"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:58:57 +00:00
parent 2a68a8fa9b
commit 169a19604c
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 4080 additions and 4080 deletions

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "ADV-2006-3569",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3569"
"name": "21862",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21862"
},
{
"name": "28809",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28809"
},
{
"name": "ADV-2006-3569",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3569"
},
{
"name": "28810",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28810"
},
{
"name" : "21862",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21862"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "24842",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24842"
},
{
"name": "3702",
"refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "ADV-2007-1345",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1345"
},
{
"name" : "24842",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24842"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "3935",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3935"
"name": "25303",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25303"
},
{
"name": "24009",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24009"
},
{
"name" : "35520",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35520"
},
{
"name": "ADV-2007-1852",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1852"
},
{
"name" : "25303",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25303"
},
{
"name": "glossword-customvars-file-include(34330)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34330"
},
{
"name": "35520",
"refsource": "OSVDB",
"url": "http://osvdb.org/35520"
},
{
"name": "3935",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3935"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2007-2918",
"STATE": "PUBLIC"
},
@ -57,6 +57,31 @@
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/330289"
},
{
"name": "36821",
"refsource": "OSVDB",
"url": "http://osvdb.org/36821"
},
{
"name": "25514",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25514"
},
{
"name": "36820",
"refsource": "OSVDB",
"url": "http://osvdb.org/36820"
},
{
"name": "36824",
"refsource": "OSVDB",
"url": "http://osvdb.org/36824"
},
{
"name": "logitech-multiple-activex-bo(34658)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34658"
},
{
"name": "24254",
"refsource": "BID",
@ -67,16 +92,6 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2018"
},
{
"name" : "36820",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36820"
},
{
"name" : "36821",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36821"
},
{
"name": "36822",
"refsource": "OSVDB",
@ -86,21 +101,6 @@
"name": "36823",
"refsource": "OSVDB",
"url": "http://osvdb.org/36823"
},
{
"name" : "36824",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36824"
},
{
"name" : "25514",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25514"
},
{
"name" : "logitech-multiple-activex-bo(34658)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34658"
}
]
}

View File

@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "4081",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4081"
},
{
"name": "24546",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24546"
},
{
"name" : "37068",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37068"
},
{
"name" : "37069",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37069"
"name": "jasminecms-news-sql-injection(34936)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34936"
},
{
"name": "ADV-2007-2264",
@ -82,15 +72,25 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25737"
},
{
"name": "37069",
"refsource": "OSVDB",
"url": "http://osvdb.org/37069"
},
{
"name": "4081",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4081"
},
{
"name": "37068",
"refsource": "OSVDB",
"url": "http://osvdb.org/37068"
},
{
"name": "jasminecms-login-code-execution(34937)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34937"
},
{
"name" : "jasminecms-news-sql-injection(34936)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34936"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "4089",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4089"
},
{
"name" : "24581",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24581"
},
{
"name" : "ADV-2007-2291",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2291"
},
{
"name": "36324",
"refsource": "OSVDB",
@ -77,10 +62,25 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25680"
},
{
"name": "4089",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4089"
},
{
"name": "serweb-loadlang-file-include(34973)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34973"
},
{
"name": "ADV-2007-2291",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2291"
},
{
"name": "24581",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24581"
}
]
}

