"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 06:55:29 +00:00
parent 2912cd17bd
commit 17c2a5c751
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
53 changed files with 3688 additions and 3688 deletions

View File

@ -53,40 +53,20 @@
"references": {
"reference_data": [
{
"name" : "20010330 Incorrect MIME Header Can Cause IE to Execute E-mail Attachment",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=98596775905044&w=2"
"name": "CA-2001-06",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2001-06.html"
},
{
"name": "MS01-020",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-020"
},
{
"name" : "CA-2001-06",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2001-06.html"
},
{
"name" : "L-066",
"refsource" : "CIAC",
"url" : "http://www.ciac.org/ciac/bulletins/l-066.shtml"
},
{
"name": "2524",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2524"
},
{
"name" : "7806",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/7806"
},
{
"name" : "oval:org.mitre.oval:def:141",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A141"
},
{
"name": "1001197",
"refsource": "SECTRACK",
@ -96,6 +76,26 @@
"name": "ie-mime-execute-code(6306)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6306"
},
{
"name": "L-066",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/l-066.shtml"
},
{
"name": "oval:org.mitre.oval:def:141",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A141"
},
{
"name": "20010330 Incorrect MIME Header Can Cause IE to Execute E-mail Attachment",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=98596775905044&w=2"
},
{
"name": "7806",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/7806"
}
]
}

View File

@ -53,8 +53,8 @@
"references": {
"reference_data": [
{
"name" : "20010503 Cisco Catalyst 2900XL crashes with empty UDP packet when SNMP is disabled. ",
"refsource": "BUGTRAQ",
"name": "20010503 Cisco Catalyst 2900XL crashes with empty UDP packet when SNMP is disabled.",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-05/0040.html"
},
{

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "3275",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/3275"
},
{
"name": "20011127 UNICOS LOCAL HOLE ALL VERSIONS",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=100695627423924&w=2"
},
{
"name" : "20020101-01-I",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20020101-01-I"
},
{
"name": "3590",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3590"
},
{
"name" : "3275",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/3275"
},
{
"name": "unicos-nqsd-format-string(7618)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7618"
},
{
"name": "20020101-01-I",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20020101-01-I"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "VU#276944",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/276944"
"name": "3038",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3038"
},
{
"name": "CA-2001-18",
@ -67,11 +67,6 @@
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20011102-01-I"
},
{
"name" : "http://www.kb.cert.org/vuls/id/JPLA-4WESMM",
"refsource" : "MISC",
"url" : "http://www.kb.cert.org/vuls/id/JPLA-4WESMM"
},
{
"name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/ldapv3/",
"refsource": "MISC",
@ -83,9 +78,14 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6893"
},
{
"name" : "3038",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/3038"
"name": "VU#276944",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/276944"
},
{
"name": "http://www.kb.cert.org/vuls/id/JPLA-4WESMM",
"refsource": "MISC",
"url": "http://www.kb.cert.org/vuls/id/JPLA-4WESMM"
}
]
}

View File

@ -53,34 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060515 Newsportal: code injection vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-05/0308.html"
},
{
"name" : "20060517 Newsportal <= 0.36 Remote File Inclusion Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-05/0325.html"
},
{
"name" : "1789",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1789"
},
{
"name" : "http://florian-amrhein.de/newsportal/forum/article?id=1&group=amrhein.newsportal",
"refsource" : "CONFIRM",
"url" : "http://florian-amrhein.de/newsportal/forum/article?id=1&group=amrhein.newsportal"
},
{
"name" : "18000",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18000"
},
{
"name" : "ADV-2006-1838",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1838"
"name": "trnewsportal-poll-file-include(26439)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26439"
},
{
"name": "25531",
@ -88,24 +63,19 @@
"url": "http://www.osvdb.org/25531"
},
{
"name" : "25577",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/25577"
"name": "18000",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18000"
},
{
"name" : "20119",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20119"
"name": "20060515 Newsportal: code injection vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-05/0308.html"
},
{
"name" : "20128",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20128"
},
{
"name" : "947",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/947"
"name": "http://florian-amrhein.de/newsportal/forum/article?id=1&group=amrhein.newsportal",
"refsource": "CONFIRM",
"url": "http://florian-amrhein.de/newsportal/forum/article?id=1&group=amrhein.newsportal"
},
{
"name": "newsportal-poll-code-execution(26471)",
@ -113,9 +83,39 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26471"
},
{
"name" : "trnewsportal-poll-file-include(26439)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26439"
"name": "947",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/947"
},
{
"name": "1789",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1789"
},
{
"name": "25577",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25577"
},
{
"name": "20128",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20128"
},
{
"name": "ADV-2006-1838",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1838"
},
{
"name": "20119",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20119"
},
{
"name": "20060517 Newsportal <= 0.36 Remote File Inclusion Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-05/0325.html"
}
]
}

