"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:26:39 +00:00
parent 4025a9d525
commit 2682e90a63
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 4287 additions and 4287 deletions

View File

@ -52,45 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "23966",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23966"
},
{ {
"name": "20060318 Advisory: BetaParticle Blog <= 6.0 Multiple Remote SQL InjectionVulnerabilities", "name": "20060318 Advisory: BetaParticle Blog <= 6.0 Multiple Remote SQL InjectionVulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/428082" "url": "http://www.securityfocus.com/archive/1/428082"
}, },
{
"name" : "http://www.nukedx.com/?viewdoc=20",
"refsource" : "MISC",
"url" : "http://www.nukedx.com/?viewdoc=20"
},
{
"name" : "http://blog.betaparticle.com/UserFiles/File/6fix.txt",
"refsource" : "CONFIRM",
"url" : "http://blog.betaparticle.com/UserFiles/File/6fix.txt"
},
{
"name" : "17148",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17148"
},
{ {
"name": "ADV-2006-1000", "name": "ADV-2006-1000",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1000" "url": "http://www.vupen.com/english/advisories/2006/1000"
}, },
{ {
"name" : "23965", "name": "http://www.nukedx.com/?viewdoc=20",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://www.osvdb.org/23965" "url": "http://www.nukedx.com/?viewdoc=20"
}, },
{ {
"name" : "23966", "name": "bpblog-multiple-sql-injection(25327)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://www.osvdb.org/23966" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25327"
},
{
"name" : "1015788",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015788"
}, },
{ {
"name": "19292", "name": "19292",
@ -103,9 +88,24 @@
"url": "http://securityreason.com/securityalert/600" "url": "http://securityreason.com/securityalert/600"
}, },
{ {
"name" : "bpblog-multiple-sql-injection(25327)", "name": "http://blog.betaparticle.com/UserFiles/File/6fix.txt",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25327" "url": "http://blog.betaparticle.com/UserFiles/File/6fix.txt"
},
{
"name": "17148",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17148"
},
{
"name": "1015788",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015788"
},
{
"name": "23965",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23965"
} }
] ]
} }

View File

@ -52,30 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://security-protocols.com/vids/skype_osx_0day.htm",
"refsource" : "MISC",
"url" : "http://security-protocols.com/vids/skype_osx_0day.htm"
},
{
"name" : "http://www.security-protocols.com/modules.php?name=News&file=article&sid=3259",
"refsource" : "MISC",
"url" : "http://www.security-protocols.com/modules.php?name=News&file=article&sid=3259"
},
{
"name" : "http://www.skype.com/security/skype-sb-2006-002.html",
"refsource" : "CONFIRM",
"url" : "http://www.skype.com/security/skype-sb-2006-002.html"
},
{ {
"name": "VU#202604", "name": "VU#202604",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/202604" "url": "http://www.kb.cert.org/vuls/id/202604"
}, },
{ {
"name" : "20218", "name": "22185",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/20218" "url": "http://secunia.com/advisories/22185/"
}, },
{ {
"name": "ADV-2006-3895", "name": "ADV-2006-3895",
@ -88,9 +73,24 @@
"url": "http://securitytracker.com/id?1016966" "url": "http://securitytracker.com/id?1016966"
}, },
{ {
"name" : "22185", "name": "20218",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/22185/" "url": "http://www.securityfocus.com/bid/20218"
},
{
"name": "http://security-protocols.com/vids/skype_osx_0day.htm",
"refsource": "MISC",
"url": "http://security-protocols.com/vids/skype_osx_0day.htm"
},
{
"name": "http://www.skype.com/security/skype-sb-2006-002.html",
"refsource": "CONFIRM",
"url": "http://www.skype.com/security/skype-sb-2006-002.html"
},
{
"name": "http://www.security-protocols.com/modules.php?name=News&file=article&sid=3259",
"refsource": "MISC",
"url": "http://www.security-protocols.com/modules.php?name=News&file=article&sid=3259"
} }
] ]
} }

View File

@ -57,16 +57,16 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2473" "url": "https://www.exploit-db.com/exploits/2473"
}, },
{
"name" : "20327",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20327"
},
{ {
"name": "22400", "name": "22400",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22400" "url": "http://secunia.com/advisories/22400"
}, },
{
"name": "20327",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20327"
},
{ {
"name": "invisiongallery-index-sql-injection(29333)", "name": "invisiongallery-index-sql-injection(29333)",
"refsource": "XF", "refsource": "XF",

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2568" "url": "https://www.exploit-db.com/exploits/2568"
}, },
{
"name" : "20540",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20540"
},
{ {
"name": "webspell-index-sql-injection(29563)", "name": "webspell-index-sql-injection(29563)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29563" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29563"
},
{
"name": "20540",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20540"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061113 Real Estate Listing System SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/451503/100/200/threaded"
},
{ {
"name": "http://aria-security.net/advisory/Real%20Estate%20Listing%20System.txt", "name": "http://aria-security.net/advisory/Real%20Estate%20Listing%20System.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://aria-security.net/advisory/Real%20Estate%20Listing%20System.txt" "url": "http://aria-security.net/advisory/Real%20Estate%20Listing%20System.txt"
}, },
{
"name": "ADV-2006-4526",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4526"