View File

@ -53,84 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html"
},
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2007-02.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2007-02.html"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1498",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1498"
},
{
"name" : "DSA-1322",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1322"
},
{
"name" : "GLSA-200708-12",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200708-12.xml"
},
{
"name" : "MDKSA-2007:145",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:145"
},
{
"name" : "RHSA-2007:0710",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0710.html"
},
{
"name" : "RHSA-2007:0709",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0709.html"
},
{
"name" : "RHSA-2008:0059",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0059.html"
},
{
"name" : "SUSE-SR:2007:015",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"name" : "24662",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24662"
},
{
"name" : "37639",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37639"
},
{
"name" : "oval:org.mitre.oval:def:11010",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11010"
},
{
"name" : "22588",
"name": "25833",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/22588/"
"url": "http://secunia.com/advisories/25833"
},
{
"name" : "ADV-2007-2353",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2353"
},
{
"name" : "1018315",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018315"
"name": "wireshark-dhcpbootp-dos(35113)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35113"
},
{
"name": "25877",
@ -138,34 +68,104 @@
"url": "http://secunia.com/advisories/25877"
},
{
"name" : "26004",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26004"
"name": "RHSA-2008:0059",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0059.html"
},
{
"name" : "25833",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25833"
"name": "http://www.wireshark.org/security/wnpa-sec-2007-02.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2007-02.html"
},
{
"name" : "25987",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25987"
"name": "RHSA-2007:0710",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0710.html"
},
{
"name": "26499",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26499"
},
{
"name": "25987",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25987"
},
{
"name": "26004",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26004"
},
{
"name": "GLSA-200708-12",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200708-12.xml"
},
{
"name": "RHSA-2007:0709",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0709.html"
},
{
"name": "MDKSA-2007:145",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:145"
},
{
"name": "22588",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22588/"
},
{
"name": "1018315",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018315"
},
{
"name": "https://issues.rpath.com/browse/RPL-1498",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1498"
},
{
"name": "24662",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24662"
},
{
"name": "28583",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28583"
},
{
"name" : "wireshark-dhcpbootp-dos(35113)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35113"
"name": "http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html"
},
{
"name": "37639",
"refsource": "OSVDB",
"url": "http://osvdb.org/37639"
},
{
"name": "ADV-2007-2353",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2353"
},
{
"name": "DSA-1322",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1322"
},
{
"name": "SUSE-SR:2007:015",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"name": "oval:org.mitre.oval:def:11010",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11010"
}
]
}

