"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:52:45 +00:00
parent fbba313944
commit 1b130364dd
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 4289 additions and 4289 deletions

View File

@ -52,35 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "22145",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22145"
},
{ {
"name": "20060929 [MajorSecurity Advisory #28]ConPresso CMS - Multiple Cross Site Scripting and SQL Injection Issues", "name": "20060929 [MajorSecurity Advisory #28]ConPresso CMS - Multiple Cross Site Scripting and SQL Injection Issues",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/447358/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/447358/100/0/threaded"
}, },
{
"name" : "http://www.majorsecurity.de/index_2.php?major_rls=major_rls28",
"refsource" : "MISC",
"url" : "http://www.majorsecurity.de/index_2.php?major_rls=major_rls28"
},
{
"name" : "http://download.compresso.de/compresso-4.0.5a.zip",
"refsource" : "CONFIRM",
"url" : "http://download.compresso.de/compresso-4.0.5a.zip"
},
{ {
"name": "20273", "name": "20273",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/20273" "url": "http://www.securityfocus.com/bid/20273"
}, },
{ {
"name" : "ADV-2006-3868", "name": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls28",
"refsource" : "VUPEN", "refsource": "MISC",
"url" : "http://www.vupen.com/english/advisories/2006/3868" "url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls28"
}, },
{ {
"name" : "22145", "name": "conpressocms-multiple-scripts-xss(29272)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/22145" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29272"
}, },
{ {
"name": "1671", "name": "1671",
@ -88,9 +83,14 @@
"url": "http://securityreason.com/securityalert/1671" "url": "http://securityreason.com/securityalert/1671"
}, },
{ {
"name" : "conpressocms-multiple-scripts-xss(29272)", "name": "http://download.compresso.de/compresso-4.0.5a.zip",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29272" "url": "http://download.compresso.de/compresso-4.0.5a.zip"
},
{
"name": "ADV-2006-3868",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3868"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070422 Post Revolution Remote File Inclusion", "name": "2653",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/466707/100/0/threaded" "url": "http://securityreason.com/securityalert/2653"
},
{
"name" : "3785",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3785"
}, },
{ {
"name": "23607", "name": "23607",
@ -68,14 +63,9 @@
"url": "http://www.securityfocus.com/bid/23607" "url": "http://www.securityfocus.com/bid/23607"
}, },
{ {
"name" : "ADV-2007-1513", "name": "24971",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2007/1513" "url": "http://secunia.com/advisories/24971"
},
{
"name" : "35317",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35317"
}, },
{ {
"name": "35318", "name": "35318",
@ -83,19 +73,29 @@
"url": "http://osvdb.org/35318" "url": "http://osvdb.org/35318"
}, },
{ {
"name" : "24971", "name": "35317",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/24971" "url": "http://osvdb.org/35317"
},
{
"name" : "2653",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2653"
}, },
{ {
"name": "postrevolution-commonpreview-file-include(33825)", "name": "postrevolution-commonpreview-file-include(33825)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33825" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33825"
},
{
"name": "ADV-2007-1513",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1513"
},
{
"name": "3785",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3785"
},
{
"name": "20070422 Post Revolution Remote File Inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/466707/100/0/threaded"
} }
] ]
} }

View File

@ -53,34 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://docs.info.apple.com/article.html?artnum=305947", "name": "26034",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://docs.info.apple.com/article.html?artnum=305947" "url": "http://secunia.com/advisories/26034"
},
{
"name" : "APPLE-SA-2007-07-11",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2007/Jul/msg00001.html"
},
{
"name" : "TA07-193A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-193A.html"
},
{
"name" : "24873",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24873"
},
{
"name" : "ADV-2007-2510",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2510"
},
{
"name" : "36135",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36135"
}, },
{ {
"name": "1018373", "name": "1018373",
@ -88,14 +63,39 @@
"url": "http://www.securitytracker.com/id?1018373" "url": "http://www.securitytracker.com/id?1018373"
}, },
{ {
"name" : "26034", "name": "TA07-193A",
"refsource" : "SECUNIA", "refsource": "CERT",
"url" : "http://secunia.com/advisories/26034" "url": "http://www.us-cert.gov/cas/techalerts/TA07-193A.html"
},
{
"name": "ADV-2007-2510",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2510"
},
{
"name": "24873",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24873"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305947",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305947"
}, },
{ {
"name": "quicktime-java-applet-code-execution(35359)", "name": "quicktime-java-applet-code-execution(35359)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35359" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35359"
},
{
"name": "APPLE-SA-2007-07-11",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2007/Jul/msg00001.html"
},
{
"name": "36135",
"refsource": "OSVDB",
"url": "http://osvdb.org/36135"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://forums.invisionpower.com/index.php?showtopic=235069", "name": "ipb-editorid-xss(34616)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://forums.invisionpower.com/index.php?showtopic=235069" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34616"
}, },
{ {
"name": "24244", "name": "24244",
@ -63,14 +63,9 @@
"url": "http://www.securityfocus.com/bid/24244" "url": "http://www.securityfocus.com/bid/24244"
}, },
{ {
"name" : "ADV-2007-1993", "name": "25437",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2007/1993" "url": "http://secunia.com/advisories/25437"
},
{
"name" : "35430",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35430"
}, },
{ {
"name": "35431", "name": "35431",
@ -78,9 +73,24 @@
"url": "http://osvdb.org/35431" "url": "http://osvdb.org/35431"
}, },
{ {
"name" : "35432", "name": "35430",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://osvdb.org/35432" "url": "http://osvdb.org/35430"