},
{ {
"name": "21109", "name": "21109",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/21109" "url": "http://www.securityfocus.com/bid/21109"
}, },
{ {
"name" : "ADV-2006-4526", "name": "20061113 Real Estate Listing System SQL Injection",
"refsource" : "VUPEN", "refsource": "BUGTRAQ",
"url" : "http://www.vupen.com/english/advisories/2006/4526" "url": "http://www.securityfocus.com/archive/1/451503/100/200/threaded"
}, },
{ {
"name": "22894", "name": "22894",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-5966", "ID": "CVE-2006-5966",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20061116 Secunia Research: Panda ActiveScan Multiple Vulnerabilities", "name": "pandaactivescan-pavpz-info-disclosure(30318)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/451864/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30318"
},
{
"name" : "http://secunia.com/secunia_research/2006-64/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2006-64/advisory/"
},
{
"name" : "21132",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21132"
},
{
"name" : "ADV-2006-4536",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4536"
}, },
{ {
"name": "21763", "name": "21763",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21763" "url": "http://secunia.com/advisories/21763"
}, },
{
"name": "21132",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21132"
},
{
"name": "http://secunia.com/secunia_research/2006-64/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-64/advisory/"
},
{
"name": "ADV-2006-4536",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4536"
},
{
"name": "20061116 Secunia Research: Panda ActiveScan Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/451864/100/0/threaded"
},
{ {
"name": "pandaactivescan-activescan-dos(30317)", "name": "pandaactivescan-activescan-dos(30317)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30317" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30317"
},
{
"name" : "pandaactivescan-pavpz-info-disclosure(30318)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30318"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "23735", "name": "ariadne-index-xss(33987)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/23735" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33987"
}, },
{ {
"name": "35493", "name": "35493",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/25090" "url": "http://secunia.com/advisories/25090"
}, },
{ {
"name" : "ariadne-index-xss(33987)", "name": "23735",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33987" "url": "http://www.securityfocus.com/bid/23735"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "25358",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25358"
},
{ {
"name": "3963", "name": "3963",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -62,25 +67,20 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.wavelinkmedia.com/scripts/tutorialcms/" "url": "http://www.wavelinkmedia.com/scripts/tutorialcms/"
}, },
{
"name" : "ADV-2007-1903",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1903"
},
{ {
"name": "36520", "name": "36520",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/36520" "url": "http://osvdb.org/36520"
}, },
{
"name" : "25358",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25358"
},
{ {
"name": "tutorialcms-multiple-security-bypass(34401)", "name": "tutorialcms-multiple-security-bypass(34401)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34401" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34401"
},
{
"name": "ADV-2007-1903",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1903"
} }
] ]
} }

View File

@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070525 BoastMachine index.php Cross Site Scripting Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/469590/100/0/threaded"
},
{ {
"name": "24156", "name": "24156",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/24156" "url": "http://www.securityfocus.com/bid/24156"
}, },
{ {
"name" : "38060", "name": "boastmachine-index-xss(34509)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/38060" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34509"
},
{
"name": "20070525 BoastMachine index.php Cross Site Scripting Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/469590/100/0/threaded"
}, },
{ {
"name": "2743", "name": "2743",
@ -73,9 +73,9 @@
"url": "http://securityreason.com/securityalert/2743" "url": "http://securityreason.com/securityalert/2743"
}, },
{ {
"name" : "boastmachine-index-xss(34509)", "name": "38060",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34509" "url": "http://osvdb.org/38060"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2007-2952", "ID": "CVE-2007-2952",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,20 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494975/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/494975/100/0/threaded"
}, },
{
"name" : "20080731 Secunia Research: Blue Coat K9 Web Protection Response Handling Buffer Overflows",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/494984/100/0/threaded"
},
{ {
"name": "http://secunia.com/secunia_research/2007-61/advisory/", "name": "http://secunia.com/secunia_research/2007-61/advisory/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://secunia.com/secunia_research/2007-61/advisory/" "url": "http://secunia.com/secunia_research/2007-61/advisory/"
}, },
{ {
"name" : "http://secunia.com/secunia_research/2007-64/advisory/", "name": "bluecoat-k9-referer-bo(44123)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://secunia.com/secunia_research/2007-64/advisory/" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44123"
}, },
{ {
"name": "30463", "name": "30463",