View File

@ -53,64 +53,64 @@
"references": {
"reference_data": [
{
"name" : "20060528 Advisory: phpBB 2.x (Activity MOD Plus) File InclusionVulnerability.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/435286/100/0/threaded"
"name": "http://www.nukedx.com/?viewdoc=38",
"refsource": "MISC",
"url": "http://www.nukedx.com/?viewdoc=38"
},
{
"name": "20060529 RE: Advisory: Blend Portal <= 1.2.0 for phpBB 2.x(blend_data/blend_common.php) File Inclusion Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435298/100/0/threaded"
},
{
"name" : "20060528 Advisory: phpBB 2.x (Activity MOD Plus) File Inclusion Vulnerability.",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0709.html"
},
{
"name" : "http://www.nukedx.com/?getxpl=38",
"refsource" : "MISC",
"url" : "http://www.nukedx.com/?getxpl=38"
},
{
"name" : "http://www.nukedx.com/?viewdoc=38",
"refsource" : "MISC",
"url" : "http://www.nukedx.com/?viewdoc=38"
},
{
"name": "http://phpbb-tweaks.com/topics.html-p-17623#17623",
"refsource": "CONFIRM",
"url": "http://phpbb-tweaks.com/topics.html-p-17623#17623"
},
{
"name" : "18155",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18155"
},
{
"name" : "ADV-2006-2045",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2045"
},
{
"name" : "25821",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/25821"
},
{
"name" : "20354",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20354"
},
{
"name": "1001",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1001"
},
{
"name": "20060528 Advisory: phpBB 2.x (Activity MOD Plus) File Inclusion Vulnerability.",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0709.html"
},
{
"name": "18155",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18155"
},
{
"name": "25821",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25821"
},
{
"name": "activitymodplus-multiple-file-include(26857)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26857"
},
{
"name": "20060528 Advisory: phpBB 2.x (Activity MOD Plus) File InclusionVulnerability.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435286/100/0/threaded"
},
{
"name": "ADV-2006-2045",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2045"
},
{
"name": "20354",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20354"
},
{
"name": "http://www.nukedx.com/?getxpl=38",
"refsource": "MISC",
"url": "http://www.nukedx.com/?getxpl=38"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1",
"refsource" : "CONFIRM",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1"
},
{
"name" : "243806",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1"
},
{
"name" : "32213",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32213"
"name": "ADV-2008-3088",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3088"
},
{
"name": "oval:org.mitre.oval:def:5668",
@ -73,14 +63,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5668"
},
{
"name" : "ADV-2008-3088",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3088"
"name": "sun-solaris-dhcp-code-execution(46480)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46480"
},
{
"name" : "1021157",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1021157"
"name": "243806",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1"
},
{
"name": "32668",
@ -88,9 +78,19 @@
"url": "http://secunia.com/advisories/32668"
},
{
"name" : "sun-solaris-dhcp-code-execution(46480)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46480"
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1",
"refsource": "CONFIRM",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1"
},
{
"name": "1021157",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021157"
},
{
"name": "32213",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32213"
}
]
}

