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Mar/95"
},
{
"name": "http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities",
"refsource": "MISC",
"url": "http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities"
} }
] ]
} }

View File

@ -58,19 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2014/01/17/8" "url": "http://www.openwall.com/lists/oss-security/2014/01/17/8"
}, },
{ {
"name" : "[oss-security] 20140117 Re: Fwd: [Python-modules-team] Bug#735263: python-rply: insecure use of /tmp", "name": "rply-cve20141604-insecure-permissions(90593)",
"refsource" : "MLIST", "refsource": "XF",
"url" : "http://www.openwall.com/lists/oss-security/2014/01/18/4" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90593"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263"
},
{
"name" : "https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c",
"refsource" : "CONFIRM",
"url" : "https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c"
}, },
{ {
"name": "102202", "name": "102202",
@ -83,9 +73,19 @@
"url": "http://secunia.com/advisories/56429" "url": "http://secunia.com/advisories/56429"
}, },
{ {
"name" : "rply-cve20141604-insecure-permissions(90593)", "name": "https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90593" "url": "https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263"
},
{
"name": "[oss-security] 20140117 Re: Fwd: [Python-modules-team] Bug#735263: python-rply: insecure use of /tmp",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/01/18/4"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-1759", "ID": "CVE-2014-1759",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "103197",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/103197"
},
{
"name": "65469",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65469"
},
{ {
"name": "31579", "name": "31579",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -61,16 +71,6 @@
"name": "20140210 Titan FTP Server Directory Traversal Vulnerabilities - [CVE-2014-1841 / CVE-2014-1842 / CVE-2014-1843]", "name": "20140210 Titan FTP Server Directory Traversal Vulnerabilities - [CVE-2014-1841 / CVE-2014-1842 / CVE-2014-1843]",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0092.html" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0092.html"
},
{
"name" : "65469",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/65469"
},
{
"name" : "103197",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/103197"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-4097", "ID": "CVE-2014-4097",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS14-052",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052"
},
{ {
"name": "69605", "name": "69605",
"refsource": "BID", "refsource": "BID",
@ -67,6 +62,11 @@
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030818" "url": "http://www.securitytracker.com/id/1030818"
}, },
{
"name": "MS14-052",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052"
},
{ {
"name": "ms-ie-cve20144097-code-exec(95527)", "name": "ms-ie-cve20144097-code-exec(95527)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-4130", "ID": "CVE-2014-4130",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS14-056", "name": "60968",
"refsource" : "MS", "refsource": "SECUNIA",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056" "url": "http://secunia.com/advisories/60968"
}, },
{ {
"name": "70332", "name": "70332",
@ -68,9 +68,9 @@
"url": "http://www.securitytracker.com/id/1031018" "url": "http://www.securitytracker.com/id/1031018"
}, },
{ {
"name" : "60968", "name": "MS14-056",
"refsource" : "SECUNIA", "refsource": "MS",
"url" : "http://secunia.com/advisories/60968" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-4134", "ID": "CVE-2014-4134",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS14-056",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056"
},
{ {
"name": "70336", "name": "70336",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/70336" "url": "http://www.securityfocus.com/bid/70336"
}, },
{
"name": "60968",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60968"
},
{ {
"name": "1031018", "name": "1031018",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031018" "url": "http://www.securitytracker.com/id/1031018"
}, },
{ {
"name" : "60968", "name": "MS14-056",
"refsource" : "SECUNIA", "refsource": "MS",
"url" : "http://secunia.com/advisories/60968" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-4402", "ID": "CVE-2014-4402",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,6 +57,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://code.google.com/p/google-security-research/issues/detail?id=33" "url": "https://code.google.com/p/google-security-research/issues/detail?id=33"
}, },
{
"name": "1030868",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030868"
},
{ {
"name": "http://support.apple.com/kb/HT6443", "name": "http://support.apple.com/kb/HT6443",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,11 +72,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/69925" "url": "http://www.securityfocus.com/bid/69925"
}, },
{
"name" : "1030868",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030868"
},
{ {
"name": "macosx-cve20144402-code-exec(96063)", "name": "macosx-cve20144402-code-exec(96063)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://codevigilant.com/disclosure/wp-plugin-wpsnapapp-a3-cross-site-scripting-xss",
"refsource" : "MISC",
"url" : "http://codevigilant.com/disclosure/wp-plugin-wpsnapapp-a3-cross-site-scripting-xss"
},
{ {
"name": "68433", "name": "68433",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/68433" "url": "http://www.securityfocus.com/bid/68433"
},
{