},
{
"name": "http://forums.invisionpower.com/index.php?showtopic=235069",
"refsource": "CONFIRM",
"url": "http://forums.invisionpower.com/index.php?showtopic=235069"
},
{
"name": "35435",
"refsource": "OSVDB",
"url": "http://osvdb.org/35435"
},
{
"name": "ADV-2007-1993",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1993"
}, },
{ {
"name": "35433", "name": "35433",
@ -93,19 +103,9 @@
"url": "http://osvdb.org/35434" "url": "http://osvdb.org/35434"
}, },
{ {
"name" : "35435", "name": "35432",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://osvdb.org/35435" "url": "http://osvdb.org/35432"
},
{
"name" : "25437",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25437"
},
{
"name" : "ipb-editorid-xss(34616)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34616"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070530 PHP JackKnife [multiple vulnerabilities]", "name": "phpjk-indexgdisplay-path-disclosure(34644)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/470111/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34644"
},
{
"name" : "24253",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24253"
},
{
"name" : "45393",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/45393"
}, },
{ {
"name": "45394", "name": "45394",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/45394" "url": "http://osvdb.org/45394"
}, },
{
"name": "45393",
"refsource": "OSVDB",
"url": "http://osvdb.org/45393"
},
{
"name": "24253",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24253"
},
{ {
"name": "2768", "name": "2768",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2768" "url": "http://securityreason.com/securityalert/2768"
}, },
{ {
"name" : "phpjk-indexgdisplay-path-disclosure(34644)", "name": "20070530 PHP JackKnife [multiple vulnerabilities]",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34644" "url": "http://www.securityfocus.com/archive/1/470111/100/0/threaded"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-3125", "ID": "CVE-2007-3125",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://vuln.sg/salamander25-en.html", "name": "25732",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://vuln.sg/salamander25-en.html" "url": "http://secunia.com/advisories/25732"
},
{
"name": "37579",
"refsource": "OSVDB",
"url": "http://osvdb.org/37579"
}, },
{ {
"name": "24557", "name": "24557",
@ -67,20 +72,15 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2268" "url": "http://www.vupen.com/english/advisories/2007/2268"
}, },
{
"name" : "37579",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37579"
},
{
"name" : "25732",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25732"
},
{ {
"name": "salamander-peviewer-bo(34938)", "name": "salamander-peviewer-bo(34938)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34938" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34938"
},
{
"name": "http://vuln.sg/salamander25-en.html",
"refsource": "MISC",
"url": "http://vuln.sg/salamander25-en.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070714 Session Riding and multiple XSS in WebCit", "name": "38181",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/archive/1/473714/100/0/threaded" "url": "http://osvdb.org/38181"
}, },
{ {
"name": "24913", "name": "24913",
@ -63,20 +63,20 @@
"url": "http://www.securityfocus.com/bid/24913" "url": "http://www.securityfocus.com/bid/24913"
}, },
{ {
"name" : "38181", "name": "2890",
"refsource" : "OSVDB", "refsource": "SREASON",
"url" : "http://osvdb.org/38181" "url": "http://securityreason.com/securityalert/2890"
},
{
"name": "20070714 Session Riding and multiple XSS in WebCit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/473714/100/0/threaded"
}, },
{ {
"name": "26090", "name": "26090",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26090" "url": "http://secunia.com/advisories/26090"
}, },
{
"name" : "2890",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2890"
},
{ {
"name": "webcit-unspecified-csrf(35432)", "name": "webcit-unspecified-csrf(35432)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-3850", "ID": "CVE-2007-3850",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "27322",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27322"
},
{
"name": "45488",
"refsource": "OSVDB",
"url": "http://osvdb.org/45488"
},
{
"name": "26161",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26161"
},
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=721151d004dcf01a71b12bb6b893f9160284cf6e", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=721151d004dcf01a71b12bb6b893f9160284cf6e",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,25 +77,10 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0940.html" "url": "http://rhn.redhat.com/errata/RHSA-2007-0940.html"
}, },
{
"name" : "26161",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26161"
},
{
"name" : "45488",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/45488"
},
{ {
"name": "oval:org.mitre.oval:def:10793", "name": "oval:org.mitre.oval:def:10793",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10793" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10793"
},
{
"name" : "27322",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27322"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.watson.org/~robert/2007woot/" "url": "http://www.watson.org/~robert/2007woot/"
}, },
{
"name" : "25259",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25259"
},
{ {
"name": "26474", "name": "26474",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26474" "url": "http://secunia.com/advisories/26474"
},
{
"name": "25259",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25259"
} }
] ]
} }

View File

@ -53,34 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20071217 ZDI-07-079: Hewlett-Packard HP-UX swagentd Buffer Overflow Vulnerability", "name": "hpux-dce-unspecified-dos(39018)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/485260/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39018"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-07-079.html",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-07-079.html"
},
{
"name" : "HPSBUX02294",
"refsource" : "HP",
"url" : "http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01294212-1"
},
{
"name" : "SSRT071451",
"refsource" : "HP",
"url" : "http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01294212-1"
},
{
"name" : "26855",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26855"
},
{
"name" : "oval:org.mitre.oval:def:5710",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5710"