View File

@ -53,99 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070719 Multiple Vendor Multiple Product URI Handler Input Validation Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=565"
},
{
"name" : "20070710 Internet Explorer 0day exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/473276/100/0/threaded"
},
{
"name" : "20070710 Internet Explorer 0day exploit",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0160.html"
},
{
"name" : "http://larholm.com/2007/07/10/internet-explorer-0day-exploit/",
"refsource" : "MISC",
"url" : "http://larholm.com/2007/07/10/internet-explorer-0day-exploit/"
},
{
"name" : "http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html",
"refsource" : "MISC",
"url" : "http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html"
},
{
"name" : "http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/",
"refsource" : "MISC",
"url" : "http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/"
},
{
"name" : "http://msinfluentials.com/blogs/jesper/archive/2007/07/10/blocking-the-firefox-gt-ie-0-day.aspx",
"refsource" : "MISC",
"url" : "http://msinfluentials.com/blogs/jesper/archive/2007/07/10/blocking-the-firefox-gt-ie-0-day.aspx"
},
{
"name" : "http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/",
"refsource" : "MISC",
"url" : "http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/"
},
{
"name" : "http://www.virusbtn.com/news/virus_news/2007/07_11.xml",
"refsource" : "MISC",
"url" : "http://www.virusbtn.com/news/virus_news/2007/07_11.xml"
},
{
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-23.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2007/mfsa2007-23.html"
},
{
"name" : "ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt",
"refsource" : "CONFIRM",
"url" : "ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt"
},
{
"name" : "http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html"
},
{
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-40.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2007/mfsa2007-40.html"
},
{
"name" : "HPSBUX02153",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name" : "HPSBUX02156",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name" : "SSRT061181",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name" : "SSRT061236",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name" : "MDKSA-2007:152",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:152"
},
{
"name" : "SUSE-SA:2007:049",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_49_mozilla.html"
"name": "ADV-2007-2473",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2473"
},
{
"name": "USN-503-1",
@ -153,44 +63,9 @@
"url": "http://www.ubuntu.com/usn/usn-503-1"
},
{
"name" : "TA07-199A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-199A.html"
},
{
"name" : "VU#358017",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/358017"
},
{
"name" : "24837",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24837"
},
{
"name" : "38017",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38017"
},
{
"name" : "ADV-2007-2473",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2473"
},
{
"name" : "ADV-2007-2565",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2565"
},
{
"name" : "ADV-2007-4272",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/4272"
},
{
"name" : "ADV-2008-0082",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0082"
"name": "1018360",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018360"
},
{
"name": "1018351",
@ -198,9 +73,24 @@
"url": "http://www.securitytracker.com/id?1018351"
},
{
"name" : "1018360",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018360"
"name": "HPSBUX02156",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name": "http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/",
"refsource": "MISC",
"url": "http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/"
},
{
"name": "HPSBUX02153",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "MDKSA-2007:152",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:152"
},
{
"name": "25984",
@ -208,54 +98,164 @@
"url": "http://secunia.com/advisories/25984"
},
{
"name" : "26096",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26096"
"name": "ie-firefoxurl-command-execution(35346)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35346"
},
{
"name" : "26149",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26149"
},
{
"name" : "26216",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26216"
},
{
"name" : "26204",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26204"
},
{
"name" : "26271",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26271"
},
{
"name" : "26258",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26258"
},
{
"name" : "26572",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26572"
"name": "TA07-199A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-199A.html"
},
{
"name": "28179",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28179"
},
{
"name": "24837",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24837"
},
{
"name": "http://msinfluentials.com/blogs/jesper/archive/2007/07/10/blocking-the-firefox-gt-ie-0-day.aspx",
"refsource": "MISC",
"url": "http://msinfluentials.com/blogs/jesper/archive/2007/07/10/blocking-the-firefox-gt-ie-0-day.aspx"
},
{
"name": "26216",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26216"
},
{
"name": "SSRT061236",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name": "http://www.virusbtn.com/news/virus_news/2007/07_11.xml",
"refsource": "MISC",
"url": "http://www.virusbtn.com/news/virus_news/2007/07_11.xml"
},
{
"name": "http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/",
"refsource": "MISC",
"url": "http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/"
},
{
"name": "20070719 Multiple Vendor Multiple Product URI Handler Input Validation Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=565"
},
{
"name": "ADV-2007-2565",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2565"
},
{
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-40.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-40.html"
},
{
"name": "26149",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26149"
},
{
"name": "ADV-2008-0082",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0082"
},
{
"name": "38017",
"refsource": "OSVDB",
"url": "http://osvdb.org/38017"
},
{
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-23.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-23.html"
},
{
"name": "VU#358017",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/358017"
},
{
"name": "http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html",
"refsource": "MISC",
"url": "http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html"
},
{
"name": "ADV-2007-4272",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4272"
},
{
"name": "http://larholm.com/2007/07/10/internet-explorer-0day-exploit/",
"refsource": "MISC",
"url": "http://larholm.com/2007/07/10/internet-explorer-0day-exploit/"
},
{
"name": "SUSE-SA:2007:049",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_49_mozilla.html"
},
{
"name": "SSRT061181",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt",
"refsource": "CONFIRM",
"url": "ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt"
},
{
"name": "20070710 Internet Explorer 0day exploit",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0160.html"
},
{
"name": "http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html"
},
{
"name": "26258",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26258"
},
{
"name": "28363",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28363"
},
{
"name" : "ie-firefoxurl-command-execution(35346)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35346"
"name": "20070710 Internet Explorer 0day exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/473276/100/0/threaded"
},
{
"name": "26271",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26271"
},
{
"name": "26204",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26204"
},
{
"name": "26572",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26572"
},
{
"name": "26096",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26096"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "4214",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4214"
},
{
"name": "25025",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "36714",
"refsource": "OSVDB",
"url": "http://osvdb.org/36714"
},
{
"name": "4214",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4214"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20071126 Tilde CMS <= v. 4.x \"aarstal\" parameter of \"yeardetail\" SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/484206/100/0/threaded"
},
{
"name" : "26591",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26591"
"name": "tildecms-aarstal-sql-injection(38647)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38647"
},
{
"name": "3402",
@ -68,9 +63,14 @@
"url": "http://securityreason.com/securityalert/3402"
},
{
"name" : "tildecms-aarstal-sql-injection(38647)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38647"
"name": "26591",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26591"
},
{
"name": "20071126 Tilde CMS <= v. 4.x \"aarstal\" parameter of \"yeardetail\" SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/484206/100/0/threaded"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "webmeetme-play-directory-traversal(38772)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38772"
},
{
"name": "4676",
"refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "26641",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26641"
},
{
"name" : "webmeetme-play-directory-traversal(38772)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38772"
}
]
}