View File

@ -52,120 +52,120 @@
},
"references": {
"reference_data": [
{
"name": "32998",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32998"
},
{
"name": "20081209 rPSA-2008-0332-1 kernel",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499044/100/0/threaded"
},
{
"name" : "http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc5",
"refsource" : "CONFIRM",
"url" : "http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc5"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332"
},
{
"name" : "https://issues.rpath.com/browse/RPL-2915",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-2915"
},
{
"name" : "DSA-1681",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1681"
},
{
"name" : "FEDORA-2008-11618",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html"
},
{
"name": "RHSA-2009:0225",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0225.html"
},
{
"name" : "RHSA-2009:0053",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0053.html"
},
{
"name" : "SUSE-SA:2009:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html"
},
{
"name" : "SUSE-SA:2009:008",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00010.html"
},
{
"name" : "USN-715-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-715-1"
},
{
"name" : "USN-714-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/714-1/"
},
{
"name" : "33503",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33503"
},
{
"name": "oval:org.mitre.oval:def:10584",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10584"
},
{
"name" : "33623",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33623"
},
{
"name" : "32998",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32998"
},
{
"name" : "33641",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33641"
},
{
"name" : "33704",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33704"
},
{
"name" : "33756",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33756"
},
{
"name": "33706",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33706"
},
{
"name" : "33854",
"name": "https://issues.rpath.com/browse/RPL-2915",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2915"
},
{
"name": "http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc5",
"refsource": "CONFIRM",
"url": "http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc5"
},
{
"name": "33641",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/33854"
"url": "http://secunia.com/advisories/33641"
},
{
"name": "RHSA-2009:0053",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0053.html"
},
{
"name": "33503",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33503"
},
{
"name": "33756",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33756"
},
{
"name": "FEDORA-2008-11618",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html"
},
{
"name": "33348",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33348"
},
{
"name": "33623",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33623"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332"
},
{
"name": "33083",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33083"
},
{
"name": "USN-714-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/714-1/"
},
{
"name": "USN-715-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-715-1"
},
{
"name": "33854",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33854"
},
{
"name": "33704",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33704"
},
{
"name": "DSA-1681",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1681"
},
{
"name": "SUSE-SA:2009:008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00010.html"
},
{
"name": "SUSE-SA:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "7365",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7365"
"name": "4730",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4730"
},
{
"name": "33038",
@ -63,9 +63,9 @@
"url": "http://secunia.com/advisories/33038"
},
{
"name" : "4730",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4730"
"name": "7365",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7365"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2185",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110603 CVE Request -- fabric -- Use of insecure temporary file by uploading templates and projects to remote hosts",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/03/5"
},
{
"name": "[oss-security] 20110606 Re: CVE Request -- fabric -- Use of insecure temporary file by uploading templates and projects to remote hosts",
"refsource": "MLIST",
@ -68,9 +63,14 @@
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629003"
},
{
"name" : "http://code.fabfile.org/projects/fabric/files/Fabric-1.1.0.tar.gz",
"refsource" : "CONFIRM",
"url" : "http://code.fabfile.org/projects/fabric/files/Fabric-1.1.0.tar.gz"
"name": "FEDORA-2011-8964",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062534.html"
},
{
"name": "[oss-security] 20110603 CVE Request -- fabric -- Use of insecure temporary file by uploading templates and projects to remote hosts",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/03/5"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=710462",
@ -78,9 +78,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=710462"
},
{
"name" : "FEDORA-2011-8964",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062534.html"
"name": "http://code.fabfile.org/projects/fabric/files/Fabric-1.1.0.tar.gz",
"refsource": "CONFIRM",
"url": "http://code.fabfile.org/projects/fabric/files/Fabric-1.1.0.tar.gz"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.opera.com/docs/changelogs/mac/1150/",
"name": "http://www.opera.com/docs/changelogs/windows/1150/",
"refsource": "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/mac/1150/"
"url": "http://www.opera.com/docs/changelogs/windows/1150/"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/1150/",
@ -63,9 +63,9 @@
"url": "http://www.opera.com/docs/changelogs/unix/1150/"
},
{
"name" : "http://www.opera.com/docs/changelogs/windows/1150/",
"name": "http://www.opera.com/docs/changelogs/mac/1150/",
"refsource": "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/windows/1150/"
"url": "http://www.opera.com/docs/changelogs/mac/1150/"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://support.novell.com/security/cve/CVE-2011-2650.html",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/security/cve/CVE-2011-2650.html"
"name": "49236",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49236"
},
{
"name": "kiwi-rpm-info-xss(69285)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69285"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=701816",
@ -68,14 +73,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00013.html"
},
{
"name" : "49236",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/49236"
},
{
"name" : "kiwi-rpm-info-xss(69285)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69285"
"name": "http://support.novell.com/security/cve/CVE-2011-2650.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/security/cve/CVE-2011-2650.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2728",
"STATE": "PUBLIC"
},
@ -52,26 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77",
"refsource" : "MISC",
"url" : "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77"
},
{
"name": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod",
"refsource": "CONFIRM",
"url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
},
{
"name": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77",
"refsource": "MISC",
"url": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77"
},
{
"name": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1",
"refsource": "CONFIRM",
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=742987",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=742987"
},
{
"name": "FEDORA-2011-15484",
"refsource": "FEDORA",
@ -86,6 +81,11 @@
"name": "46172",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46172"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=742987",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742987"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2729",