}, },
{ {
"name": "ADV-2007-4220", "name": "ADV-2007-4220",
@ -88,9 +63,29 @@
"url": "http://www.vupen.com/english/advisories/2007/4220" "url": "http://www.vupen.com/english/advisories/2007/4220"
}, },
{ {
"name" : "1019098", "name": "oval:org.mitre.oval:def:5710",
"refsource" : "SECTRACK", "refsource": "OVAL",
"url" : "http://www.securitytracker.com/id?1019098" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5710"
},
{
"name": "SSRT071451",
"refsource": "HP",
"url": "http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01294212-1"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-079.html",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-079.html"
},
{
"name": "20071217 ZDI-07-079: Hewlett-Packard HP-UX swagentd Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485260/100/0/threaded"
},
{
"name": "26855",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26855"
}, },
{ {
"name": "28087", "name": "28087",
@ -98,9 +93,14 @@
"url": "http://secunia.com/advisories/28087" "url": "http://secunia.com/advisories/28087"
}, },
{ {
"name" : "hpux-dce-unspecified-dos(39018)", "name": "1019098",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39018" "url": "http://www.securitytracker.com/id?1019098"
},
{
"name": "HPSBUX02294",
"refsource": "HP",
"url": "http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01294212-1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-6239", "ID": "CVE-2007-6239",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,140 +52,140 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.squid-cache.org/Advisories/SQUID-2007_2.txt",
"refsource" : "CONFIRM",
"url" : "http://www.squid-cache.org/Advisories/SQUID-2007_2.txt"
},
{
"name" : "http://www.squid-cache.org/Versions/v2/2.6/changesets/11780.patch",
"refsource" : "CONFIRM",
"url" : "http://www.squid-cache.org/Versions/v2/2.6/changesets/11780.patch"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=410181",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=410181"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=201209",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=201209"
},
{
"name" : "DSA-1482",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1482"
},
{
"name" : "FEDORA-2007-4161",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00507.html"
},
{
"name" : "FEDORA-2007-4170",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00497.html"
},
{
"name" : "GLSA-200801-05",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200801-05.xml"
},
{
"name" : "GLSA-200903-38",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200903-38.xml"
},
{
"name" : "MDVSA-2008:002",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:002"
},
{
"name" : "RHSA-2007:1130",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1130.html"
},
{
"name" : "SUSE-SR:2008:001",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html"
},
{
"name" : "USN-565-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-565-1"
},
{
"name" : "VU#232881",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/232881"
},
{
"name" : "26687",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26687"
},
{
"name" : "oval:org.mitre.oval:def:10915",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10915"
},
{
"name" : "34467",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34467"
},
{
"name" : "ADV-2007-4066",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/4066"
},
{
"name" : "1019036",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019036"
},
{
"name" : "27910",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27910"
},
{ {
"name": "28091", "name": "28091",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28091" "url": "http://secunia.com/advisories/28091"
}, },
{
"name" : "28109",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28109"
},
{
"name" : "28350",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28350"
},
{
"name" : "28381",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28381"
},
{
"name" : "28403",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28403"
},
{ {
"name": "28412", "name": "28412",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28412" "url": "http://secunia.com/advisories/28412"
}, },
{
"name": "FEDORA-2007-4161",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00507.html"
},
{
"name": "DSA-1482",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1482"
},
{ {
"name": "28814", "name": "28814",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28814" "url": "http://secunia.com/advisories/28814"
},
{
"name": "VU#232881",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/232881"
},
{
"name": "GLSA-200903-38",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200903-38.xml"
},
{
"name": "26687",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26687"
},
{
"name": "RHSA-2007:1130",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1130.html"
},
{
"name": "28109",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28109"
},
{
"name": "http://www.squid-cache.org/Advisories/SQUID-2007_2.txt",
"refsource": "CONFIRM",
"url": "http://www.squid-cache.org/Advisories/SQUID-2007_2.txt"
},
{
"name": "MDVSA-2008:002",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:002"
},
{
"name": "oval:org.mitre.oval:def:10915",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10915"
},
{
"name": "28403",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28403"
},
{
"name": "27910",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27910"
},
{
"name": "GLSA-200801-05",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200801-05.xml"
},
{
"name": "ADV-2007-4066",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4066"
},
{
"name": "28350",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28350"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=410181",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=410181"
},
{
"name": "1019036",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019036"
},
{
"name": "28381",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28381"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=201209",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=201209"
},
{
"name": "34467",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34467"
},
{
"name": "FEDORA-2007-4170",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00497.html"
},
{
"name": "USN-565-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-565-1"
},
{
"name": "http://www.squid-cache.org/Versions/v2/2.6/changesets/11780.patch",
