"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:18:37 +00:00
parent 8fc0623117
commit 1c8b05a3f1
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 3615 additions and 3615 deletions

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20010130 DOS Vulnerability in SlimServe HTTPd ", "name": "2318",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0505.html" "url": "http://www.securityfocus.com/bid/2318"
}, },
{ {
"name": "slimserve-httpd-dos(6028)", "name": "slimserve-httpd-dos(6028)",
@ -63,9 +63,9 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6028" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6028"
}, },
{ {
"name" : "2318", "refsource": "BUGTRAQ",
"refsource" : "BID", "name": "20010130 DOS Vulnerability in SlimServe HTTPd",
"url" : "http://www.securityfocus.com/bid/2318" "url": "http://archives.neohapsis.com/archives/bugtraq/2001-01/0505.html"
} }
] ]
} }

View File

@ -57,30 +57,30 @@
"refsource": "VULN-DEV", "refsource": "VULN-DEV",
"url": "http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0231.html" "url": "http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0231.html"
}, },
{
"name": "gftp-format-string(6478)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6478"
},
{ {
"name": "RHSA-2001:053", "name": "RHSA-2001:053",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://archives.neohapsis.com/archives/linux/redhat/2001-q2/0043.html" "url": "http://archives.neohapsis.com/archives/linux/redhat/2001-q2/0043.html"
}, },
{
"name" : "DSA-057",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2001/dsa-057"
},
{ {
"name": "2657", "name": "2657",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/2657" "url": "http://www.securityfocus.com/bid/2657"
}, },
{
"name" : "gftp-format-string(6478)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6478"
},
{ {
"name": "1805", "name": "1805",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/1805" "url": "http://www.osvdb.org/1805"
},
{
"name": "DSA-057",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2001/dsa-057"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/211736" "url": "http://www.kb.cert.org/vuls/id/211736"
}, },
{
"name" : "CA-2001-08",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2001-08.html"
},
{ {
"name": "alcatel-tftp-lan-access(6336)", "name": "alcatel-tftp-lan-access(6336)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6336" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6336"
},
{
"name": "CA-2001-08",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2001-08.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060425 Invision Vulnerabilities, including remote code execution", "name": "invision-index-ck-sql-injection(26071)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/431990/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26071"
}, },
{ {
"name": "20060427 Re: Invision Vulnerabilities, including remote code execution", "name": "20060427 Re: Invision Vulnerabilities, including remote code execution",
@ -63,34 +63,34 @@
"url": "http://www.securityfocus.com/archive/1/432226/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/432226/100/0/threaded"
}, },
{ {
"name" : "http://forums.invisionpower.com/index.php?showtopic=213374", "name": "796",
"refsource" : "CONFIRM", "refsource": "SREASON",
"url" : "http://forums.invisionpower.com/index.php?showtopic=213374" "url": "http://securityreason.com/securityalert/796"
}, },
{ {
"name": "17690", "name": "17690",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/17690" "url": "http://www.securityfocus.com/bid/17690"
}, },
{
"name" : "ADV-2006-1534",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1534"
},
{ {
"name": "19830", "name": "19830",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19830" "url": "http://secunia.com/advisories/19830"
}, },
{ {
"name" : "796", "name": "ADV-2006-1534",
"refsource" : "SREASON", "refsource": "VUPEN",
"url" : "http://securityreason.com/securityalert/796" "url": "http://www.vupen.com/english/advisories/2006/1534"
}, },
{ {
"name" : "invision-index-ck-sql-injection(26071)", "name": "20060425 Invision Vulnerabilities, including remote code execution",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26071" "url": "http://www.securityfocus.com/archive/1/431990/100/0/threaded"
},
{
"name": "http://forums.invisionpower.com/index.php?showtopic=213374",
"refsource": "CONFIRM",
"url": "http://forums.invisionpower.com/index.php?showtopic=213374"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2006-2383", "ID": "CVE-2006-2383",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS06-021", "name": "oval:org.mitre.oval:def:1924",
"refsource" : "MS", "refsource": "OVAL",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1924"
}, },
{ {
"name" : "TA06-164A", "name": "20595",
"refsource" : "CERT", "refsource": "SECUNIA",
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-164A.html" "url": "http://secunia.com/advisories/20595"
}, },
{ {
"name" : "VU#417585", "name": "ADV-2006-2319",
"refsource" : "CERT-VN", "refsource": "VUPEN",
"url" : "http://www.kb.cert.org/vuls/id/417585" "url": "http://www.vupen.com/english/advisories/2006/2319"
}, },
{ {
"name": "18303", "name": "18303",
@ -73,9 +73,24 @@
"url": "http://www.securityfocus.com/bid/18303" "url": "http://www.securityfocus.com/bid/18303"
}, },
{ {
"name" : "ADV-2006-2319", "name": "1016291",
"refsource" : "VUPEN", "refsource": "SECTRACK",
"url" : "http://www.vupen.com/english/advisories/2006/2319" "url": "http://securitytracker.com/id?1016291"
},
{
"name": "TA06-164A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-164A.html"
},
{
"name": "ie-dximagetransform-execute-code(26768)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26768"
},
{