@ -82,16 +77,21 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/30464" "url": "http://www.securityfocus.com/bid/30464"
}, },
{
"name" : "ADV-2008-2263",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2263/references"
},
{ {
"name": "1020587", "name": "1020587",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020587" "url": "http://www.securitytracker.com/id?1020587"
}, },
{
"name": "http://secunia.com/secunia_research/2007-64/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2007-64/advisory/"
},
{
"name": "ADV-2008-2263",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2263/references"
},
{ {
"name": "1020588", "name": "1020588",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -102,15 +102,15 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25813" "url": "http://secunia.com/advisories/25813"
}, },
{
"name" : "bluecoat-k9-referer-bo(44123)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44123"
},
{ {
"name": "bluecoat-k9-version-bo(44124)", "name": "bluecoat-k9-version-bo(44124)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44124" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44124"
},
{
"name": "20080731 Secunia Research: Blue Coat K9 Web Protection Response Handling Buffer Overflows",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494984/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2007-2958", "ID": "CVE-2007-2958",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,20 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "26550",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26550"
},
{
"name": "ADV-2007-2971",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2971"
},
{
"name": "26610",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26610"
},
{ {
"name": "http://secunia.com/secunia_research/2007-70/advisory/", "name": "http://secunia.com/secunia_research/2007-70/advisory/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://secunia.com/secunia_research/2007-70/advisory/" "url": "http://secunia.com/secunia_research/2007-70/advisory/"
}, },
{
"name": "40184",
"refsource": "OSVDB",
"url": "http://osvdb.org/40184"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=254121", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=254121",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=254121" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=254121"
}, },
{ {
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=190104", "name": "27229",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=190104" "url": "http://secunia.com/advisories/27229"
},
{
"name": "27379",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27379"
},
{
"name": "sylpheed-incputerror-format-string(36238)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36238"
}, },
{ {
"name": "FEDORA-2007-2009", "name": "FEDORA-2007-2009",
@ -77,50 +107,20 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200710-29.xml" "url": "http://security.gentoo.org/glsa/glsa-200710-29.xml"
}, },
{
"name" : "SUSE-SR:2007:020",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_20_sr.html"
},
{ {
"name": "25430", "name": "25430",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25430" "url": "http://www.securityfocus.com/bid/25430"
}, },
{ {
"name" : "ADV-2007-2971", "name": "SUSE-SR:2007:020",
"refsource" : "VUPEN", "refsource": "SUSE",
"url" : "http://www.vupen.com/english/advisories/2007/2971" "url": "http://www.novell.com/linux/security/advisories/2007_20_sr.html"
}, },
{ {
"name" : "40184", "name": "http://bugs.gentoo.org/show_bug.cgi?id=190104",
"refsource" : "OSVDB", "refsource": "CONFIRM",
"url" : "http://osvdb.org/40184" "url": "http://bugs.gentoo.org/show_bug.cgi?id=190104"
},
{
"name" : "26550",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26550"
},
{
"name" : "26610",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26610"
},
{
"name" : "27379",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27379"
},
{
"name" : "27229",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27229"
},
{
"name" : "sylpheed-incputerror-format-string(36238)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36238"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-0185", "ID": "CVE-2010-0185",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "38007",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38007"
},
{
"name": "ADV-2010-0259",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0259"
},
{
"name": "1023519",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023519"
},
{
"name": "coldfusion-solr-information-disclosure(55997)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55997"
},
{
"name": "38387",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38387"
},
{ {
"name": "http://kb2.adobe.com/cps/807/cpsid_80719.html", "name": "http://kb2.adobe.com/cps/807/cpsid_80719.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,35 +87,10 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-04.html" "url": "http://www.adobe.com/support/security/bulletins/apsb10-04.html"
}, },
{
"name" : "38007",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/38007"
},
{ {
"name": "62037", "name": "62037",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/62037" "url": "http://osvdb.org/62037"
},
{
"name" : "1023519",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1023519"
},
{
"name" : "38387",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38387"
},
{
"name" : "ADV-2010-0259",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/0259"
},
{
"name" : "coldfusion-solr-information-disclosure(55997)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55997"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "was-wsadmin-info-disclosure(57185)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57185"
},
{ {