"refsource": "CONFIRM",
"url": "http://www.squid-cache.org/Versions/v2/2.6/changesets/11780.patch"
},
{
"name": "SUSE-SR:2008:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "27968",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27968"
},
{ {
"name": "20071214 PHP RPG - Sql Injection and Session Information Disclosure", "name": "20071214 PHP RPG - Sql Injection and Session Information Disclosure",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "26884", "name": "26884",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26884" "url": "http://www.securityfocus.com/bid/26884"
},
{
"name" : "27968",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27968"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-0204", "ID": "CVE-2010-0204",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-09.html", "name": "acrobat-unspec-code-execution(57711)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-09.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57711"
},
{
"name" : "TA10-103C",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-103C.html"
},
{
"name" : "39329",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39329"
}, },
{ {
"name": "39522", "name": "39522",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/39522" "url": "http://www.securityfocus.com/bid/39522"
}, },
{
"name" : "oval:org.mitre.oval:def:7387",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7387"
},
{ {
"name": "ADV-2010-0873", "name": "ADV-2010-0873",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0873" "url": "http://www.vupen.com/english/advisories/2010/0873"
}, },
{ {
"name" : "acrobat-unspec-code-execution(57711)", "name": "TA10-103C",
"refsource" : "XF", "refsource": "CERT",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57711" "url": "http://www.us-cert.gov/cas/techalerts/TA10-103C.html"
},
{
"name": "oval:org.mitre.oval:def:7387",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7387"
},
{
"name": "39329",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39329"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-09.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-09.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-0432", "ID": "CVE-2010-0432",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,15 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.bonsai-sec.com/en/research/vulnerabilities/apacheofbiz-multiple-xss-0103.php", "name": "http://svn.apache.org/viewvc?view=revision&revision=920379",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "http://www.bonsai-sec.com/en/research/vulnerabilities/apacheofbiz-multiple-xss-0103.php" "url": "http://svn.apache.org/viewvc?view=revision&revision=920379"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=920380",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=920380"
}, },
{ {
"name": "http://svn.apache.org/viewvc?view=revision&revision=920369", "name": "http://svn.apache.org/viewvc?view=revision&revision=920369",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=920369" "url": "http://svn.apache.org/viewvc?view=revision&revision=920369"
}, },
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=920372",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=920372"
},
{ {
"name": "http://svn.apache.org/viewvc?view=revision&revision=920370", "name": "http://svn.apache.org/viewvc?view=revision&revision=920370",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,35 +82,25 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=920371" "url": "http://svn.apache.org/viewvc?view=revision&revision=920371"
}, },
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=920372",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=920372"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=920379",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=920379"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=920380",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=920380"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=920381",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=920381"
},
{ {
"name": "http://svn.apache.org/viewvc?view=revision&revision=920382", "name": "http://svn.apache.org/viewvc?view=revision&revision=920382",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=920382" "url": "http://svn.apache.org/viewvc?view=revision&revision=920382"
}, },
{
"name": "http://www.bonsai-sec.com/en/research/vulnerabilities/apacheofbiz-multiple-xss-0103.php",
"refsource": "MISC",
"url": "http://www.bonsai-sec.com/en/research/vulnerabilities/apacheofbiz-multiple-xss-0103.php"
},
{ {
"name": "39489", "name": "39489",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/39489" "url": "http://www.securityfocus.com/bid/39489"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=920381",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=920381"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://twitter.com/thezdi/statuses/11002504493",
"refsource": "MISC",
"url": "http://twitter.com/thezdi/statuses/11002504493"
},
{ {
"name": "http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010", "name": "http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "http://news.cnet.com/8301-27080_3-20001126-245.html", "name": "http://news.cnet.com/8301-27080_3-20001126-245.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://news.cnet.com/8301-27080_3-20001126-245.html" "url": "http://news.cnet.com/8301-27080_3-20001126-245.html"
},
{
"name" : "http://twitter.com/thezdi/statuses/11002504493",
"refsource" : "MISC",
"url" : "http://twitter.com/thezdi/statuses/11002504493"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-1282", "ID": "CVE-2010-1282",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20100512 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/511254/100/0/threaded"
},
{
"name" : "20100511 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html"
},
{
"name" : "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html",
"refsource" : "MISC",
"url" : "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-12.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-12.html"
},
{ {
"name": "40088", "name": "40088",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/40088" "url": "http://www.securityfocus.com/bid/40088"
}, },
{
"name": "20100512 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/511254/100/0/threaded"
},
{ {
"name": "oval:org.mitre.oval:def:7388", "name": "oval:org.mitre.oval:def:7388",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388"
}, },
{
"name": "20100511 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html"
