"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:49:18 +00:00
parent 554a3ec63a
commit 227f81c85d
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 4535 additions and 4535 deletions

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/466682/100/0/threaded"
},
{
"name" : "35635",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35635"
},
{
"name": "2625",
"refsource": "SREASON",
@ -71,6 +66,11 @@
"name": "carbre-annotations-file-include(33816)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33816"
},
{
"name": "35635",
"refsource": "OSVDB",
"url": "http://osvdb.org/35635"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "1017971",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017971"
},
{
"name": "ADV-2007-1552",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1552"
},
{
"name": "symantec-backup-unspecified-bo(33931)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33931"
},
{
"name": "20070426 Symantec Norton Ghost 10 Service Manager Buffer Overflow Vulnerability",
"refsource": "IDEFENSE",
@ -62,25 +77,10 @@
"refsource": "CONFIRM",
"url": "http://www.symantec.com/avcenter/security/Content/2007.04.26.html"
},
{
"name" : "ADV-2007-1552",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1552"
},
{
"name" : "1017971",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017971"
},
{
"name": "25013",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25013"
},
{
"name" : "symantec-backup-unspecified-bo(33931)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33931"
}
]
}

View File

@ -53,25 +53,25 @@
"references": {
"reference_data": [
{
"name" : "20070614 Re: Apple Safari: urlbar/window title spoofing",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0311.html"
},
{
"name" : "20070614 Re: [Full-disclosure] Apple Safari: urlbar/window title spoofing",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/471452/100/0/threaded"
},
{
"name" : "20070615 Re: [Full-disclosure] Apple Safari: urlbar/window title spoofing",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/471454/100/0/threaded"
"name": "38862",
"refsource": "OSVDB",
"url": "http://osvdb.org/38862"
},
{
"name": "http://support.apple.com/kb/HT1467",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT1467"
},
{
"name": "ADV-2007-2316",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2316"
},
{
"name": "ADV-2008-0979",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0979/references"
},
{
"name": "APPLE-SA-2007-06-22",
"refsource": "APPLE",
@ -82,35 +82,35 @@
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008/Apr/msg00001.html"
},
{
"name" : "24484",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24484"
},
{
"name" : "38862",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38862"
},
{
"name" : "ADV-2007-2316",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2316"
},
{
"name": "1018282",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018282"
},
{
"name" : "ADV-2008-0979",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0979/references"
"name": "20070614 Re: Apple Safari: urlbar/window title spoofing",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0311.html"
},
{
"name": "safari-addressbar-spoofing(35050)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35050"
},
{
"name": "20070614 Re: [Full-disclosure] Apple Safari: urlbar/window title spoofing",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471452/100/0/threaded"
},
{
"name": "24484",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24484"
},
{
"name": "20070615 Re: [Full-disclosure] Apple Safari: urlbar/window title spoofing",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471454/100/0/threaded"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070504 NPDS <= 5.10 - Multiple SQL injections",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/467696/100/0/threaded"
"name": "2670",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2670"
},
{
"name": "http://www.aeroxteam.fr/exploit-NPDS-5.10.txt",
@ -67,16 +67,16 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23831"
},
{
"name": "20070504 NPDS <= 5.10 - Multiple SQL injections",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/467696/100/0/threaded"
},
{
"name": "36195",
"refsource": "OSVDB",
"url": "http://osvdb.org/36195"
},
{
"name" : "2670",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2670"
},
{
"name": "npds-mainfile-sql-injection(34109)",
"refsource": "XF",

View File

@ -52,6 +52,36 @@
},
"references": {
"reference_data": [
{
"name": "43463",
"refsource": "OSVDB",
"url": "http://osvdb.org/43463"
},
{
"name": "24352",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24352"
},
{
"name": "GLSA-200708-17",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200708-17.xml"
},
{
"name": "multiple-basic-authentication-spoofing(34983)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34983"
},
{
"name": "26545",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26545"
},
{
"name": "SUSE-SR:2007:015",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"name": "http://testing.bitsploit.de/test.html",
"refsource": "MISC",
@ -61,36 +91,6 @@
"name": "http://www.0x000000.com/?i=334",
"refsource": "MISC",
"url": "http://www.0x000000.com/?i=334"
},
{
"name" : "GLSA-200708-17",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200708-17.xml"
},
{
"name" : "SUSE-SR:2007:015",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"name" : "24352",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24352"
},
{
"name" : "43463",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/43463"
},
{
"name" : "26545",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26545"
},
{
"name" : "multiple-basic-authentication-spoofing(34983)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34983"
}
]
}

View File

@ -57,11 +57,36 @@
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
},
{