"name": "oval:org.mitre.oval:def:2009",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2009"
}, },
{ {
"name": "26444", "name": "26444",
@ -87,20 +102,20 @@
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1821" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1821"
}, },
{
"name": "VU#417585",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/417585"
},
{ {
"name": "oval:org.mitre.oval:def:1891", "name": "oval:org.mitre.oval:def:1891",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1891" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1891"
}, },
{ {
"name" : "oval:org.mitre.oval:def:1924", "name": "MS06-021",
"refsource" : "OVAL", "refsource": "MS",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1924" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021"
},
{
"name" : "oval:org.mitre.oval:def:1944",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1944"
}, },
{ {
"name": "oval:org.mitre.oval:def:1949", "name": "oval:org.mitre.oval:def:1949",
@ -108,24 +123,9 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1949" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1949"
}, },
{ {
"name" : "oval:org.mitre.oval:def:2009", "name": "oval:org.mitre.oval:def:1944",
"refsource": "OVAL", "refsource": "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2009" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1944"
},
{
"name" : "1016291",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016291"
},
{
"name" : "20595",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20595"
},
{
"name" : "ie-dximagetransform-execute-code(26768)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26768"
} }
] ]
} }

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060522 DSChat <= 1.0 XSS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/434821/100/0/threaded"
},
{
"name" : "18084",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18084"
},
{
"name" : "ADV-2006-1961",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1961"
},
{
"name" : "25734",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/25734"
},
{
"name" : "1016148",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016148"
},
{ {
"name": "20258", "name": "20258",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20258" "url": "http://secunia.com/advisories/20258"
}, },
{
"name": "20060522 DSChat <= 1.0 XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434821/100/0/threaded"
},
{ {
"name": "958", "name": "958",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/958" "url": "http://securityreason.com/securityalert/958"
}, },
{
"name": "25734",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25734"
},
{
"name": "ADV-2006-1961",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1961"
},
{
"name": "18084",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18084"
},
{ {
"name": "dschat-send-xss(26641)", "name": "dschat-send-xss(26641)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26641" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26641"
},
{
"name": "1016148",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016148"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-2910", "ID": "CVE-2006-2910",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "jetaudio-tooltip-idtag-bo(27593)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27593"
},
{
"name": "19456",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19456"
},
{
"name": "ADV-2006-2667",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2667"
},
{ {
"name": "http://secunia.com/secunia_research/2006-45/advisory/", "name": "http://secunia.com/secunia_research/2006-45/advisory/",
"refsource": "MISC", "refsource": "MISC",
@ -61,21 +76,6 @@
"name": "18825", "name": "18825",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/18825" "url": "http://www.securityfocus.com/bid/18825"
},
{
"name" : "ADV-2006-2667",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2667"
},
{
"name" : "19456",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19456"
},
{
"name" : "jetaudio-tooltip-idtag-bo(27593)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27593"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061116 BlogTorrent-preview => 0.92 Cross Site Scripting",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/451856/100/0/threaded"
},
{ {
"name": "21125", "name": "21125",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/21125" "url": "http://www.securityfocus.com/bid/21125"
}, },
{
"name": "20061116 BlogTorrent-preview => 0.92 Cross Site Scripting",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/451856/100/0/threaded"
},
{ {
"name": "1895", "name": "1895",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "2861",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2861"
},
{ {
"name": "21343", "name": "21343",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "songbird-m3u-format-string-dos(30563)", "name": "songbird-m3u-format-string-dos(30563)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30563" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30563"
},
{
"name": "2861",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2861"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060608 Ie opera dos exploit",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-06/0085.html"
},
{ {
"name": "firefox-marquee-dos(26898)", "name": "firefox-marquee-dos(26898)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26898" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26898"
},
{
"name": "20060608 Ie opera dos exploit",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-06/0085.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0349", "ID": "CVE-2011-0349",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20110126 Cisco Content Services Gateway Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6791d.shtml"