"name": "PK95089", "name": "PK95089",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
@ -61,11 +66,6 @@
"name": "39140", "name": "39140",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39140" "url": "http://secunia.com/advisories/39140"
},
{
"name" : "was-wsadmin-info-disclosure(57185)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57185"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[dailydave] 20100304 Perforce",
"refsource" : "MLIST",
"url" : "http://lists.immunitysec.com/pipermail/dailydave/2010-March/006063.html"
},
{ {
"name": "36261", "name": "36261",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/36261" "url": "http://www.securityfocus.com/bid/36261"
},
{
"name": "[dailydave] 20100304 Perforce",
"refsource": "MLIST",
"url": "http://lists.immunitysec.com/pipermail/dailydave/2010-March/006063.html"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.org/1001-exploits/joomlajashowcase-traversal.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1001-exploits/joomlajashowcase-traversal.txt"
},
{ {
"name": "11090", "name": "11090",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11090" "url": "http://www.exploit-db.com/exploits/11090"
}, },
{
"name": "33486",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33486"
},
{ {
"name": "37692", "name": "37692",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/37692" "url": "http://www.securityfocus.com/bid/37692"
}, },
{ {
"name" : "33486", "name": "http://packetstormsecurity.org/1001-exploits/joomlajashowcase-traversal.txt",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/33486" "url": "http://packetstormsecurity.org/1001-exploits/joomlajashowcase-traversal.txt"
}, },
{ {
"name": "jashowcase-index-directory-traversal(55512)", "name": "jashowcase-index-directory-traversal(55512)",

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "apple-ftpproxy-security-bypass(56701)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56701"
},
{ {
"name": "20100304 Apple Airport Wireless Products: Promiscuous FTP PORT Allowed in FTP Proxy Provides Security Bypass", "name": "20100304 Apple Airport Wireless Products: Promiscuous FTP PORT Allowed in FTP Proxy Provides Security Bypass",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/509867/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/509867/100/0/threaded"
}, },
{
"name" : "20100309 Re: Apple Airport Wireless Products: Promiscuous FTP PORT Allowed in FTP Proxy Provides Security Bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/509974/100/0/threaded"
},
{
"name" : "20100304 Apple Airport Wireless Products: Promiscuous FTP PORT Allowed in FTP Proxy Provides Security Bypass",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2010/Mar/106"
},
{ {
"name": "38543", "name": "38543",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/38543" "url": "http://www.securityfocus.com/bid/38543"
}, },
{ {
"name" : "apple-ftpproxy-security-bypass(56701)", "name": "20100304 Apple Airport Wireless Products: Promiscuous FTP PORT Allowed in FTP Proxy Provides Security Bypass",
"refsource" : "XF", "refsource": "FULLDISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56701" "url": "http://seclists.org/fulldisclosure/2010/Mar/106"
},
{
"name": "20100309 Re: Apple Airport Wireless Products: Promiscuous FTP PORT Allowed in FTP Proxy Provides Security Bypass",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/509974/100/0/threaded"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20100721 ZDI-10-134: Mozilla Firefox DOM Attribute Cloning Remote Code Execution Vulnerability", "name": "oval:org.mitre.oval:def:11740",
"refsource" : "BUGTRAQ", "refsource": "OVAL",
"url" : "http://www.securityfocus.com/archive/1/512515" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11740"
}, },
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-134/", "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-134/",
@ -63,9 +63,9 @@
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-134/" "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-134/"
}, },
{ {
"name" : "http://www.mozilla.org/security/announce/2010/mfsa2010-35.html", "name": "41849",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.mozilla.org/security/announce/2010/mfsa2010-35.html" "url": "http://www.securityfocus.com/bid/41849"
}, },
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=572986", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=572986",
@ -73,14 +73,14 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=572986" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=572986"
}, },
{ {
"name" : "41849", "name": "http://www.mozilla.org/security/announce/2010/mfsa2010-35.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/41849" "url": "http://www.mozilla.org/security/announce/2010/mfsa2010-35.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:11740", "name": "20100721 ZDI-10-134: Mozilla Firefox DOM Attribute Cloning Remote Code Execution Vulnerability",
"refsource" : "OVAL", "refsource": "BUGTRAQ",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11740" "url": "http://www.securityfocus.com/archive/1/512515"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "39238",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39238"
},
{ {
"name": "20100406 CA20100406-01: Security Notice for CA XOsoft", "name": "20100406 CA20100406-01: Security Notice for CA XOsoft",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -63,29 +68,24 @@
"url": "http://www.securityfocus.com/archive/1/510565/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/510565/100/0/threaded"
}, },
{ {
"name" : "20100406 ZDI-10-066: CA XOsoft Control Service entry_point.aspx Remote Code Execution Vulnerability", "name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=232869",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/510567/100/0/threaded" "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=232869"