View File

@ -52,16 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "20071204 PR07-39: Multiple vulnerabilities on Absolute News Manager.NET",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=119678724111351&w=2"
},
{
"name": "http://www.procheckup.com/Vulnerability_PR07-39.php",
"refsource": "MISC",
"url": "http://www.procheckup.com/Vulnerability_PR07-39.php"
},
{
"name": "40575",
"refsource": "OSVDB",
"url": "http://osvdb.org/40575"
},
{
"name": "26692",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26692"
},
{
"name": "http://www.xigla.com/news/default.aspx",
"refsource": "MISC",
@ -73,14 +78,9 @@
"url": "http://www.xigla.com/security/ANMNET51-SecurityUpdate20071128.zip"
},
{
"name" : "26692",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26692"
},
{
"name" : "40575",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/40575"
"name": "20071204 PR07-39: Multiple vulnerabilities on Absolute News Manager.NET",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=119678724111351&w=2"
},
{
"name": "27923",

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "HPSBTU02300",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01310389"
},
{
"name" : "SSRT071452",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01310389"
},
{
"name" : "26964",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26964"
},
{
"name": "ADV-2007-4293",
"refsource": "VUPEN",
@ -82,10 +67,25 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28192"
},
{
"name": "HPSBTU02300",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01310389"
},
{
"name": "26964",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26964"
},
{
"name": "hp-ffm-dos(39172)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39172"
},
{
"name": "SSRT071452",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01310389"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.tibco.com/mk/advisory.jsp",
"refsource" : "CONFIRM",
"url" : "http://www.tibco.com/mk/advisory.jsp"
},
{
"name": "http://www.tibco.com/multimedia/security_advisory_runtime_agent_20100113_tcm8-10392.txt",
"refsource": "CONFIRM",
@ -67,15 +62,20 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37805"
},
{
"name": "ADV-2010-0128",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0128"
},
{
"name": "38191",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38191"
},
{
"name" : "ADV-2010-0128",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/0128"
"name": "http://www.tibco.com/mk/advisory.jsp",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/mk/advisory.jsp"
}
]
}