"STATE": "PUBLIC"
},
@ -53,25 +53,60 @@
"references": {
"reference_data": [
{
"name" : "20110812 [SECURITY] CVE-2011-2729: Commons Daemon fails to drop capabilities (Apache Tomcat)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/519263/100/0/threaded"
"name": "tomcat-jsvc-info-disclosure(69161)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69161"
},
{
"name" : "[commons-dev] 20110812 [AANNOUNCE] Apache Commons Daemon 1.0.7 released",
"refsource" : "MLIST",
"url" : "http://mail-archives.apache.org/mod_mbox/commons-dev/201108.mbox/%3C4E451B2B.9090108@apache.org%3E"
"name": "openSUSE-SU-2011:1062",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00024.html"
},
{
"name" : "[tomcat-announce] 20110812 [SECURITY] CVE-2011-2729: Commons Daemon fails to drop capabilities (Apache Tomcat)",
"refsource" : "MLIST",
"url" : "http://mail-archives.apache.org/mod_mbox/tomcat-announce/201108.mbox/%3C4E45221D.1020306@apache.org%3E"
"name": "http://svn.apache.org/viewvc?view=revision&revision=1153824",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1153824"
},
{
"name": "HPSBUX02860",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name": "1025925",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025925"
},
{
"name": "http://people.apache.org/~markt/patches/2011-08-12-cve2011-2729-tc5.patch",
"refsource": "CONFIRM",
"url": "http://people.apache.org/~markt/patches/2011-08-12-cve2011-2729-tc5.patch"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "HPSBOV02762",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=730400",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=730400"
},
{
"name": "RHSA-2011:1291",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1291.html"
},
{
"name": "SSRT100627",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=132215163318824&w=2"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1152701",
"refsource": "CONFIRM",
@ -83,14 +118,9 @@
"url": "http://svn.apache.org/viewvc?view=revision&revision=1153379"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1153824",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1153824"
},
{
"name" : "http://tomcat.apache.org/security-5.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-5.html"
"name": "20110812 [SECURITY] CVE-2011-2729: Commons Daemon fails to drop capabilities (Apache Tomcat)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/519263/100/0/threaded"
},
{
"name": "http://tomcat.apache.org/security-6.html",
@ -98,89 +128,34 @@
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name" : "http://tomcat.apache.org/security-7.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-7.html"
"name": "57126",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57126"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=730400",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=730400"
"name": "[commons-dev] 20110812 [AANNOUNCE] Apache Commons Daemon 1.0.7 released",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/commons-dev/201108.mbox/%3C4E451B2B.9090108@apache.org%3E"
},
{
"name": "https://issues.apache.org/jira/browse/DAEMON-214",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/DAEMON-214"
},
{
"name" : "HPSBUX02725",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=132215163318824&w=2"
},
{
"name" : "SSRT100627",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=132215163318824&w=2"
},
{
"name" : "HPSBUX02860",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name" : "SSRT101146",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name" : "HPSBST02955",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
},
{
"name" : "HPSBOV02762",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name" : "SSRT100825",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name" : "RHSA-2011:1291",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1291.html"
},
{
"name" : "RHSA-2011:1292",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1292.html"
},
{
"name" : "openSUSE-SU-2011:1062",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00024.html"
},
{
"name": "49143",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49143"
},
{
"name" : "oval:org.mitre.oval:def:14743",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14743"
},
{
"name": "oval:org.mitre.oval:def:19450",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19450"
},
{
"name" : "1025925",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1025925"
"name": "SSRT100825",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name": "46030",
@ -188,14 +163,39 @@
"url": "http://secunia.com/advisories/46030"
},
{
"name" : "57126",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/57126"
"name": "http://tomcat.apache.org/security-5.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name" : "tomcat-jsvc-info-disclosure(69161)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69161"
"name": "HPSBUX02725",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=132215163318824&w=2"
},
{
"name": "RHSA-2011:1292",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1292.html"
},
{
"name": "SSRT101146",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name": "[tomcat-announce] 20110812 [SECURITY] CVE-2011-2729: Commons Daemon fails to drop capabilities (Apache Tomcat)",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/201108.mbox/%3C4E45221D.1020306@apache.org%3E"
},
{
"name": "HPSBST02955",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
},
{
"name": "oval:org.mitre.oval:def:14743",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14743"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-3245",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT4999",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4999"
},
{
"name": "APPLE-SA-2011-10-12-1",
"refsource": "APPLE",
@ -71,6 +66,11 @@
"name": "appleios-keyboard-info-disc(70555)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70555"
},
{
"name": "http://support.apple.com/kb/HT4999",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4999"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-3417",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "MS11-100",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-100"
},
{
"name": "TA11-347A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-347A.html"
},
{
"name": "MS11-100",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-100"
},
{
"name": "51203",
"refsource": "BID",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-3672",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -62,15 +62,15 @@
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
},
{
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/opendocman-1.2.6-svn-2011-01-21",
"refsource" : "MISC",
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/opendocman-1.2.6-svn-2011-01-21"
},
{
"name": "opendocman-userpermsclass-path-disclosure(70608)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70608"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/opendocman-1.2.6-svn-2011-01-21",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/opendocman-1.2.6-svn-2011-01-21"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0217",
"STATE": "PUBLIC"
},
@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130205 Xen Security Advisory 39 (CVE-2013-0216,CVE-2013-0217) - Linux netback DoS via malicious guest ring.",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/02/05/12"
"name": "MDVSA-2013:176",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=910883",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=910883"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7d5145d8eb2b9791533ffe4dc003b129b9696c48",
@ -67,20 +72,15 @@
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=910883",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=910883"
},
{
"name": "https://github.com/torvalds/linux/commit/7d5145d8eb2b9791533ffe4dc003b129b9696c48",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/7d5145d8eb2b9791533ffe4dc003b129b9696c48"
},
{