"name": "ADV-2007-3229",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3229"
},
{
"name": "25110",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25110"
},
{
"name": "4240",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4240"
},
{
"name": "http://www.vmware.com/support/server/doc/releasenotes_server.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
},
{
"name": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
},
{
"name": "26890",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26890"
},
{
"name": "http://www.vmware.com/support/ace/doc/releasenotes_ace.html",
"refsource": "CONFIRM",
@ -72,40 +97,15 @@
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
},
{
"name" : "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
},
{
"name" : "http://www.vmware.com/support/server/doc/releasenotes_server.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/server/doc/releasenotes_server.html"
},
{
"name" : "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
},
{
"name": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
},
{
"name" : "25110",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25110"
},
{
"name" : "ADV-2007-3229",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3229"
},
{
"name" : "26890",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26890"
"name": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
},
{
"name": "vmware-intraprocesslogging-file-overwrite(35675)",

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "1019457",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019457"
},
{
"name": "ADV-2008-0625",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0625"
},
{
"name": "27915",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27915"
},
{
"name": "20080219 EMC RepliStor Multiple Heap Overflow Vulnerabilities",
"refsource": "IDEFENSE",
@ -62,21 +77,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488419/100/0/threaded"
},
{
"name" : "27915",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27915"
},
{
"name" : "ADV-2008-0625",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0625"
},
{
"name" : "1019457",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019457"
},
{
"name": "29011",
"refsource": "SECUNIA",

View File

@ -53,14 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20070105 Re: a cheesy Apache / IIS DoS vuln (+a question)",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2007-01/0229.html"
"name": "SSRT101139",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2"
},
{
"name" : "http://ha.ckers.org/slowloris/",
"refsource" : "MISC",
"url" : "http://ha.ckers.org/slowloris/"
"name": "1038144",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038144"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017",
@ -73,12 +73,27 @@
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"
},
{
"name" : "HPSBUX02866",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136612293908376&w=2"
"name": "http://ha.ckers.org/slowloris/",
"refsource": "MISC",
"url": "http://ha.ckers.org/slowloris/"
},
{
"name" : "SSRT101139",
"name": "20070105 Re: a cheesy Apache / IIS DoS vuln (+a question)",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2007-01/0229.html"
},
{
"name": "oval:org.mitre.oval:def:19481",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19481"
},
{
"name": "apache-server-http-dos(72345)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72345"
},
{
"name": "HPSBUX02866",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2"
},
@ -87,30 +102,15 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.html"
},
{
"name" : "SUSE-SU-2012:0323",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00002.html"
},
{
"name": "21865",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21865"
},
{
"name" : "oval:org.mitre.oval:def:19481",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19481"
},
{
"name" : "1038144",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038144"
},
{
"name" : "apache-server-http-dos(72345)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72345"
"name": "SUSE-SU-2012:0323",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00002.html"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://bugs.chromium.org/40575",
"refsource" : "CONFIRM",
"url" : "http://bugs.chromium.org/40575"
},
{
"name" : "http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html"
"name": "63997",
"refsource": "OSVDB",
"url": "http://osvdb.org/63997"
},
{
"name": "39603",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/39603"
},
{
"name" : "63997",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/63997"
"name": "39544",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39544"
},
{
"name": "http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html"
},
{
"name": "oval:org.mitre.oval:def:11866",
@ -78,9 +78,9 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11866"
},
{
"name" : "39544",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39544"
"name": "http://bugs.chromium.org/40575",
"refsource": "CONFIRM",
"url": "http://bugs.chromium.org/40575"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.org/1004-exploits/helpcenterlive-lfi.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1004-exploits/helpcenterlive-lfi.txt"
},
{
"name" : "12421",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/12421"
},
{
"name" : "39732",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39732"
"name": "ADV-2010-1009",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1009"
},
{
"name": "39615",
@ -73,9 +63,19 @@
"url": "http://secunia.com/advisories/39615"
},
{
"name" : "ADV-2010-1009",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1009"
"name": "12421",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/12421"
},
{
"name": "http://packetstormsecurity.org/1004-exploits/helpcenterlive-lfi.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1004-exploits/helpcenterlive-lfi.txt"