View File

@ -52,36 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27004980",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27004980"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014463"
},
{
"name": "PM18909",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM18909"
},
{
"name" : "PM23874",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PM23874"
},
{
"name" : "43875",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/43875"
},
{
"name": "41722",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41722"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg27004980",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27004980"
},
{
"name": "ADV-2010-2595",
"refsource": "VUPEN",
@ -91,6 +76,21 @@
"name": "was-admin-console-csrf(62949)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62949"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463"
},
{
"name": "PM23874",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM23874"
},
{
"name": "43875",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43875"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "62622",
"refsource": "OSVDB",
"url": "http://osvdb.org/62622"
},
{
"name": "http://bbs.wolvez.org/topic/125/",
"refsource": "MISC",
@ -62,11 +67,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38469"
},
{
"name" : "62622",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/62622"
},
{
"name": "38790",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0082",
"STATE": "PUBLIC"
},
@ -52,36 +52,31 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140218 Denial of Service Vulnerability in Action View when using render :text (CVE-2014-0082)",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2014/02/18/10"
},
{
"name": "[rubyonrails-security] 20140218 Denial of Service Vulnerability in Action View when using render :text (CVE-2014-0082)",
"refsource": "MLIST",
"url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ"
},
{
"name" : "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/",
"refsource" : "CONFIRM",
"url" : "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
},
{
"name" : "https://puppet.com/security/cve/cve-2014-0082",
"refsource" : "CONFIRM",
"url" : "https://puppet.com/security/cve/cve-2014-0082"
},
{
"name": "RHSA-2014:0215",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html"
},
{
"name": "57836",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57836"
},
{
"name": "RHSA-2014:0306",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0306.html"
},
{
"name": "https://puppet.com/security/cve/cve-2014-0082",
"refsource": "CONFIRM",
"url": "https://puppet.com/security/cve/cve-2014-0082"
},
{
"name": "openSUSE-SU-2014:0295",
"refsource": "SUSE",
@ -93,9 +88,14 @@
"url": "http://secunia.com/advisories/57376"
},
{
"name" : "57836",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/57836"
"name": "[oss-security] 20140218 Denial of Service Vulnerability in Action View when using render :text (CVE-2014-0082)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/02/18/10"
},
{
"name": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/",
"refsource": "CONFIRM",
"url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2014-0467",
"STATE": "PUBLIC"
},
@ -52,21 +52,41 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mutt.org/doc/devel/ChangeLog",
"refsource" : "CONFIRM",
"url" : "http://www.mutt.org/doc/devel/ChangeLog"
},
{
"name": "DSA-2874",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2874"
},
{
"name": "USN-2147-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2147-1"
},
{
"name": "RHSA-2014:0304",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0304.html"
},
{
"name": "66165",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66165"
},
{
"name": "http://www.mutt.org/doc/devel/ChangeLog",
"refsource": "CONFIRM",
"url": "http://www.mutt.org/doc/devel/ChangeLog"
},
{
"name": "SUSE-SU-2014:0471",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html"
},
{
"name": "1029919",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029919"
},
{
"name": "openSUSE-SU-2014:0434",
"refsource": "SUSE",
@ -76,26 +96,6 @@
"name": "openSUSE-SU-2014:0436",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00085.html"
},
{
"name" : "SUSE-SU-2014:0471",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html"
},
{
"name" : "USN-2147-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2147-1"
},
{
"name" : "66165",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/66165"
},
{
"name" : "1029919",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029919"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2014-0640",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "rsaarcher-cve20140640-info-disc(95362)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95362"
},
{
"name": "20140819 ESA-2014-071: RSA Archer GRC Platform Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-08/0097.html"
},
{
"name" : "69288",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69288"
},
{
"name": "1030738",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030738"
},
{
"name" : "rsaarcher-cve20140640-info-disc(95362)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95362"
"name": "69288",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69288"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-0862",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21664566",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21664566"
},
{
"name": "ibm-rationalclm-cve20140862-rce(90895)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90895"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21664566",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21664566"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1311",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/kb/HT6537",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT6537"
},
{
"name" : "APPLE-SA-2014-04-01-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html"
},
{
"name": "APPLE-SA-2014-04-22-2",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-04/0136.html"
},
{
"name": "https://support.apple.com/kb/HT6537",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6537"
},
{
"name": "APPLE-SA-2014-04-22-3",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-04/0135.html"
},
{
"name": "APPLE-SA-2014-04-01-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1489",
"STATE": "PUBLIC"
},
@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-10.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-10.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=959531",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=959531"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "GLSA-201504-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-01"
},
{
"name" : "SUSE-SU-2014:0248",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html"
"name": "102874",
"refsource": "OSVDB",
"url": "http://osvdb.org/102874"
},
{
"name": "openSUSE-SU-2014:0212",
@ -83,14 +63,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html"
},
{
"name" : "USN-2102-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2102-1"
"name": "1029717",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029717"
},
{
"name" : "USN-2102-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2102-2"
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-10.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-10.html"
},
{
"name": "65329",
@ -98,14 +78,19 @@
"url": "http://www.securityfocus.com/bid/65329"
},
{
"name" : "102874",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/102874"
"name": "USN-2102-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2102-2"
},
{
"name" : "1029717",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029717"
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "56888",
@ -116,6 +101,21 @@
"name": "firefox-cve20141489-sec-bypass(90888)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90888"
},
{
"name": "SUSE-SU-2014:0248",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=959531",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=959531"
},
{
"name": "USN-2102-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2102-1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1510",
"STATE": "PUBLIC"
},
@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=982906",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=982906"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "DSA-2881",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2881"
"name": "RHSA-2014:0310",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0310.html"
},
{
"name": "DSA-2911",
@ -82,35 +67,15 @@
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name" : "RHSA-2014:0310",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0310.html"
},
{
"name" : "RHSA-2014:0316",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0316.html"
},
{
"name": "SUSE-SU-2014:0418",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html"
},
{
"name" : "openSUSE-SU-2014:0419",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html"
},
{
"name" : "openSUSE-SU-2014:0448",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html"
},
{
"name" : "openSUSE-SU-2014:0584",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html"
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "USN-2151-1",
@ -121,6 +86,41 @@
"name": "66206",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66206"
},
{
"name": "DSA-2881",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2881"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=982906",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=982906"
},
{
"name": "openSUSE-SU-2014:0419",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html"
},
{
"name": "RHSA-2014:0316",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0316.html"
},
{
"name": "openSUSE-SU-2014:0584",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html"
},
{
"name": "openSUSE-SU-2014:0448",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html"
},
{
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-4214",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name": "oracle-cpujul2014-cve20144214(94627)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94627"
},
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
"name": "1030578",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030578"
},
{
"name": "SUSE-SU-2014:1072",
@ -83,19 +83,19 @@
"url": "http://www.securityfocus.com/bid/68607"
},
{
"name" : "1030578",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030578"
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name": "60425",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60425"
},
{
"name" : "oracle-cpujul2014-cve20144214(94627)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/94627"
}
]
}