},
{ {
"name": "ADV-2010-1128", "name": "ADV-2010-1128",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1128" "url": "http://www.vupen.com/english/advisories/2010/1128"
},
{
"name": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html",
"refsource": "MISC",
"url": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20100413 Imperva SecureSphere Web Application Firewall and Database Firewall Bypass Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/510709/100/0/threaded"
},
{ {
"name": "http://www.clearskies.net/documents/css-advisory-css1001-imperva.php", "name": "http://www.clearskies.net/documents/css-advisory-css1001-imperva.php",
"refsource": "MISC", "refsource": "MISC",
@ -71,6 +66,11 @@
"name": "39472", "name": "39472",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/39472" "url": "http://www.securityfocus.com/bid/39472"
},
{
"name": "20100413 Imperva SecureSphere Web Application Firewall and Database Firewall Bypass Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/510709/100/0/threaded"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.org/1003-exploits/minicmsribafs-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1003-exploits/minicmsribafs-sql.txt"
},
{
"name" : "11835",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/11835"
},
{
"name" : "38881",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/38881"
},
{ {
"name": "63121", "name": "63121",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -77,6 +62,21 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39018" "url": "http://secunia.com/advisories/39018"
}, },
{
"name": "http://packetstormsecurity.org/1003-exploits/minicmsribafs-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1003-exploits/minicmsribafs-sql.txt"
},
{
"name": "38881",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38881"
},
{
"name": "11835",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11835"
},
{ {
"name": "minicmsribafs-login-sqli-injection(57092)", "name": "minicmsribafs-login-sqli-injection(57092)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ntinternals.org/ntiadv0805/ntiadv0805.html",
"refsource" : "MISC",
"url" : "http://www.ntinternals.org/ntiadv0805/ntiadv0805.html"
},
{ {
"name": "http://www.ntinternals.org/ntiadv0902/ntiadv0902.html", "name": "http://www.ntinternals.org/ntiadv0902/ntiadv0902.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.ntinternals.org/ntiadv0902/ntiadv0902.html" "url": "http://www.ntinternals.org/ntiadv0902/ntiadv0902.html"
}, },
{
"name" : "37951",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37951"
},
{ {
"name": "61946", "name": "61946",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/61946" "url": "http://osvdb.org/61946"
}, },
{
"name" : "38335",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38335"
},
{ {
"name": "ADV-2010-0218", "name": "ADV-2010-0218",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0218" "url": "http://www.vupen.com/english/advisories/2010/0218"
}, },
{
"name": "37951",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37951"
},
{ {
"name": "rising-antivirus-drivers-priv-escalation(55869)", "name": "rising-antivirus-drivers-priv-escalation(55869)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55869" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55869"
},
{
"name": "38335",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38335"
},
{
"name": "http://www.ntinternals.org/ntiadv0805/ntiadv0805.html",
"refsource": "MISC",
"url": "http://www.ntinternals.org/ntiadv0805/ntiadv0805.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1637", "ID": "CVE-2010-1637",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,105 +52,105 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20100525 Re: CVE Request for Horde and Squirrelmail",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/05/25/9"
},
{
"name" : "[oss-security] 20100525 Re: CVE Request for Horde and Squirrelmail",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/05/25/3"
},
{
"name" : "[oss-security] 20100621 Re: [SquirrelMail-Security] CVE Request for Horde and Squirrelmail",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/06/21/1"
},
{
"name" : "http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69",
"refsource" : "MISC",
"url" : "http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69"
},
{
"name" : "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951",
"refsource" : "MISC",
"url" : "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951"
},
{
"name" : "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951",
"refsource" : "MISC",
"url" : "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951"
},
{
"name" : "http://squirrelmail.org/security/issue/2010-06-21",
"refsource" : "CONFIRM",
"url" : "http://squirrelmail.org/security/issue/2010-06-21"
},
{
"name" : "http://support.apple.com/kb/HT5130",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5130"
},
{
"name" : "APPLE-SA-2012-02-01-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name" : "FEDORA-2010-10244",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html"
},
{
"name" : "FEDORA-2010-10259",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html"
},
{ {
"name": "FEDORA-2010-10264", "name": "FEDORA-2010-10264",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html"
}, },
{
"name" : "MDVSA-2010:120",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:120"
},
{
"name" : "RHSA-2012:0103",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0103.html"
},
{ {
"name": "40291", "name": "40291",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/40291" "url": "http://www.securityfocus.com/bid/40291"
}, },
{ {
"name" : "40307", "name": "MDVSA-2010:120",
"refsource" : "BID", "refsource": "MANDRIVA",
"url" : "http://www.securityfocus.com/bid/40307" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:120"
},
{
"name": "http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69",
"refsource": "MISC",
"url": "http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69"
},
{
"name": "http://support.apple.com/kb/HT5130",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5130"
}, },
{ {
"name": "40307", "name": "40307",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/40307" "url": "http://www.securityfocus.com/bid/40307"
}, },
{ {
"name": "ADV-2010-1535", "name": "ADV-2010-1535",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1535" "url": "http://www.vupen.com/english/advisories/2010/1535"
}, },
{
"name": "ADV-2010-1554",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1554"