"name": "http://codevigilant.com/disclosure/wp-plugin-wpsnapapp-a3-cross-site-scripting-xss",
"refsource": "MISC",
"url": "http://codevigilant.com/disclosure/wp-plugin-wpsnapapp-a3-cross-site-scripting-xss"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-4803", "ID": "CVE-2014-4803",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21695925",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21695925"
},
{ {
"name": "ibm-curam-cve20144803-crlf(95305)", "name": "ibm-curam-cve20144803-crlf(95305)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95305" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95305"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21695925",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695925"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2014-9479", "ID": "CVE-2014-9479",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13"
}, },
{ {
"name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2"
}, },
{
"name" : "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/01/03/13"
},
{ {
"name": "https://phabricator.wikimedia.org/T76195", "name": "https://phabricator.wikimedia.org/T76195",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://phabricator.wikimedia.org/T76195" "url": "https://phabricator.wikimedia.org/T76195"
},
{
"name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23",
"refsource": "MLIST",
"url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2014-9769", "ID": "CVE-2014-9769",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160326 CVE Request: pcre: Segmentation fault on certain input to regular expressions with nested alternatives when JIT is used",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/03/26/1"
},
{ {
"name": "http://vcs.pcre.org/pcre?view=revision&revision=1475", "name": "http://vcs.pcre.org/pcre?view=revision&revision=1475",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://vcs.pcre.org/pcre?view=revision&revision=1475" "url": "http://vcs.pcre.org/pcre?view=revision&revision=1475"
}, },
{
"name" : "https://bugs.debian.org/819050",
"refsource" : "CONFIRM",
"url" : "https://bugs.debian.org/819050"
},
{
"name" : "https://redmine.openinfosecfoundation.org/issues/1693",
"refsource" : "CONFIRM",
"url" : "https://redmine.openinfosecfoundation.org/issues/1693"
},
{ {
"name": "85570", "name": "85570",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/85570" "url": "http://www.securityfocus.com/bid/85570"
}, },
{
"name": "https://redmine.openinfosecfoundation.org/issues/1693",
"refsource": "CONFIRM",
"url": "https://redmine.openinfosecfoundation.org/issues/1693"
},
{ {
"name": "1035424", "name": "1035424",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035424" "url": "http://www.securitytracker.com/id/1035424"
},
{
"name": "[oss-security] 20160326 CVE Request: pcre: Segmentation fault on certain input to regular expressions with nested alternatives when JIT is used",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/03/26/1"
},
{
"name": "https://bugs.debian.org/819050",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/819050"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3099", "ID": "CVE-2016-3099",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1319052",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1319052"
},
{
"name" : "FEDORA-2016-1eaaf1ed0f",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184345.html"
},
{ {
"name": "FEDORA-2016-85e9f2e3cd", "name": "FEDORA-2016-85e9f2e3cd",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183102.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183102.html"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1319052",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319052"
},
{ {
"name": "FEDORA-2016-8b28358b72", "name": "FEDORA-2016-8b28358b72",
"refsource": "FEDORA", "refsource": "FEDORA",
@ -76,6 +71,11 @@
"name": "RHSA-2016:2602", "name": "RHSA-2016:2602",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2602.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2602.html"
},
{
"name": "FEDORA-2016-1eaaf1ed0f",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184345.html"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://www.drupal.org/node/2679215",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2679215"
},
{ {
"name": "https://www.drupal.org/node/2679503", "name": "https://www.drupal.org/node/2679503",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "http://cgit.drupalcode.org/prepopulate/commit/prepopulate.module?id=16cdb63cc3b256dd785e029ec17f92ddf80cc443", "name": "http://cgit.drupalcode.org/prepopulate/commit/prepopulate.module?id=16cdb63cc3b256dd785e029ec17f92ddf80cc443",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://cgit.drupalcode.org/prepopulate/commit/prepopulate.module?id=16cdb63cc3b256dd785e029ec17f92ddf80cc443" "url": "http://cgit.drupalcode.org/prepopulate/commit/prepopulate.module?id=16cdb63cc3b256dd785e029ec17f92ddf80cc443"
},
{
"name" : "https://www.drupal.org/node/2679215",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/node/2679215"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://docs.ceph.com/docs/master/release-notes/#v10-0-1", "name": "93240",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://docs.ceph.com/docs/master/release-notes/#v10-0-1" "url": "http://www.securityfocus.com/bid/93240"
},
{
"name" : "http://tracker.ceph.com/issues/13207",
"refsource" : "CONFIRM",
"url" : "http://tracker.ceph.com/issues/13207"
}, },
{ {
"name": "https://github.com/ceph/ceph/pull/6057", "name": "https://github.com/ceph/ceph/pull/6057",
@ -72,15 +67,20 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1972.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-1972.html"