},
{
"name": "39732",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39732"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-1814",
"STATE": "PUBLIC"
},
@ -52,70 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT4334",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4334"
},
{
"name" : "http://support.apple.com/kb/HT4455",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4455"
},
{
"name" : "http://support.apple.com/kb/HT4456",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4456"
},
{
"name" : "APPLE-SA-2010-09-08-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Sep/msg00002.html"
},
{
"name" : "APPLE-SA-2010-11-18-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html"
},
{
"name" : "APPLE-SA-2010-11-22-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
},
{
"name": "MDVSA-2011:039",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
},
{
"name" : "RHSA-2011:0177",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0177.html"
},
{
"name" : "SUSE-SR:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name" : "USN-1006-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1006-1"
},
{
"name" : "43083",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/43083"
},
{
"name" : "41856",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41856"
},
{
"name" : "42314",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42314"
"name": "ADV-2010-2722",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2722"
},
{
"name": "43068",
@ -123,14 +68,29 @@
"url": "http://secunia.com/advisories/43068"
},
{
"name" : "43086",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43086"
"name": "APPLE-SA-2010-09-08-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Sep/msg00002.html"
},
{
"name" : "ADV-2010-2722",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2722"
"name": "http://support.apple.com/kb/HT4334",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4334"
},
{
"name": "USN-1006-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1006-1"
},
{
"name": "http://support.apple.com/kb/HT4455",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4455"
},
{
"name": "41856",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41856"
},
{
"name": "ADV-2011-0212",
@ -143,14 +103,54 @@
"url": "http://www.vupen.com/english/advisories/2011/0216"
},
{
"name" : "ADV-2011-0552",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0552"
"name": "43086",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43086"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "APPLE-SA-2010-11-18-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html"
},
{
"name": "appleios-formmenus-code-exec(61701)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61701"
},
{
"name": "42314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42314"
},
{
"name": "RHSA-2011:0177",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0177.html"
},
{
"name": "ADV-2011-0552",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0552"
},
{
"name": "43083",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43083"
},
{
"name": "http://support.apple.com/kb/HT4456",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4456"
},
{
"name": "APPLE-SA-2010-11-22-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-1831",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1024723",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024723"
},
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name" : "1024723",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024723"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0076",
"STATE": "PUBLIC"
},
@ -53,64 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://eprint.iacr.org/2014/140",
"refsource" : "MISC",
"url" : "http://eprint.iacr.org/2014/140"
"name": "http://www.novell.com/support/kb/doc.php?id=7015300",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/kb/doc.php?id=7015300"
},
{
"name" : "http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2198be3483259de374f91e57d247d0fc667aef29",
"refsource" : "CONFIRM",
"url" : "http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2198be3483259de374f91e57d247d0fc667aef29"
"name": "59264",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59264"
},
{
"name" : "https://bugs.gentoo.org/show_bug.cgi?id=505278",
"refsource" : "CONFIRM",
"url" : "https://bugs.gentoo.org/show_bug.cgi?id=505278"
"name": "59454",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59454"
},
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=869945",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=869945"
"name": "66363",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66363"
},
{
"name" : "http://www.openssl.org/news/secadv_20140605.txt",
"refsource" : "CONFIRM",
"url" : "http://www.openssl.org/news/secadv_20140605.txt"
},
{
"name" : "http://advisories.mageia.org/MGASA-2014-0165.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2014-0165.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676035",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676035"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676062",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676062"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676419",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676419"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676424",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676424"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676655",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676655"
},
{
"name" : "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm",
"refsource" : "CONFIRM",
"url" : "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm"
"name": "58492",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58492"
},
{
"name": "http://www.novell.com/support/kb/doc.php?id=7015264",
@ -118,64 +83,109 @@