View File

@ -52,15 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "59772",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59772"
},
{
"name": "[announce] 20140707 [SECURITY] Horde Groupware Webmail Edition 5.1.5 (final)",
"refsource": "MLIST",
"url": "http://lists.horde.org/archives/announce/2014/001025.html"
},
{
"name" : "[announce] 20140707 [SECURITY] IMP 6.1.8 (final)",
"refsource" : "MLIST",
"url" : "http://lists.horde.org/archives/announce/2014/001019.html"
"name": "59770",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59770"
},
{
"name": "https://github.com/horde/horde/blob/4513649810f13a32f1193bdeed76f7d85a5efa05/bundles/webmail/docs/CHANGES",
@ -73,14 +78,9 @@
"url": "https://github.com/horde/horde/blob/c0144ac03814a8c2cf6fc5ac0d1af2653e9ee139/imp/docs/CHANGES"
},
{
"name" : "59770",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59770"
},
{
"name" : "59772",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59772"
"name": "[announce] 20140707 [SECURITY] IMP 6.1.8 (final)",
"refsource": "MLIST",
"url": "http://lists.horde.org/archives/announce/2014/001019.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://xenbits.xen.org/xsa/advisory-102.html",
"refsource" : "CONFIRM",
"url" : "http://xenbits.xen.org/xsa/advisory-102.html"
},
{
"name": "1030724",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030724"
},
{
"name": "http://xenbits.xen.org/xsa/advisory-102.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-102.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2016-3057",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21989578",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21989578"
"name": "94389",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94389"
},
{
"name": "IT15790",
@ -63,9 +63,9 @@
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT15790"
},
{
"name" : "94389",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94389"
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21989578",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21989578"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-3921",
"STATE": "PUBLIC"
},