"name" : "MDVSA-2013:176",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
"name": "[oss-security] 20130205 Xen Security Advisory 39 (CVE-2013-0216,CVE-2013-0217) - Linux netback DoS via malicious guest ring.",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/05/12"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-0636",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-1675",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-47.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-47.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=866825",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=866825"
},
{
"name": "DSA-2699",
"refsource": "DEBIAN",
@ -72,45 +62,15 @@
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:165"
},
{
"name" : "RHSA-2013:0820",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0820.html"
},
{
"name" : "RHSA-2013:0821",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0821.html"
},
{
"name" : "openSUSE-SU-2013:0831",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html"
},
{
"name" : "openSUSE-SU-2013:0834",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html"
},
{
"name": "openSUSE-SU-2013:0825",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html"
},
{
"name" : "openSUSE-SU-2013:0929",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html"
},
{
"name" : "openSUSE-SU-2013:0946",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html"
},
{
"name" : "USN-1822-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1822-1"
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=866825",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=866825"
},
{
"name": "USN-1823-1",
@ -118,14 +78,54 @@
"url": "http://www.ubuntu.com/usn/USN-1823-1"
},
{
"name" : "59858",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/59858"
"name": "RHSA-2013:0821",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0821.html"
},
{
"name": "openSUSE-SU-2013:0929",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html"
},
{
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-47.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-47.html"
},
{
"name": "oval:org.mitre.oval:def:16976",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16976"
},
{
"name": "openSUSE-SU-2013:0831",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html"
},
{
"name": "RHSA-2013:0820",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0820.html"
},
{
"name": "openSUSE-SU-2013:0834",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html"
},
{
"name": "openSUSE-SU-2013:0946",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html"
},
{
"name": "59858",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59858"
},
{
"name": "USN-1822-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1822-1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-1733",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.bugzilla.org/security/4.0.10/",
"refsource" : "CONFIRM",
"url" : "http://www.bugzilla.org/security/4.0.10/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=911593",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=911593"
},
{
"name": "http://www.bugzilla.org/security/4.0.10/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/4.0.10/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1868",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "59793",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59793"
},
{
"name": "[oss-security] 20130319 Re: CVE Request: VLC Buffer overflows",
"refsource": "MLIST",
@ -71,11 +76,6 @@
"name": "oval:org.mitre.oval:def:17226",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17226"
},
{
"name" : "59793",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59793"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4272",
"STATE": "PUBLIC"
},
@ -52,11 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "https://drupal.org/node/2064785",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/2064785"
},
{
"name": "[oss-security] 20130822 Re: CVE request for Drupal contributed modules",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/08/22/2"
},
{
"name": "https://drupal.org/node/2064783",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/2064783"
},
{
"name": "https://drupal.org/node/2065057",
"refsource": "MISC",
@ -66,16 +76,6 @@
"name": "https://drupal.org/node/2064781",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/2064781"
},
{
"name" : "https://drupal.org/node/2064783",
"refsource" : "CONFIRM",
"url" : "https://drupal.org/node/2064783"
},
{
"name" : "https://drupal.org/node/2064785",
"refsource" : "CONFIRM",
"url" : "https://drupal.org/node/2064785"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@symantec.com",
"ID": "CVE-2013-4674",
"STATE": "PUBLIC"
},
@ -52,15 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "61290",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61290"
},
{
"name": "symantec-encryption-cve20134674-xss(85902)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85902"
},
{
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20130722_00",
"refsource": "CONFIRM",
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20130722_00"
},
{
"name" : "61290",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/61290"
"name": "54214",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54214"
},
{
"name": "95581",
@ -71,16 +81,6 @@
"name": "1028820",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028820"
},
{
"name" : "54214",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54214"
},
{
"name" : "symantec-encryption-cve20134674-xss(85902)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85902"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-5227",
"STATE": "PUBLIC"
},
@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT6162",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6162"
"name": "APPLE-SA-2013-12-16-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0087.html"
},
{
"name": "64355",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64355"
},
{
"name": "http://support.apple.com/kb/HT6441",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6441"
},
{
"name" : "APPLE-SA-2013-12-16-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-12/0087.html"
},
{
"name" : "APPLE-SA-2013-12-16-2",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-12/0086.html"
},
{
"name": "APPLE-SA-2014-09-17-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"name" : "64355",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64355"
"name": "http://support.apple.com/kb/HT6162",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6162"
},
{
"name": "APPLE-SA-2013-12-16-2",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0086.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-5334",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-5425",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21652405",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21652405"
},
{
"name": "PM93828",
"refsource": "AIXAPAR",
@ -66,6 +61,11 @@
"name": "was-ve-cve20135425-xss(87487)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87487"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21652405",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21652405"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1038242",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038242"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0207",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "97463",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97463"
},
{
"name" : "1038242",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038242"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.436081",
"ID": "CVE-2017-1000207",
"REQUESTER": "mmo@semmle.com",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Swagger Parser",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "Swagger Parser <= 1.0.30 and Swagger codegen <= 2.2.2"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : ""
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Remote code execution"
"value": "n/a"
}
]
}