}, },
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-065/", "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-065/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-065/" "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-065/"
}, },
{
"name": "20100406 ZDI-10-066: CA XOsoft Control Service entry_point.aspx Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/510567/100/0/threaded"
},
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-066/", "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-066/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-066/" "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-066/"
},
{
"name" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=232869",
"refsource" : "CONFIRM",
"url" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=232869"
},
{
"name" : "39238",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39238"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "comloginbox-view-file-include(57533)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57533"
},
{ {
"name": "http://packetstormsecurity.org/1004-exploits/joomlaloginbox-lfi.txt", "name": "http://packetstormsecurity.org/1004-exploits/joomlaloginbox-lfi.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.org/1004-exploits/joomlaloginbox-lfi.txt" "url": "http://packetstormsecurity.org/1004-exploits/joomlaloginbox-lfi.txt"
}, },
{
"name" : "12068",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/12068"
},
{ {
"name": "39212", "name": "39212",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/39212" "url": "http://www.securityfocus.com/bid/39212"
}, },
{ {
"name" : "39349", "name": "12068",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/39349" "url": "http://www.exploit-db.com/exploits/12068"
}, },
{ {
"name": "ADV-2010-0808", "name": "ADV-2010-0808",
@ -78,9 +78,9 @@
"url": "http://www.vupen.com/english/advisories/2010/0808" "url": "http://www.vupen.com/english/advisories/2010/0808"
}, },
{ {
"name" : "comloginbox-view-file-include(57533)", "name": "39349",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57533" "url": "http://secunia.com/advisories/39349"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-4467", "ID": "CVE-2010-4467",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html"
},
{ {
"name": "GLSA-201406-32", "name": "GLSA-201406-32",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
}, },
{ {
"name" : "HPSBMU02797", "name": "oracle-runtime-deployment-code-exec(65398)",
"refsource" : "HP", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=134254957702612&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65398"
},
{
"name" : "SSRT100867",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
}, },
{ {
"name": "HPSBMU02799", "name": "HPSBMU02799",
@ -78,9 +68,14 @@
"url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2" "url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
}, },
{ {
"name" : "RHSA-2011:0282", "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0282.html" "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html"
},
{
"name": "44954",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44954"
}, },
{ {
"name": "RHSA-2011:0880", "name": "RHSA-2011:0880",
@ -93,9 +88,9 @@
"url": "http://www.securityfocus.com/bid/46395" "url": "http://www.securityfocus.com/bid/46395"
}, },
{ {
"name" : "oval:org.mitre.oval:def:12269", "name": "RHSA-2011:0282",
"refsource" : "OVAL", "refsource": "REDHAT",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12269" "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html"
}, },
{ {
"name": "oval:org.mitre.oval:def:14384", "name": "oval:org.mitre.oval:def:14384",
@ -103,14 +98,19 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14384" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14384"
}, },
{ {
"name" : "44954", "name": "SSRT100867",
"refsource" : "SECUNIA", "refsource": "HP",
"url" : "http://secunia.com/advisories/44954" "url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
}, },
{ {
"name" : "oracle-runtime-deployment-code-exec(65398)", "name": "oval:org.mitre.oval:def:12269",
"refsource" : "XF", "refsource": "OVAL",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65398" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12269"
},
{
"name": "HPSBMU02797",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "14281",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/14281"
},
{
"name" : "41491",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/41491"
},
{ {
"name": "ADV-2010-1768", "name": "ADV-2010-1768",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -71,6 +61,16 @@
"name": "kmsoft-guestbook-default-sql-injection(60198)", "name": "kmsoft-guestbook-default-sql-injection(60198)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60198" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60198"
},
{
"name": "41491",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41491"
},
{
"name": "14281",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14281"
} }
] ]
} }

View File

@ -57,45 +57,45 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html"
}, },
{
"name" : "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
},
{ {
"name": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/", "name": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/" "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/"
}, },
{
"name" : "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource" : "MISC",
"url" : "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name" : "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource" : "MISC",