"url": "http://www.novell.com/support/kb/doc.php?id=7015264"
},
{
"name" : "http://www.novell.com/support/kb/doc.php?id=7015300",
"name": "https://bugs.gentoo.org/show_bug.cgi?id=505278",
"refsource": "CONFIRM",
"url" : "http://www.novell.com/support/kb/doc.php?id=7015300"
"url": "https://bugs.gentoo.org/show_bug.cgi?id=505278"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10075",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10075"
"name": "59445",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59445"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21673137",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21673137"
"name": "HPSBUX03046",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140266410314613&w=2"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677828",
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655",
"refsource": "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677828"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677695",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677695"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=isg400001841"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=isg400001843"
},
{
"name" : "http://support.apple.com/kb/HT6443",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6443"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092"
},
{
"name": "http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2198be3483259de374f91e57d247d0fc667aef29",
"refsource": "CONFIRM",
"url": "http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2198be3483259de374f91e57d247d0fc667aef29"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629",
"name": "HPSBOV03047",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140317760000786&w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828",
"refsource": "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629"
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828"
},
{
"name": "HPSBMU03074",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140621259019789&w=2"
},
{
"name": "59300",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59300"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0165.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0165.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695"
},
{
"name": "openSUSE-SU-2014:0480",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html"
},
{
"name": "59495",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59495"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841"
},
{
"name": "openSUSE-SU-2016:0640",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "59655",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59655"
},
{
"name": "59374",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59374"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501",
@ -187,125 +197,20 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name" : "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl"
},
{
"name" : "HPSBGN03050",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140482916501310&w=2"
},
{
"name" : "HPSBMU03051",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140448122410568&w=2"
},
{
"name" : "HPSBMU03056",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140389355508263&w=2"
},
{
"name": "HPSBMU03057",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140389274407904&w=2"
},
{
"name" : "HPSBMU03062",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140752315422991&w=2"
},
{
"name" : "HPSBMU03074",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140621259019789&w=2"
},
{
"name" : "HPSBMU03076",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140904544427729&w=2"
},
{
"name" : "HPSBOV03047",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140317760000786&w=2"
},
{
"name" : "HPSBUX03046",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140266410314613&w=2"
},
{
"name" : "SSRT101590",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140266410314613&w=2"
},
{
"name" : "MDVSA-2014:067",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2014:067"
},
{
"name" : "MDVSA-2015:062",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"
},
{
"name" : "openSUSE-SU-2016:0640",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
},
{
"name" : "openSUSE-SU-2014:0480",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html"
},
{
"name" : "USN-2165-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2165-1"
},
{
"name" : "66363",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/66363"
},
{
"name" : "58727",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/58727"
},
{
"name": "58939",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58939"
},
{
"name" : "59162",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59162"
},
{
"name" : "59300",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59300"
},
{
"name" : "59438",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59438"
},
{
"name" : "59450",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59450"
},
{
"name" : "59495",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59495"
"name": "SSRT101590",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140266410314613&w=2"
},
{
"name": "59514",
@ -313,54 +218,129 @@
"url": "http://secunia.com/advisories/59514"
},
{
"name" : "59490",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59490"
"name": "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl"
},
{
"name" : "59655",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59655"
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10075",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10075"
},
{
"name" : "59721",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59721"
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419"
},
{
"name" : "59413",
"name": "59438",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/59413"
"url": "http://secunia.com/advisories/59438"