},
{
"name": "APPLE-SA-2012-02-01-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name": "[oss-security] 20100525 Re: CVE Request for Horde and Squirrelmail",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/05/25/9"
},
{
"name": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951",
"refsource": "MISC",
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951"
},
{
"name": "[oss-security] 20100525 Re: CVE Request for Horde and Squirrelmail",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/05/25/3"
},
{
"name": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951",
"refsource": "MISC",
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951"
},
{ {
"name": "ADV-2010-1536", "name": "ADV-2010-1536",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1536" "url": "http://www.vupen.com/english/advisories/2010/1536"
}, },
{ {
"name" : "ADV-2010-1554", "name": "FEDORA-2010-10259",
"refsource" : "VUPEN", "refsource": "FEDORA",
"url" : "http://www.vupen.com/english/advisories/2010/1554" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html"
},
{
"name": "[oss-security] 20100621 Re: [SquirrelMail-Security] CVE Request for Horde and Squirrelmail",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/21/1"
},
{
"name": "RHSA-2012:0103",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0103.html"
},
{
"name": "40307",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40307"
},
{
"name": "http://squirrelmail.org/security/issue/2010-06-21",
"refsource": "CONFIRM",
"url": "http://squirrelmail.org/security/issue/2010-06-21"
},
{
"name": "FEDORA-2010-10244",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://extensions.thethinkery.net/",
"refsource" : "MISC",
"url" : "http://extensions.thethinkery.net/"
},
{ {
"name": "12246", "name": "12246",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -67,20 +62,25 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/39495" "url": "http://www.securityfocus.com/bid/39495"
}, },
{
"name": "intellectual-index-sql-injection(57875)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57875"
},
{ {
"name": "63750", "name": "63750",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/63750" "url": "http://osvdb.org/63750"
}, },
{
"name": "http://extensions.thethinkery.net/",
"refsource": "MISC",
"url": "http://extensions.thethinkery.net/"
},
{ {
"name": "39427", "name": "39427",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39427" "url": "http://secunia.com/advisories/39427"
},
{
"name" : "intellectual-index-sql-injection(57875)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57875"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0185", "ID": "CVE-2014-0185",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20140429 Fwd: [vs] php-fpm: privilege escalation due to insecure default config (CVE-2014-0185)", "name": "59329",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://www.openwall.com/lists/oss-security/2014/04/29/5" "url": "http://secunia.com/advisories/59329"
},
{
"name": "https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d",
"refsource": "CONFIRM",
"url": "https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d"
}, },
{ {
"name": "https://hoffmann-christian.info/files/php-fpm/0001-Fix-bug-67060-use-default-mode-of-660.patch", "name": "https://hoffmann-christian.info/files/php-fpm/0001-Fix-bug-67060-use-default-mode-of-660.patch",
"refsource": "MISC", "refsource": "MISC",
"url": "https://hoffmann-christian.info/files/php-fpm/0001-Fix-bug-67060-use-default-mode-of-660.patch" "url": "https://hoffmann-christian.info/files/php-fpm/0001-Fix-bug-67060-use-default-mode-of-660.patch"
}, },
{
"name" : "http://www.php.net/ChangeLog-5.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php"
},
{
"name" : "http://www.php.net/archive/2014.php#id2014-05-01-1",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/archive/2014.php#id2014-05-01-1"
},
{ {
"name": "https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1307027", "name": "https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1307027",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -83,34 +78,39 @@
"url": "https://bugs.php.net/bug.php?id=67060" "url": "https://bugs.php.net/bug.php?id=67060"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1092815", "name": "59061",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1092815" "url": "http://secunia.com/advisories/59061"
}, },
{ {
"name" : "https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d", "name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d" "url": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "http://www.php.net/archive/2014.php#id2014-05-01-1",
"refsource": "CONFIRM",
"url": "http://www.php.net/archive/2014.php#id2014-05-01-1"
}, },
{ {
"name": "http://support.apple.com/kb/HT6443", "name": "http://support.apple.com/kb/HT6443",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6443" "url": "http://support.apple.com/kb/HT6443"
}, },
{
"name": "[oss-security] 20140429 Fwd: [vs] php-fpm: privilege escalation due to insecure default config (CVE-2014-0185)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/04/29/5"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1092815",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092815"
},
{ {
"name": "openSUSE-SU-2015:1685", "name": "openSUSE-SU-2015:1685",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00012.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00012.html"
},
{
"name" : "59061",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59061"
},
{
"name" : "59329",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59329"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0217", "ID": "CVE-2014-0217",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://moodle.org/mod/forum/discuss.php?d=260365",
"refsource": "CONFIRM",
"url": "https://moodle.org/mod/forum/discuss.php?d=260365"
},
{ {
"name": "[oss-security] 20140519 Moodle security notifications public", "name": "[oss-security] 20140519 Moodle security notifications public",
"refsource": "MLIST", "refsource": "MLIST",
@ -61,11 +66,6 @@
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45126", "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45126",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45126" "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45126"
},
{
"name" : "https://moodle.org/mod/forum/discuss.php?d=260365",
"refsource" : "CONFIRM",
"url" : "https://moodle.org/mod/forum/discuss.php?d=260365"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-0814", "ID": "CVE-2014-0814",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.phpmyfaq.de/advisory_2014-02-04.php",