"url" : "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name" : "http://www.f-secure.com/weblog/archives/00001949.html",
"refsource" : "MISC",
"url" : "http://www.f-secure.com/weblog/archives/00001949.html"
},
{
"name" : "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/",
"refsource" : "MISC",
"url" : "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
},
{ {
"name": "39924", "name": "39924",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/39924" "url": "http://www.securityfocus.com/bid/39924"
}, },
{
"name": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource": "MISC",
"url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
},
{ {
"name": "67660", "name": "67660",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/67660" "url": "http://www.osvdb.org/67660"
},
{
"name": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/",
"refsource": "MISC",
"url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
},
{
"name": "http://www.f-secure.com/weblog/archives/00001949.html",
"refsource": "MISC",
"url": "http://www.f-secure.com/weblog/archives/00001949.html"
},
{
"name": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource": "MISC",
"url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-0418", "ID": "CVE-2014-0418",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "name": "RHSA-2014:0414",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" "url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name": "SSRT101455",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name": "56535",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56535"
},
{
"name": "RHSA-2014:0030",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
},
{
"name": "56485",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56485"
},
{
"name": "SSRT101454",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
}, },
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
@ -73,59 +98,34 @@
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2" "url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
}, },
{ {
"name" : "SSRT101454", "name": "1029608",
"refsource" : "HP", "refsource": "SECTRACK",
"url" : "http://marc.info/?l=bugtraq&m=139402697611681&w=2" "url": "http://www.securitytracker.com/id/1029608"
},
{
"name" : "SSRT101455",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name" : "RHSA-2014:0030",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
},
{
"name" : "RHSA-2014:0414",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "64758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64758"
}, },
{ {
"name": "64917", "name": "64917",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/64917" "url": "http://www.securityfocus.com/bid/64917"
}, },
{
"name": "oracle-cpujan2014-cve20140418(90344)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90344"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{ {
"name": "102012", "name": "102012",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/102012" "url": "http://osvdb.org/102012"
}, },
{ {
"name" : "1029608", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1029608" "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name" : "56485",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56485"
},
{
"name" : "56535",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56535"
},
{
"name" : "oracle-cpujan2014-cve20140418(90344)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90344"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-0764", "ID": "CVE-2014-0764",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-0846", "ID": "CVE-2014-0846",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21664412" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21664412"
}, },
{
"name" : "65917",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/65917"
},
{ {
"name": "ibm-rrc-cve20140846-xss(90720)", "name": "ibm-rrc-cve20140846-xss(90720)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90720" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90720"
},
{
"name": "65917",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65917"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-0854", "ID": "CVE-2014-0854",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21662856",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21662856"
},
{ {
"name": "ibm-cognos-cve20140854-xxe(90794)", "name": "ibm-cognos-cve20140854-xxe(90794)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90794" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90794"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21662856",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21662856"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-0883", "ID": "CVE-2014-0883",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20150522 [CORE-2015-0010] - Sendio ESP Information Disclosure Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/535592/100/0/threaded"
},
{
"name" : "37114",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/37114"
},
{ {
"name": "20150522 [CORE-2015-0010] - Sendio ESP Information Disclosure Vulnerability", "name": "20150522 [CORE-2015-0010] - Sendio ESP Information Disclosure Vulnerability",
"refsource": "FULLDISC", "refsource": "FULLDISC",
@ -72,10 +62,20 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html" "url": "http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html"
}, },
{
"name": "20150522 [CORE-2015-0010] - Sendio ESP Information Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/535592/100/0/threaded"
},
{ {
"name": "http://www.sendio.com/software-release-history/", "name": "http://www.sendio.com/software-release-history/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.sendio.com/software-release-history/" "url": "http://www.sendio.com/software-release-history/"
},
{