},
{
"name" : "60571",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60571"
"name": "HPSBGN03050",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140482916501310&w=2"
},
{
"name" : "59445",
"name": "58727",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/59445"
"url": "http://secunia.com/advisories/58727"
},
{
"name" : "58492",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/58492"
"name": "http://www.openssl.org/news/secadv_20140605.txt",
"refsource": "CONFIRM",
"url": "http://www.openssl.org/news/secadv_20140605.txt"
},
{
"name": "http://support.apple.com/kb/HT6443",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6443"
},
{
"name": "USN-2165-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2165-1"
},
{
"name": "HPSBMU03076",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140904544427729&w=2"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629"
},
{
"name": "MDVSA-2014:067",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:067"
},
{
"name": "HPSBMU03062",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140752315422991&w=2"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=869945",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=869945"
},
{
"name": "59040",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59040"
},
{
"name": "HPSBMU03056",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140389355508263&w=2"
},
{
"name": "59175",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59175"
},
{
"name" : "59264",
"name": "HPSBMU03051",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140448122410568&w=2"
},
{
"name": "59413",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/59264"
"url": "http://secunia.com/advisories/59413"
},
{
"name": "59721",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59721"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137"
},
{
"name": "MDVSA-2015:062",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035"
},
{
"name": "59450",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59450"
},
{
"name": "59364",
@ -368,14 +348,34 @@
"url": "http://secunia.com/advisories/59364"
},
{
"name" : "59374",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59374"
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676424",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676424"
},
{
"name" : "59454",
"name": "60571",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/59454"
"url": "http://secunia.com/advisories/60571"
},
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm"
},
{
"name": "59162",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59162"
},
{
"name": "59490",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59490"
},
{
"name": "http://eprint.iacr.org/2014/140",
"refsource": "MISC",
"url": "http://eprint.iacr.org/2014/140"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0118",
"STATE": "PUBLIC"
},
@ -53,129 +53,129 @@
"references": {
"reference_data": [
{
"name" : "http://httpd.apache.org/security/vulnerabilities_24.html",
"refsource" : "CONFIRM",
"url" : "http://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"name" : "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c"
},
{
"name" : "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c?r1=1604353&r2=1610501&diff_format=h",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c?r1=1604353&r2=1610501&diff_format=h"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1120601",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1120601"
},
{
"name" : "http://advisories.mageia.org/MGASA-2014-0304.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2014-0304.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
"name": "HPSBUX03512",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=144493176821532&w=2"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0305.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0305.html"
},
{
"name" : "https://support.apple.com/HT204659",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT204659"
},
{
"name" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
"refsource" : "CONFIRM",
"url" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246"
},
{
"name" : "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES"
},
{
"name" : "https://puppet.com/security/cve/cve-2014-0118",
"refsource" : "CONFIRM",
"url" : "https://puppet.com/security/cve/cve-2014-0118"
},
{
"name" : "APPLE-SA-2015-04-08-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
},
{
"name": "DSA-2989",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2989"
},
{
"name" : "GLSA-201504-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-03"
},
{
"name" : "HPSBMU03380",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=143748090628601&w=2"
},
{
"name": "HPSBMU03409",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2"
},
{
"name" : "HPSBUX03337",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=143403519711434&w=2"
"name": "https://support.apple.com/HT204659",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT204659"
},
{
"name" : "HPSBUX03512",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=144493176821532&w=2"
"name": "http://httpd.apache.org/security/vulnerabilities_24.html",
"refsource": "CONFIRM",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"name" : "SSRT102066",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=143403519711434&w=2"
"name": "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES"
},
{
"name" : "SSRT102254",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=144493176821532&w=2"
},
{
"name" : "MDVSA-2014:142",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2014:142"
},
{
"name" : "RHSA-2014:1019",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1019.html"
"name": "GLSA-201504-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-03"
},
{
"name": "RHSA-2014:1020",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1020.html"