},
{ {
"name": "46026", "name": "46026",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/46026" "url": "http://www.securityfocus.com/bid/46026"
}, },
{
"name" : "70721",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/70721"
},
{
"name" : "1024992",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1024992"
},
{
"name" : "43052",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43052"
},
{ {
"name": "ADV-2011-0229", "name": "ADV-2011-0229",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0229" "url": "http://www.vupen.com/english/advisories/2011/0229"
}, },
{
"name": "20110126 Cisco Content Services Gateway Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6791d.shtml"
},
{
"name": "43052",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43052"
},
{
"name": "1024992",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024992"
},
{ {
"name": "cisco-csg2-tcp-dos(64937)", "name": "cisco-csg2-tcp-dos(64937)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64937" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64937"
},
{
"name": "70721",
"refsource": "OSVDB",
"url": "http://osvdb.org/70721"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-2281", "ID": "CVE-2011-2281",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
},
{ {
"name": "TA11-201A", "name": "TA11-201A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2011-2854", "ID": "CVE-2011-2854",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,59 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://code.google.com/p/chromium/issues/detail?id=92651", "name": "chrome-ruby-code-excution(69881)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://code.google.com/p/chromium/issues/detail?id=92651" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69881"
},
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=94800",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=94800"
},
{
"name" : "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"name" : "APPLE-SA-2012-03-07-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html"
},
{
"name" : "APPLE-SA-2012-03-07-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html"
},
{
"name" : "APPLE-SA-2012-03-12-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
},
{
"name" : "75556",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/75556"
}, },
{ {
"name": "oval:org.mitre.oval:def:14691", "name": "oval:org.mitre.oval:def:14691",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14691" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14691"
}, },
{
"name": "http://code.google.com/p/chromium/issues/detail?id=94800",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=94800"
},
{ {
"name": "1026774", "name": "1026774",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026774" "url": "http://www.securitytracker.com/id?1026774"
}, },
{ {
"name" : "48274", "name": "http://code.google.com/p/chromium/issues/detail?id=92651",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/48274" "url": "http://code.google.com/p/chromium/issues/detail?id=92651"
},
{
"name" : "48288",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48288"
}, },
{ {
"name": "48377", "name": "48377",
@ -113,9 +83,39 @@
"url": "http://secunia.com/advisories/48377" "url": "http://secunia.com/advisories/48377"
}, },
{ {
"name" : "chrome-ruby-code-excution(69881)", "name": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69881" "url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"name": "75556",
"refsource": "OSVDB",
"url": "http://osvdb.org/75556"
},
{
"name": "APPLE-SA-2012-03-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
},
{
"name": "48274",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48274"
},
{
"name": "APPLE-SA-2012-03-07-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html"
},
{
"name": "48288",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48288"
},
{
"name": "APPLE-SA-2012-03-07-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2011-3964", "ID": "CVE-2011-3964",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4355", "ID": "CVE-2011-4355",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "RHSA-2013:0522",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0522.html"
},
{ {
"name": "[gdb-patches] 20110429 Re: [RFA] Add $pdir as entry for libthread-db-search-path.", "name": "[gdb-patches] 20110429 Re: [RFA] Add $pdir as entry for libthread-db-search-path.",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,11 +72,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://sourceware.org/cgi-bin/cvsweb.cgi/~checkout~/src/gdb/NEWS?content-type=text/x-cvsweb-markup&cvsroot=src" "url": "http://sourceware.org/cgi-bin/cvsweb.cgi/~checkout~/src/gdb/NEWS?content-type=text/x-cvsweb-markup&cvsroot=src"
}, },
{
"name" : "RHSA-2013:0522",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0522.html"
},
{ {
"name": "1028191", "name": "1028191",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "18050",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/18050"
},
{ {
"name": "http://joomlaextensions.co.in/index.php?option=com_jeshop&view=category_detail&Itemid=118&id=38", "name": "http://joomlaextensions.co.in/index.php?option=com_jeshop&view=category_detail&Itemid=118&id=38",
"refsource": "MISC", "refsource": "MISC",
"url": "http://joomlaextensions.co.in/index.php?option=com_jeshop&view=category_detail&Itemid=118&id=38" "url": "http://joomlaextensions.co.in/index.php?option=com_jeshop&view=category_detail&Itemid=118&id=38"
}, },
{
"name": "46656",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46656"
},
{ {
"name": "76726", "name": "76726",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/76726" "url": "http://www.osvdb.org/76726"
}, },
{ {