"name": "37114",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/37114"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1555", "ID": "CVE-2014-1555",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-61.html", "name": "68814",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-61.html" "url": "http://www.securityfocus.com/bid/68814"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1023121", "name": "59719",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1023121" "url": "http://secunia.com/advisories/59719"
},
{
"name": "60083",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60083"
},
{
"name": "60621",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60621"
},
{
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "60306",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60306"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
@ -73,64 +93,34 @@
"url": "http://linux.oracle.com/errata/ELSA-2014-0918.html" "url": "http://linux.oracle.com/errata/ELSA-2014-0918.html"
}, },
{ {
"name" : "DSA-2986", "name": "1030620",
"refsource" : "DEBIAN", "refsource": "SECTRACK",
"url" : "http://www.debian.org/security/2014/dsa-2986" "url": "http://www.securitytracker.com/id/1030620"
},
{
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-61.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-61.html"
}, },
{ {
"name": "DSA-2996", "name": "DSA-2996",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2996" "url": "http://www.debian.org/security/2014/dsa-2996"
}, },
{
"name" : "GLSA-201504-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-01"
},
{
"name" : "68814",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68814"
},
{ {
"name": "1030619", "name": "1030619",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030619" "url": "http://www.securitytracker.com/id/1030619"
}, },
{
"name" : "1030620",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030620"
},
{
"name" : "59591",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59591"
},
{
"name" : "59719",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59719"
},
{
"name" : "59760",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59760"
},
{
"name" : "60306",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60306"
},
{ {
"name": "60486", "name": "60486",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60486" "url": "http://secunia.com/advisories/60486"
}, },
{ {
"name" : "60621", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1023121",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/60621" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1023121"
}, },
{ {
"name": "60628", "name": "60628",
@ -138,9 +128,19 @@
"url": "http://secunia.com/advisories/60628" "url": "http://secunia.com/advisories/60628"
}, },
{ {
"name" : "60083", "name": "DSA-2986",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2986"
},
{
"name": "59760",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/60083" "url": "http://secunia.com/advisories/59760"
},
{
"name": "59591",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59591"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-4098", "ID": "CVE-2014-4098",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS14-052", "name": "ms-ie-cve20144098-code-exec(95528)",
"refsource" : "MS", "refsource": "XF",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95528"
}, },
{ {
"name": "69606", "name": "69606",
@ -68,9 +68,9 @@
"url": "http://www.securitytracker.com/id/1030818" "url": "http://www.securitytracker.com/id/1030818"
}, },
{ {
"name" : "ms-ie-cve20144098-code-exec(95528)", "name": "MS14-052",
"refsource" : "XF", "refsource": "MS",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95528" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-4367", "ID": "CVE-2014-4367",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,9 +58,9 @@
"url": "http://support.apple.com/kb/HT6441" "url": "http://support.apple.com/kb/HT6441"
}, },
{ {
"name" : "APPLE-SA-2014-09-17-1", "name": "1030866",
"refsource" : "APPLE", "refsource": "SECTRACK",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html" "url": "http://www.securitytracker.com/id/1030866"
}, },
{ {
"name": "69882", "name": "69882",
@ -68,19 +68,19 @@
"url": "http://www.securityfocus.com/bid/69882" "url": "http://www.securityfocus.com/bid/69882"
}, },
{ {
"name" : "69945", "name": "APPLE-SA-2014-09-17-1",
"refsource" : "BID", "refsource": "APPLE",
"url" : "http://www.securityfocus.com/bid/69945" "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"name" : "1030866",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030866"
}, },
{ {
"name": "appleios-cve20144367-sec-bypass(96091)", "name": "appleios-cve20144367-sec-bypass(96091)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96091" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96091"
},
{
"name": "69945",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69945"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-3331", "ID": "CVE-2016-3331",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS16-118",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-118"
},
{ {
"name": "MS16-119", "name": "MS16-119",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-119" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-119"
}, },
{ {
"name" : "93387", "name": "MS16-118",
"refsource" : "BID", "refsource": "MS",
"url" : "http://www.securityfocus.com/bid/93387" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-118"
},
{
"name": "1036993",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036993"
}, },
{ {
"name": "1036992", "name": "1036992",
@ -73,9 +73,9 @@
"url": "http://www.securitytracker.com/id/1036992" "url": "http://www.securitytracker.com/id/1036992"
}, },
{ {