},
{
"name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c"
},
{
"name": "https://puppet.com/security/cve/cve-2014-0118",
"refsource": "CONFIRM",
"url": "https://puppet.com/security/cve/cve-2014-0118"
},
{
"name": "HPSBMU03380",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2"
},
{
"name": "SSRT102066",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c?r1=1604353&r2=1610501&diff_format=h",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c?r1=1604353&r2=1610501&diff_format=h"
},
{
"name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
"refsource": "CONFIRM",
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246"
},
{
"name": "RHSA-2014:1021",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1021.html"
},
{
"name": "SSRT102254",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=144493176821532&w=2"
},
{
"name": "68745",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68745"
},
{
"name": "APPLE-SA-2015-04-08-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
},
{
"name": "MDVSA-2014:142",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:142"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1120601",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120601"
},
{
"name": "RHSA-2014:1019",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1019.html"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0304.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0304.html"
},
{
"name": "HPSBUX03337",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-0815",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://blogs.opera.com/security/2014/01/security-changes-features-opera-19/",
"refsource" : "CONFIRM",
"url" : "http://blogs.opera.com/security/2014/01/security-changes-features-opera-19/"
},
{
"name" : "JVN#23256725",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN23256725/index.html"
"name": "opera-android-cve20140815-info-disc(91090)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91090"
},
{
"name": "JVNDB-2014-000014",
@ -73,9 +68,14 @@
"url": "http://www.securityfocus.com/bid/65391"
},
{
"name" : "opera-android-cve20140815-info-disc(91090)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/91090"
"name": "http://blogs.opera.com/security/2014/01/security-changes-features-opera-19/",
"refsource": "CONFIRM",
"url": "http://blogs.opera.com/security/2014/01/security-changes-features-opera-19/"
},
{
"name": "JVN#23256725",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN23256725/index.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1526",
"STATE": "PUBLIC"
},
@ -52,31 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-47.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-47.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=988106",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=988106"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "FEDORA-2014-5829",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html"
},
{
"name" : "GLSA-201504-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "openSUSE-SU-2014:0599",
"refsource": "SUSE",
@ -87,25 +62,50 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html"
},
{
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-47.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-47.html"
},
{
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "59866",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59866"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=988106",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=988106"
},
{
"name": "USN-2185-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2185-1"
},
{
"name" : "1030163",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030163"
},
{
"name": "1030164",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030164"
},
{
"name" : "59866",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59866"
"name": "1030163",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030163"
},
{
"name": "FEDORA-2014-5829",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1563",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-68.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-68.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1018524",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1018524"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
"name": "openSUSE-SU-2015:0138",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"
},
{
"name": "GLSA-201504-01",
@ -73,49 +63,59 @@
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name" : "openSUSE-SU-2014:1098",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"
},
{
"name" : "openSUSE-SU-2014:1099",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"
},
{
"name" : "openSUSE-SU-2015:0138",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"
},
{
"name" : "openSUSE-SU-2015:1266",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
},
{
"name" : "69523",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69523"
},
{
"name" : "1030793",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030793"
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "1030794",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030794"
},
{
"name": "69523",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69523"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018524",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018524"
},
{
"name": "openSUSE-SU-2015:1266",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
},
{
"name": "openSUSE-SU-2014:1098",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"
},
{
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-68.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-68.html"
},
{
"name": "60148",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60148"
},
{
"name": "openSUSE-SU-2014:1099",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"
},
{