View File

@ -54,9 +54,9 @@
"references": {
"reference_data": [
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
"name": "1039152",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039152"
},
{
"name": "100367",
@ -64,9 +64,9 @@
"url": "http://www.securityfocus.com/bid/100367"
},
{
"name" : "1039152",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039152"
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16499",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4002",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4636",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4693",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4819",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -64,26 +64,6 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1433005",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1433005"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-06/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-06/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-07/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-07/"
},
{
"name": "DSA-4139",
"refsource": "DEBIAN",
@ -95,9 +75,9 @@
"url": "https://security.gentoo.org/glsa/201810-01"
},
{
"name" : "RHSA-2018:0526",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0526"
"name": "103388",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103388"
},
{
"name": "RHSA-2018:0527",
@ -105,19 +85,39 @@
"url": "https://access.redhat.com/errata/RHSA-2018:0527"
},
{
"name" : "USN-3596-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3596-1/"
"name": "[debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html"
},
{
"name" : "103388",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/103388"
"name": "https://www.mozilla.org/security/advisories/mfsa2018-07/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2018-07/"
},
{
"name": "RHSA-2018:0526",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0526"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1433005",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1433005"
},
{
"name": "1040514",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040514"
},
{
"name": "USN-3596-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3596-1/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2018-06/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2018-06/"
}
]
}

View File

@ -95,15 +95,15 @@
"refsource": "CONFIRM",
"url": "https://jira.atlassian.com/browse/BSERV-10684"
},
{
"name" : "https://confluence.atlassian.com/x/3WNsO",
"refsource" : "CONFIRM",
"url" : "https://confluence.atlassian.com/x/3WNsO"
},
{
"name": "103488",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103488"
},
{
"name": "https://confluence.atlassian.com/x/3WNsO",
"refsource": "CONFIRM",
"url": "https://confluence.atlassian.com/x/3WNsO"
}
]
}