View File

@ -56,34 +56,34 @@
"references": {
"reference_data": [
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1774161",
"name": "https://security.netapp.com/advisory/ntap-20180614-0002/",
"refsource": "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1774161"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1774166",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1774166"
},
{
"name" : "http://tomcat.apache.org/security-8.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-8.html"
"url": "https://security.netapp.com/advisory/ntap-20180614-0002/"
},
{
"name": "http://tomcat.apache.org/security-9.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-9.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20180614-0002/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20180614-0002/"
},
{
"name": "96895",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96895"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1774161",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1774161"
},
{
"name": "http://tomcat.apache.org/security-8.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-8.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1774166",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1774166"
}
]
}

View File

@ -56,15 +56,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://nifi.apache.org/security.html#CVE-2016-8748",
"refsource" : "CONFIRM",
"url" : "https://nifi.apache.org/security.html#CVE-2016-8748"
},
{
"name": "95621",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95621"
},
{
"name": "https://nifi.apache.org/security.html#CVE-2016-8748",
"refsource": "CONFIRM",
"url": "https://nifi.apache.org/security.html#CVE-2016-8748"
}
]
}

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20161022 Re: jasper: memory allocation failure in jas_malloc (jas_malloc.c)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/10/23/2"
},
{
"name" : "[oss-security] 20161025 Re: Re: jasper: memory allocation failure in jas_malloc (jas_malloc.c)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/10/25/11"
"name": "FEDORA-2016-6c789ba91d",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22FCKKHQCQ3S6TZY5G44EFDTMWOJXJRD/"
},
{
"name": "https://blogs.gentoo.org/ago/2016/10/18/jasper-memory-allocation-failure-in-jas_malloc-jas_malloc-c",
"refsource": "MISC",
"url": "https://blogs.gentoo.org/ago/2016/10/18/jasper-memory-allocation-failure-in-jas_malloc-jas_malloc-c"
},
{
"name": "93839",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93839"
},
{
"name": "[oss-security] 20161025 Re: Re: jasper: memory allocation failure in jas_malloc (jas_malloc.c)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/25/11"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1388880",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388880"
},
{
"name" : "FEDORA-2016-6c789ba91d",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22FCKKHQCQ3S6TZY5G44EFDTMWOJXJRD/"
"name": "[oss-security] 20161022 Re: jasper: memory allocation failure in jas_malloc (jas_malloc.c)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/23/2"
},
{
"name": "FEDORA-2016-e0f0d48142",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EGI2FZQLOTSZI3VA4ECJERI74SMNQDL4/"
},
{
"name" : "93839",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/93839"
}
]
}

View File

@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html",
"refsource" : "CONFIRM",
"url" : "http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html"
},
{
"name" : "https://github.com/python-pillow/Pillow/issues/2105",
"refsource" : "CONFIRM",
"url" : "https://github.com/python-pillow/Pillow/issues/2105"
},
{
"name" : "https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af",
"refsource" : "CONFIRM",
"url" : "https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af"
},
{
"name" : "DSA-3710",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3710"
},
{
"name": "GLSA-201612-52",
"refsource": "GENTOO",
@ -81,6 +61,26 @@
"name": "94234",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94234"
},
{
"name": "https://github.com/python-pillow/Pillow/issues/2105",
"refsource": "CONFIRM",
"url": "https://github.com/python-pillow/Pillow/issues/2105"
},
{
"name": "DSA-3710",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3710"
},
{
"name": "http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html",
"refsource": "CONFIRM",
"url": "http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html"
},
{
"name": "https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af",
"refsource": "CONFIRM",
"url": "https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
"refsource" : "MISC",
"url" : "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
},
{
"name": "94732",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94732"
},
{
"name": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
"refsource": "MISC",
"url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
}
]
}