"name": "61114",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61114"
},
{
"name": "1030793",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030793"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2014-1700",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
"name": "DSA-2883",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=344881",
@ -63,29 +63,29 @@
"url": "https://code.google.com/p/chromium/issues/detail?id=344881"
},
{
"name" : "https://src.chromium.org/viewvc/blink?revision=168171&view=revision",
"name": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html",
"refsource": "CONFIRM",
"url" : "https://src.chromium.org/viewvc/blink?revision=168171&view=revision"
},
{
"name" : "DSA-2883",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2883"
"url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
},
{
"name": "GLSA-201408-16",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
},
{
"name": "1029914",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029914"
},
{
"name": "openSUSE-SU-2014:0501",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html"
},
{
"name" : "1029914",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029914"
"name": "https://src.chromium.org/viewvc/blink?revision=168171&view=revision",
"refsource": "CONFIRM",
"url": "https://src.chromium.org/viewvc/blink?revision=168171&view=revision"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-1763",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20140716 VUPEN Security Research - Microsoft Internet Explorer CSS @import Memory Corruption (Pwn2Own 2014)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/532797/100/0/threaded"
},
{
"name" : "http://twitter.com/thezdi/statuses/443855973673754624",
"refsource" : "MISC",
"url" : "http://twitter.com/thezdi/statuses/443855973673754624"
"name": "MS14-037",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037"
},
{
"name": "http://www.pwn2own.com/2014/03/pwn2own-results-for-wednesday-day-one/",
@ -68,19 +63,24 @@
"url": "http://www.pwn2own.com/2014/03/pwn2own-results-for-wednesday-day-one/"
},
{
"name" : "MS14-037",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037"
},
{
"name" : "1030532",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030532"
"name": "20140716 VUPEN Security Research - Microsoft Internet Explorer CSS @import Memory Corruption (Pwn2Own 2014)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/532797/100/0/threaded"
},
{
"name": "59775",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59775"
},
{
"name": "http://twitter.com/thezdi/statuses/443855973673754624",
"refsource": "MISC",
"url": "http://twitter.com/thezdi/statuses/443855973673754624"
},
{
"name": "1030532",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030532"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://cgit.drupalcode.org/drupal/diff/includes/xmlrpc.inc?id=1849830",
"refsource" : "CONFIRM",
"url" : "http://cgit.drupalcode.org/drupal/diff/includes/xmlrpc.inc?id=1849830"
},
{
"name" : "https://core.trac.wordpress.org/changeset/29404",
"refsource" : "CONFIRM",
"url" : "https://core.trac.wordpress.org/changeset/29404"
"name": "DSA-3001",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3001"
},
{
"name": "https://wordpress.org/news/2014/08/wordpress-3-9-2/",
@ -72,15 +67,20 @@
"refsource": "CONFIRM",
"url": "https://www.drupal.org/SA-CORE-2014-004"
},
{
"name": "http://cgit.drupalcode.org/drupal/diff/includes/xmlrpc.inc?id=1849830",
"refsource": "CONFIRM",
"url": "http://cgit.drupalcode.org/drupal/diff/includes/xmlrpc.inc?id=1849830"
},
{
"name": "DSA-2999",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2999"
},
{
"name" : "DSA-3001",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-3001"
"name": "https://core.trac.wordpress.org/changeset/29404",
"refsource": "CONFIRM",
"url": "https://core.trac.wordpress.org/changeset/29404"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5903",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#823529",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/823529"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#823529",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/823529"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "36161",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/36161"
},
{
"name": "20150221 Easy Social Icons WordPress plugin v1.2.2 Persistent XSS and CSRF",
"refsource": "FULLDISC",
@ -67,6 +62,11 @@
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/130461/WordPress-Easy-Social-Icons-1.2.2-CSRF-XSS.html"
},
{
"name": "36161",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/36161"
},
{
"name": "https://wordpress.org/plugins/easy-social-icons/changelog/",
"refsource": "CONFIRM",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2404",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "MS15-065",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065"
},
{
"name": "1032894",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032894"
},
{
"name": "MS15-065",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-2731",
"STATE": "PUBLIC"
},
@ -52,6 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2015:1229",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html"
},
{
"name": "RHSA-2015:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1455.html"
},
{
"name": "GLSA-201512-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201512-10"
},
{
"name": "75541",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75541"
},
{
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-63.html",
"refsource": "CONFIRM",
@ -68,59 +88,39 @@
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name" : "DSA-3300",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3300"
},
{
"name" : "GLSA-201512-10",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201512-10"
},
{
"name" : "RHSA-2015:1455",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1455.html"