"refsource" : "CONFIRM",
"url" : "http://www.phpmyfaq.de/advisory_2014-02-04.php"
},
{
"name" : "JVN#30050348",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN30050348/index.html"
},
{ {
"name": "JVNDB-2014-000015", "name": "JVNDB-2014-000015",
"refsource": "JVNDB", "refsource": "JVNDB",
@ -73,14 +63,24 @@
"url": "http://www.securityfocus.com/bid/65368" "url": "http://www.securityfocus.com/bid/65368"
}, },
{ {
"name" : "102940", "name": "http://www.phpmyfaq.de/advisory_2014-02-04.php",
"refsource" : "OSVDB", "refsource": "CONFIRM",
"url" : "http://osvdb.org/102940" "url": "http://www.phpmyfaq.de/advisory_2014-02-04.php"
}, },
{ {
"name": "56006", "name": "56006",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56006" "url": "http://secunia.com/advisories/56006"
},
{
"name": "JVN#30050348",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN30050348/index.html"
},
{
"name": "102940",
"refsource": "OSVDB",
"url": "http://osvdb.org/102940"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1595", "ID": "CVE-2014-1595",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.reddit.com/r/netsec/comments/2ocxac/apple_coregraphics_framework_on_os_x_1010_is/", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1092855",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "http://www.reddit.com/r/netsec/comments/2ocxac/apple_coregraphics_framework_on_os_x_1010_is/" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1092855"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
}, },
{ {
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-90.html", "name": "http://www.mozilla.org/security/announce/2014/mfsa2014-90.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-90.html" "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-90.html"
}, },
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1092855",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1092855"
},
{ {
"name": "http://support.apple.com/HT204244", "name": "http://support.apple.com/HT204244",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/HT204244" "url": "http://support.apple.com/HT204244"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "name": "http://www.reddit.com/r/netsec/comments/2ocxac/apple_coregraphics_framework_on_os_x_1010_is/",
"refsource" : "CONFIRM", "refsource": "MISC",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" "url": "http://www.reddit.com/r/netsec/comments/2ocxac/apple_coregraphics_framework_on_os_x_1010_is/"
}, },
{ {
"name": "APPLE-SA-2015-01-27-4", "name": "APPLE-SA-2015-01-27-4",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://www.gnutls.org/security.html",
"refsource": "CONFIRM",
"url": "http://www.gnutls.org/security.html"
},
{ {
"name": "[oss-security] 20140213 CVE Request - GnuTLS corrects flaw in certificate verification (3.1.x/3.2.x)", "name": "[oss-security] 20140213 CVE Request - GnuTLS corrects flaw in certificate verification (3.1.x/3.2.x)",
"refsource": "MLIST", "refsource": "MLIST",
@ -63,9 +68,14 @@
"url": "http://seclists.org/oss-sec/2014/q1/345" "url": "http://seclists.org/oss-sec/2014/q1/345"
}, },
{ {
"name" : "http://www.gnutls.org/security.html", "name": "65559",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.gnutls.org/security.html" "url": "http://www.securityfocus.com/bid/65559"
},
{
"name": "USN-2121-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2121-1"
}, },
{ {
"name": "https://www.gitorious.org/gnutls/gnutls/commit/b1abfe3d182d68539900092eb42fc62cf1bb7e7c", "name": "https://www.gitorious.org/gnutls/gnutls/commit/b1abfe3d182d68539900092eb42fc62cf1bb7e7c",
@ -76,16 +86,6 @@
"name": "DSA-2866", "name": "DSA-2866",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2866" "url": "http://www.debian.org/security/2014/dsa-2866"
},
{
"name" : "USN-2121-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2121-1"
},
{
"name" : "65559",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/65559"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-4815", "ID": "CVE-2014-4815",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21691993",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21691993"
},
{ {
"name": "ibm-rlia-cve20144815-fixation(95401)", "name": "ibm-rlia-cve20144815-fixation(95401)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95401" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95401"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21691993",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691993"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5641", "ID": "CVE-2014-5641",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#714937", "name": "VU#714937",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/714937" "url": "http://www.kb.cert.org/vuls/id/714937"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5686", "ID": "CVE-2014-5686",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{ {
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "VU#520897", "name": "VU#520897",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/520897" "url": "http://www.kb.cert.org/vuls/id/520897"
},
{
"name" : "VU#582497",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/582497"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1036550",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036550"
},
{ {
"name": "http://fortiguard.com/advisory/fortimanager-and-fortianalyzer-xss-vulnerability", "name": "http://fortiguard.com/advisory/fortimanager-and-fortianalyzer-xss-vulnerability",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "92456", "name": "92456",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92456" "url": "http://www.securityfocus.com/bid/92456"
},
{
"name" : "1036550",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036550"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-3783", "ID": "CVE-2016-3783",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4249", "ID": "CVE-2016-4249",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html", "name": "91722",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html" "url": "http://www.securityfocus.com/bid/91722"
},
{
"name" : "GLSA-201607-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201607-03"
},
{
"name" : "MS16-093",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093"
},
{
"name" : "RHSA-2016:1423",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
}, },
{ {
"name": "SUSE-SU-2016:1826", "name": "SUSE-SU-2016:1826",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