}, },
{
"name": "http://docs.ceph.com/docs/master/release-notes/#v10-0-1",
"refsource": "CONFIRM",
"url": "http://docs.ceph.com/docs/master/release-notes/#v10-0-1"
},
{ {
"name": "RHSA-2016:1973", "name": "RHSA-2016:1973",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1973.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-1973.html"
}, },
{ {
"name" : "93240", "name": "http://tracker.ceph.com/issues/13207",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/93240" "url": "http://tracker.ceph.com/issues/13207"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/exponentcms/exponent-cms/commit/c1092f167cc6c78dc8bf9bf149946c5219413df3",
"refsource" : "CONFIRM",
"url" : "https://github.com/exponentcms/exponent-cms/commit/c1092f167cc6c78dc8bf9bf149946c5219413df3"
},
{ {
"name": "https://github.com/exponentcms/exponent-cms/releases/tag/v2.4.0", "name": "https://github.com/exponentcms/exponent-cms/releases/tag/v2.4.0",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "93045", "name": "93045",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/93045" "url": "http://www.securityfocus.com/bid/93045"
},
{
"name": "https://github.com/exponentcms/exponent-cms/commit/c1092f167cc6c78dc8bf9bf149946c5219413df3",
"refsource": "CONFIRM",
"url": "https://github.com/exponentcms/exponent-cms/commit/c1092f167cc6c78dc8bf9bf149946c5219413df3"
} }
] ]
} }

View File

@ -58,14 +58,9 @@
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-619" "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-619"
}, },
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html", "name": "SUSE-SU-2016:3148",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
},
{
"name" : "GLSA-201701-17",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-17"
}, },
{ {
"name": "MS16-154", "name": "MS16-154",
@ -73,19 +68,9 @@
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
}, },
{ {
"name" : "RHSA-2016:2947", "name": "GLSA-201701-17",
"refsource" : "REDHAT", "refsource": "GENTOO",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2947.html" "url": "https://security.gentoo.org/glsa/201701-17"
},
{
"name" : "SUSE-SU-2016:3148",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
},
{
"name" : "openSUSE-SU-2016:3160",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
}, },
{ {
"name": "94873", "name": "94873",
@ -96,6 +81,21 @@
"name": "1037442", "name": "1037442",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037442" "url": "http://www.securitytracker.com/id/1037442"
},
{
"name": "RHSA-2016:2947",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
},
{
"name": "openSUSE-SU-2016:3160",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "DSA-3746",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3746"
},
{ {
"name": "[oss-security] 20161007 GraphicsMagick CVE Request - WPG Reader Issues", "name": "[oss-security] 20161007 GraphicsMagick CVE Request - WPG Reader Issues",
"refsource": "MLIST", "refsource": "MLIST",
@ -62,11 +67,6 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/08/5" "url": "http://www.openwall.com/lists/oss-security/2016/10/08/5"
}, },
{
"name" : "DSA-3746",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3746"
},
{ {
"name": "93467", "name": "93467",
"refsource": "BID", "refsource": "BID",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8252", "ID": "CVE-2016-8252",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -55,25 +55,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
},
{ {
"name": "GLSA-201702-17", "name": "GLSA-201702-17",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-17" "url": "https://security.gentoo.org/glsa/201702-17"
}, },
{
"name": "1037640",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037640"
},
{ {
"name": "95580", "name": "95580",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95580" "url": "http://www.securityfocus.com/bid/95580"
}, },
{ {
"name" : "1037640", "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1037640" "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8556", "ID": "CVE-2016-8556",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-8667", "ID": "CVE-2016-8667",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20161014 CVE request Qemu: dma: rc4030 divide by zero error in set_next_tick",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/10/14/6"
},
{ {
"name": "[oss-security] 20161015 Re: CVE request Qemu: dma: rc4030 divide by zero error in set_next_tick", "name": "[oss-security] 20161015 Re: CVE request Qemu: dma: rc4030 divide by zero error in set_next_tick",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/15/4" "url": "http://www.openwall.com/lists/oss-security/2016/10/15/4"
}, },
{
"name" : "[qemu-devel] 20161012 [PATCH] dma: rc4030: limit interval timer reload value",
"refsource" : "MLIST",
"url" : "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02577.html"
},
{ {
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update", "name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html" "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
}, },
{
"name": "93567",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93567"
},
{
"name": "[qemu-devel] 20161012 [PATCH] dma: rc4030: limit interval timer reload value",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02577.html"
},
{ {
"name": "openSUSE-SU-2016:3237", "name": "openSUSE-SU-2016:3237",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html"
}, },
{ {
"name" : "93567", "name": "[oss-security] 20161014 CVE request Qemu: dma: rc4030 divide by zero error in set_next_tick",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/93567" "url": "http://www.openwall.com/lists/oss-security/2016/10/14/6"
} }
] ]
} }