"name" : "46656", "name": "18050",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/46656" "url": "http://www.exploit-db.com/exploits/18050"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1313", "ID": "CVE-2013-1313",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS13-020",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-020"
},
{ {
"name": "MS13-037", "name": "MS13-037",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-037" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-037"
}, },
{
"name": "oval:org.mitre.oval:def:16385",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16385"
},
{ {
"name": "TA13-043B", "name": "TA13-043B",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html" "url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:16385", "name": "MS13-020",
"refsource" : "OVAL", "refsource": "MS",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16385" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-020"
} }
] ]
} }

View File

@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=807241",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=807241"
},
{ {
"name": "20130221 OSEC-2013-01: nagios metacharacter filtering omission", "name": "20130221 OSEC-2013-01: nagios metacharacter filtering omission",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2013/Feb/119" "url": "http://seclists.org/bugtraq/2013/Feb/119"
}, },
{
"name": "openSUSE-SU-2013:0624",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00006.html"
},
{ {
"name": "24955", "name": "24955",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -67,20 +77,10 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.occamsec.com/vulnerabilities.html#nagios_metacharacter_vulnerability" "url": "http://www.occamsec.com/vulnerabilities.html#nagios_metacharacter_vulnerability"
}, },
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=807241",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=807241"
},
{ {
"name": "openSUSE-SU-2013:0621", "name": "openSUSE-SU-2013:0621",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00005.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00005.html"
},
{
"name" : "openSUSE-SU-2013:0624",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00006.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2013-1445", "ID": "CVE-2013-1445",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20131017 CVE-2013-1445 python-crypto:PRNG not correctly reseeded in some situations",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/10/17/3"
},
{ {
"name": "https://github.com/dlitz/pycrypto/commit/19dcf7b15d61b7dc1a125a367151de40df6ef175", "name": "https://github.com/dlitz/pycrypto/commit/19dcf7b15d61b7dc1a125a367151de40df6ef175",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/dlitz/pycrypto/commit/19dcf7b15d61b7dc1a125a367151de40df6ef175" "url": "https://github.com/dlitz/pycrypto/commit/19dcf7b15d61b7dc1a125a367151de40df6ef175"
}, },
{
"name": "[oss-security] 20131017 CVE-2013-1445 python-crypto:PRNG not correctly reseeded in some situations",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/10/17/3"
},
{ {
"name": "DSA-2781", "name": "DSA-2781",
"refsource": "DEBIAN", "refsource": "DEBIAN",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1946", "ID": "CVE-2013-1946",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20130412 Re: CVE request for Drupal contributed modules", "name": "92259",
"refsource" : "MLIST", "refsource": "OSVDB",
"url" : "http://www.openwall.com/lists/oss-security/2013/04/12/1" "url": "http://www.osvdb.org/92259"
},
{
"name" : "https://drupal.org/node/1966780",
"refsource" : "MISC",
"url" : "https://drupal.org/node/1966780"
},
{
"name" : "https://drupal.org/node/1966752",
"refsource" : "CONFIRM",
"url" : "https://drupal.org/node/1966752"
}, },
{ {
"name": "https://drupal.org/node/1966758", "name": "https://drupal.org/node/1966758",
@ -73,9 +63,19 @@
"url": "https://drupal.org/node/1966758" "url": "https://drupal.org/node/1966758"
}, },
{ {
"name" : "92259", "name": "https://drupal.org/node/1966752",
"refsource" : "OSVDB", "refsource": "CONFIRM",
"url" : "http://www.osvdb.org/92259" "url": "https://drupal.org/node/1966752"
},
{
"name": "https://drupal.org/node/1966780",
"refsource": "MISC",
"url": "https://drupal.org/node/1966780"
},
{
"name": "[oss-security] 20130412 Re: CVE request for Drupal contributed modules",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/12/1"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "27530",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/27530"
},
{
"name" : "http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/",
"refsource" : "MISC",
"url" : "http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/"
},
{ {
"name": "https://github.com/SquareSquash/web/commit/6d667c19e96e4f23dccbfbe24afeebd18e98e1c5", "name": "https://github.com/SquareSquash/web/commit/6d667c19e96e4f23dccbfbe24afeebd18e98e1c5",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/SquareSquash/web/commit/6d667c19e96e4f23dccbfbe24afeebd18e98e1c5" "url": "https://github.com/SquareSquash/web/commit/6d667c19e96e4f23dccbfbe24afeebd18e98e1c5"
}, },
{
"name": "squash-yaml-code-execution(86335)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86335"
},
{
"name": "27530",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/27530"
},
{ {
"name": "95992", "name": "95992",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/95992" "url": "http://osvdb.org/95992"
}, },
{ {
"name" : "squash-yaml-code-execution(86335)", "name": "http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/86335" "url": "http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-5147", "ID": "CVE-2013-5147",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "54886",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54886"