"name": "1032784",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032784"
},
{
"name": "RHSA-2015:1207",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1207.html"
},
{
"name" : "openSUSE-SU-2015:1229",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html"
},
{
"name": "USN-2656-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2656-1"
},
{
"name" : "USN-2656-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2656-2"
},
{
"name" : "75541",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75541"
},
{
"name": "1032783",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032783"
},
{
"name" : "1032784",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032784"
"name": "DSA-3300",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3300"
},
{
"name": "USN-2656-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2656-2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-2985",
"STATE": "PUBLIC"
},

View File

@ -57,20 +57,20 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/01/21/3"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a45f795c65b479b4ba107b6ccde29b896d51ee98",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a45f795c65b479b4ba107b6ccde29b896d51ee98"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1416101",
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a45f795c65b479b4ba107b6ccde29b896d51ee98",
"refsource": "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1416101"
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a45f795c65b479b4ba107b6ccde29b896d51ee98"
},
{
"name": "95713",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95713"
},
{
"name": "https://github.com/torvalds/linux/commit/a45f795c65b479b4ba107b6ccde29b896d51ee98",
@ -78,9 +78,9 @@
"url": "https://github.com/torvalds/linux/commit/a45f795c65b479b4ba107b6ccde29b896d51ee98"
},
{
"name" : "95713",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95713"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1416101",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416101"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4451",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://projects.theforeman.org/issues/15182",
"refsource" : "CONFIRM",
"url" : "http://projects.theforeman.org/issues/15182"
},
{
"name" : "http://projects.theforeman.org/projects/foreman/repository/revisions/1144040f444b4bf4aae81940a150b26b23b4623c",
"refsource" : "CONFIRM",
"url" : "http://projects.theforeman.org/projects/foreman/repository/revisions/1144040f444b4bf4aae81940a150b26b23b4623c"
"name": "RHSA-2018:0336",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0336"
},
{
"name": "https://theforeman.org/security.html#2016-4451",
@ -68,9 +63,14 @@
"url": "https://theforeman.org/security.html#2016-4451"
},
{
"name" : "RHSA-2018:0336",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0336"
"name": "http://projects.theforeman.org/projects/foreman/repository/revisions/1144040f444b4bf4aae81940a150b26b23b4623c",
"refsource": "CONFIRM",
"url": "http://projects.theforeman.org/projects/foreman/repository/revisions/1144040f444b4bf4aae81940a150b26b23b4623c"
},
{
"name": "http://projects.theforeman.org/issues/15182",
"refsource": "CONFIRM",
"url": "http://projects.theforeman.org/issues/15182"
}
]
}

View File

@ -53,25 +53,15 @@
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT207143",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207143"
"name": "APPLE-SA-2016-09-20-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html"
},
{
"name": "https://support.apple.com/HT207157",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207157"
},
{
"name" : "APPLE-SA-2016-09-20-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Sep/msg00007.html"
},
{
"name" : "APPLE-SA-2016-09-20-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html"
},
{
"name": "93053",
"refsource": "BID",
@ -81,6 +71,16 @@
"name": "1036854",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036854"
},
{
"name": "https://support.apple.com/HT207143",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207143"
},
{
"name": "APPLE-SA-2016-09-20-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00007.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8002",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -670,11 +670,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21993797",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21993797"
},
{
"name": "95650",
"refsource": "BID",
@ -684,6 +679,11 @@
"name": "1037710",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037710"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21993797",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21993797"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9254",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-334-02"
},
{
"name" : "94584",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94584"
},
{
"name": "105767",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105767"
},
{
"name": "94584",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94584"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://github.com/revive-adserver/revive-adserver/commit/f6880330a8e11e804663f132867e9eb9b1f94e83",
"refsource" : "MISC",
"url" : "https://github.com/revive-adserver/revive-adserver/commit/f6880330a8e11e804663f132867e9eb9b1f94e83"
"name": "83964",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/83964"
},
{
"name": "https://www.revive-adserver.com/security/revive-sa-2016-001/",
@ -63,9 +63,9 @@
"url": "https://www.revive-adserver.com/security/revive-sa-2016-001/"
},
{
"name" : "83964",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/83964"
"name": "https://github.com/revive-adserver/revive-adserver/commit/f6880330a8e11e804663f132867e9eb9b1f94e83",
"refsource": "MISC",
"url": "https://github.com/revive-adserver/revive-adserver/commit/f6880330a8e11e804663f132867e9eb9b1f94e83"
}
]
}