}, },
{
"name": "GLSA-201607-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-03"
},
{ {
"name": "openSUSE-SU-2016:1802", "name": "openSUSE-SU-2016:1802",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html"
}, },
{ {
"name" : "91722", "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/91722" "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
},
{
"name": "RHSA-2016:1423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
},
{
"name": "MS16-093",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093"
}, },
{ {
"name": "1036280", "name": "1036280",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-208", "name": "1038401",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-208" "url": "http://www.securitytracker.com/id/1038401"
}, },
{ {
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03739en_us", "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03739en_us",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/98332" "url": "http://www.securityfocus.com/bid/98332"
}, },
{ {
"name" : "1038401", "name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-208",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1038401" "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-208"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8250", "ID": "CVE-2016-8250",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8254", "ID": "CVE-2016-8254",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,25 +53,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388"
},
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
}, },
{
"name": "1037492",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037492"
},
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
}, },
{ {
"name" : "1037492", "name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1037492" "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-nga",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-nga"
},
{ {
"name": "95640", "name": "95640",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95640" "url": "http://www.securityfocus.com/bid/95640"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-nga",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-nga"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-9446", "ID": "CVE-2016-9446",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20161118 CVE Request: gstreamer plugins", "name": "https://bugzilla.gnome.org/show_bug.cgi?id=774533",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2016/11/18/12" "url": "https://bugzilla.gnome.org/show_bug.cgi?id=774533"
}, },
{ {
"name": "[oss-security] 20161118 Re: CVE Request: gstreamer plugins", "name": "[oss-security] 20161118 Re: CVE Request: gstreamer plugins",
@ -63,24 +63,9 @@
"url": "http://www.openwall.com/lists/oss-security/2016/11/18/13" "url": "http://www.openwall.com/lists/oss-security/2016/11/18/13"
}, },
{ {
"name" : "https://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html", "name": "94423",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html" "url": "http://www.securityfocus.com/bid/94423"
},
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=774533",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=774533"
},
{
"name" : "https://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/gst/vmnc/vmncdec.c?id=4cb1bcf1422bbcd79c0f683edb7ee85e3f7a31fe",
"refsource" : "CONFIRM",
"url" : "https://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/gst/vmnc/vmncdec.c?id=4cb1bcf1422bbcd79c0f683edb7ee85e3f7a31fe"
},
{
"name" : "GLSA-201705-10",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201705-10"
}, },
{ {
"name": "RHSA-2017:2060", "name": "RHSA-2017:2060",
@ -88,9 +73,24 @@
"url": "https://access.redhat.com/errata/RHSA-2017:2060" "url": "https://access.redhat.com/errata/RHSA-2017:2060"
}, },
{ {
"name" : "94423", "name": "https://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/gst/vmnc/vmncdec.c?id=4cb1bcf1422bbcd79c0f683edb7ee85e3f7a31fe",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/94423" "url": "https://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/gst/vmnc/vmncdec.c?id=4cb1bcf1422bbcd79c0f683edb7ee85e3f7a31fe"
},
{
"name": "[oss-security] 20161118 CVE Request: gstreamer plugins",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/11/18/12"
},
{
"name": "https://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html",
"refsource": "MISC",
"url": "https://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html"
},
{
"name": "GLSA-201705-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201705-10"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9530", "ID": "CVE-2016-9530",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -103,15 +103,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21999960",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21999960"
},
{ {
"name": "96825", "name": "96825",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/96825" "url": "http://www.securityfocus.com/bid/96825"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21999960",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21999960"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "40937", "name": "https://github.com/DonnchaC/ubuntu-apport-exploitation",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40937/"
},
{
"name" : "https://bugs.launchpad.net/apport/+bug/1648806",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://bugs.launchpad.net/apport/+bug/1648806" "url": "https://github.com/DonnchaC/ubuntu-apport-exploitation"
}, },
{ {
"name": "https://donncha.is/2016/12/compromising-ubuntu-desktop/", "name": "https://donncha.is/2016/12/compromising-ubuntu-desktop/",
@ -68,9 +63,14 @@
"url": "https://donncha.is/2016/12/compromising-ubuntu-desktop/" "url": "https://donncha.is/2016/12/compromising-ubuntu-desktop/"
}, },
{ {
"name" : "https://github.com/DonnchaC/ubuntu-apport-exploitation", "name": "https://bugs.launchpad.net/apport/+bug/1648806",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://github.com/DonnchaC/ubuntu-apport-exploitation" "url": "https://bugs.launchpad.net/apport/+bug/1648806"
},
{
"name": "95011",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95011"
}, },
{ {
"name": "USN-3157-1", "name": "USN-3157-1",
@ -78,9 +78,9 @@
"url": "http://www.ubuntu.com/usn/USN-3157-1" "url": "http://www.ubuntu.com/usn/USN-3157-1"
}, },
{ {
"name" : "95011", "name": "40937",
"refsource" : "BID", "refsource": "EXPLOIT-DB",
"url" : "http://www.securityfocus.com/bid/95011" "url": "https://www.exploit-db.com/exploits/40937/"
} }
] ]
} }