},
{ {
"name": "http://support.apple.com/kb/HT5934", "name": "http://support.apple.com/kb/HT5934",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "APPLE-SA-2013-09-18-2", "name": "APPLE-SA-2013-09-18-2",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html" "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
},
{
"name" : "54886",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54886"
} }
] ]
} }

View File

@ -52,11 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "54350",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54350"
},
{
"name": "95962",
"refsource": "OSVDB",
"url": "http://osvdb.org/95962"
},
{ {
"name": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-013", "name": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-013",
"refsource": "MISC", "refsource": "MISC",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-013" "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-013"
}, },
{
"name": "typo3-storeloactor-unspecified-sql-injection(86230)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86230"
},
{ {
"name": "http://typo3.org/extensions/repository/view/locator", "name": "http://typo3.org/extensions/repository/view/locator",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,21 +81,6 @@
"name": "61606", "name": "61606",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/61606" "url": "http://www.securityfocus.com/bid/61606"
},
{
"name" : "95962",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/95962"
},
{
"name" : "54350",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54350"
},
{
"name" : "typo3-storeloactor-unspecified-sql-injection(86230)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/86230"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-5552", "ID": "CVE-2013-5552",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5879", "ID": "CVE-2013-5879",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,30 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21669519",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21669519"
},
{ {
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21682096", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21682096",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682096" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682096"
}, },
{ {
"name" : "64758", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21669519",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/64758" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21669519"
},
{
"name" : "64825",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64825"
}, },
{ {
"name": "102030", "name": "102030",
@ -93,14 +78,29 @@
"url": "http://secunia.com/advisories/56463" "url": "http://secunia.com/advisories/56463"
}, },
{ {
"name" : "59704", "name": "64825",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/59704" "url": "http://www.securityfocus.com/bid/64825"
}, },
{ {
"name": "60504", "name": "60504",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60504" "url": "http://secunia.com/advisories/60504"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "59704",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59704"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2014-2630", "ID": "CVE-2014-2630",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,25 +57,25 @@
"refsource": "HP", "refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04394554" "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04394554"
}, },
{
"name": "hp-operations-cve20142630-priv-esc(95181)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95181"
},
{ {
"name": "SSRT101493", "name": "SSRT101493",
"refsource": "HP", "refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04394554" "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04394554"
}, },
{
"name" : "1030702",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030702"
},
{ {
"name": "60041", "name": "60041",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60041" "url": "http://secunia.com/advisories/60041"
}, },
{ {
"name" : "hp-operations-cve20142630-priv-esc(95181)", "name": "1030702",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95181" "url": "http://www.securitytracker.com/id/1030702"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20140328 XSS, CSRF and blind SQL injection in GD Star Rating 1.9.22 (WordPress plugin)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Mar/399"
},
{ {
"name": "https://advisories.dxw.com/advisories/csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/", "name": "https://advisories.dxw.com/advisories/csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://advisories.dxw.com/advisories/csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/" "url": "https://advisories.dxw.com/advisories/csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/"
}, },
{
"name": "gdstart-wordpress-sql-injection(92156)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92156"
},
{ {
"name": "57667", "name": "57667",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57667" "url": "http://secunia.com/advisories/57667"
}, },
{ {
"name" : "gdstart-wordpress-sql-injection(92156)", "name": "20140328 XSS, CSRF and blind SQL injection in GD Star Rating 1.9.22 (WordPress plugin)",
"refsource" : "XF", "refsource": "FULLDISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/92156" "url": "http://seclists.org/fulldisclosure/2014/Mar/399"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-2927", "ID": "CVE-2014-2927",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "34465", "name": "https://support.f5.com/kb/en-us/solutions/public/15000/200/sol15236.html",
"refsource" : "EXPLOIT-DB", "refsource": "CONFIRM",
"url" : "http://www.exploit-db.com/exploits/34465" "url": "https://support.f5.com/kb/en-us/solutions/public/15000/200/sol15236.html"
}, },
{ {
"name": "http://www.security-assessment.com/files/documents/advisory/F5_Unauthenticated_rsync_access_to_Remote_Root_Code_Execution.pdf", "name": "http://www.security-assessment.com/files/documents/advisory/F5_Unauthenticated_rsync_access_to_Remote_Root_Code_Execution.pdf",
@ -63,9 +63,9 @@
"url": "http://www.security-assessment.com/files/documents/advisory/F5_Unauthenticated_rsync_access_to_Remote_Root_Code_Execution.pdf" "url": "http://www.security-assessment.com/files/documents/advisory/F5_Unauthenticated_rsync_access_to_Remote_Root_Code_Execution.pdf"
}, },
{ {
"name" : "https://support.f5.com/kb/en-us/solutions/public/15000/200/sol15236.html", "name": "34465",
"refsource" : "CONFIRM", "refsource": "EXPLOIT-DB",
"url" : "https://support.f5.com/kb/en-us/solutions/public/15000/200/sol15236.html" "url": "http://www.exploit-db.com/exploits/34465"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-2969", "ID": "CVE-2014-2969",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6738", "ID": "CVE-2014-6738",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#582497",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name": "VU#532777", "name": "VU#532777",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/532777" "url": "http://www.kb.cert.org/vuls/id/532777"
}, },
{ {
"name" : "VU#582497", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/582497" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0068",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0068"
},
{ {
"name": "96649", "name": "96649",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/96649" "url": "http://www.securityfocus.com/bid/96649"
}, },
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0068",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0068"
},
{ {
"name": "1038006", "name": "1038006",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2017-0400", "ID": "CVE-2017-0400",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -70,16 +70,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac",
"refsource" : "CONFIRM",
"url" : "https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac"
},
{ {
"name": "https://source.android.com/security/bulletin/2017-01-01.html", "name": "https://source.android.com/security/bulletin/2017-01-01.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-01-01.html" "url": "https://source.android.com/security/bulletin/2017-01-01.html"
}, },
{
"name": "https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac"
},
{ {
"name": "95226", "name": "95226",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2017-0474", "ID": "CVE-2017-0474",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -60,15 +60,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01" "url": "https://source.android.com/security/bulletin/2017-03-01"
}, },
{
"name" : "96717",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96717"
},
{ {
"name": "1037968", "name": "1037968",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037968" "url": "http://www.securitytracker.com/id/1037968"
},
{
"name": "96717",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96717"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-07-05T00:00:00", "DATE_PUBLIC": "2017-07-05T00:00:00",
"ID": "CVE-2017-0700", "ID": "CVE-2017-0700",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-07-05T00:00:00", "DATE_PUBLIC": "2017-07-05T00:00:00",
"ID": "CVE-2017-0701", "ID": "CVE-2017-0701",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-07-05T00:00:00", "DATE_PUBLIC": "2017-07-05T00:00:00",
"ID": "CVE-2017-0703", "ID": "CVE-2017-0703",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-05-06T20:43:28.325153", "DATE_ASSIGNED": "2017-05-06T20:43:28.325153",
"ID": "CVE-2017-1000075", "ID": "CVE-2017-1000075",
"REQUESTER": "rockindaworld207@gmail.com", "REQUESTER": "rockindaworld207@gmail.com",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Gravity", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "1" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Creolabs" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Stack Overflow" "value": "n/a"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1039791",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039791"
},
{ {
"name": "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html", "name": "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "102140", "name": "102140",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102140" "url": "http://www.securityfocus.com/bid/102140"
},
{
"name" : "1039791",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039791"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1942", "ID": "CVE-2017-1942",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4133", "ID": "CVE-2017-4133",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4279", "ID": "CVE-2017-4279",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4379", "ID": "CVE-2017-4379",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4438", "ID": "CVE-2017-4438",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -69,9 +69,9 @@
"url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html" "url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html"
}, },
{ {
"name" : "101902", "name": "1039836",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/101902" "url": "http://www.securitytracker.com/id/1039836"
}, },
{ {
"name": "1039835", "name": "1039835",
@ -79,9 +79,9 @@
"url": "http://www.securitytracker.com/id/1039835" "url": "http://www.securitytracker.com/id/1039835"
}, },
{ {
"name" : "1039836", "name": "101902",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id/1039836" "url": "http://www.securityfocus.com/bid/101902"
} }
] ]
} }