"name" : "1036993", "name": "93387",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id/1036993" "url": "http://www.securityfocus.com/bid/93387"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-3373", "ID": "CVE-2016-3373",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "40430",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40430/"
},
{ {
"name": "MS16-111", "name": "MS16-111",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-111" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-111"
}, },
{
"name": "1036802",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036802"
},
{ {
"name": "92845", "name": "92845",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92845" "url": "http://www.securityfocus.com/bid/92845"
}, },
{ {
"name" : "1036802", "name": "40430",
"refsource" : "SECTRACK", "refsource": "EXPLOIT-DB",
"url" : "http://www.securitytracker.com/id/1036802" "url": "https://www.exploit-db.com/exploits/40430/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-3893", "ID": "CVE-2016-3893",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,9 +58,9 @@
"url": "http://source.android.com/security/bulletin/2016-09-01.html" "url": "http://source.android.com/security/bulletin/2016-09-01.html"
}, },
{ {
"name" : "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=a7a6ddc91cce7ad5ad55c9709b24bfc80f5ac873", "name": "1036763",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=a7a6ddc91cce7ad5ad55c9709b24bfc80f5ac873" "url": "http://www.securitytracker.com/id/1036763"
}, },
{ {
"name": "92884", "name": "92884",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/92884" "url": "http://www.securityfocus.com/bid/92884"
}, },
{ {
"name" : "1036763", "name": "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=a7a6ddc91cce7ad5ad55c9709b24bfc80f5ac873",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1036763" "url": "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=a7a6ddc91cce7ad5ad55c9709b24bfc80f5ac873"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "41615",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/41615/"
},
{ {
"name": "MS16-147", "name": "MS16-147",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-147" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-147"
}, },
{
"name": "41615",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41615/"
},
{ {
"name": "94758", "name": "94758",
"refsource": "BID", "refsource": "BID",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7754", "ID": "CVE-2016-7754",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20161102 Disclose [10 * cve] in Exponent CMS", "name": "https://github.com/exponentcms/exponent-cms/commit/a8efd9ca71fc9b8b843ad0910d435d237482ee31",
"refsource" : "FULLDISC", "refsource": "CONFIRM",
"url" : "http://seclists.org/fulldisclosure/2016/Nov/12" "url": "https://github.com/exponentcms/exponent-cms/commit/a8efd9ca71fc9b8b843ad0910d435d237482ee31"
}, },
{ {
"name": "http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html",
@ -63,9 +63,9 @@
"url": "http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html"
}, },
{ {
"name" : "https://github.com/exponentcms/exponent-cms/commit/a8efd9ca71fc9b8b843ad0910d435d237482ee31", "name": "20161102 Disclose [10 * cve] in Exponent CMS",
"refsource" : "CONFIRM", "refsource": "FULLDISC",
"url" : "https://github.com/exponentcms/exponent-cms/commit/a8efd9ca71fc9b8b843ad0910d435d237482ee31" "url": "http://seclists.org/fulldisclosure/2016/Nov/12"
}, },
{ {
"name": "97208", "name": "97208",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8064", "ID": "CVE-2016-8064",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -62,9 +62,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20170522 Code Execution through a variety Java (Un-)Marshallers", "name": "RHSA-2017:1832",
"refsource" : "MLIST", "refsource": "REDHAT",
"url" : "http://www.openwall.com/lists/oss-security/2017/05/22/2" "url": "https://access.redhat.com/errata/RHSA-2017:1832"
}, },
{ {
"name": "https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "name": "https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true",
@ -76,15 +76,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2" "url": "http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2"
}, },
{
"name" : "RHSA-2017:1832",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1832"
},
{ {
"name": "97179", "name": "97179",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/97179" "url": "http://www.securityfocus.com/bid/97179"
},
{
"name": "[oss-security] 20170522 Code Execution through a variety Java (Un-)Marshallers",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/05/22/2"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8831", "ID": "CVE-2016-8831",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -57,35 +57,35 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/" "url": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/"
}, },
{
"name" : "DSA-3835",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3835"
},
{
"name" : "FEDORA-2016-3eb5a55123",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/"
},
{ {
"name": "FEDORA-2016-d4571bf555", "name": "FEDORA-2016-d4571bf555",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/"
}, },
{
"name" : "USN-3115-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3115-1"
},
{ {
"name": "94068", "name": "94068",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94068" "url": "http://www.securityfocus.com/bid/94068"
}, },
{
"name": "DSA-3835",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3835"
},
{
"name": "USN-3115-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3115-1"
},
{ {
"name": "1037159", "name": "1037159",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037159" "url": "http://www.securitytracker.com/id/1037159"
},
{
"name": "FEDORA-2016-3eb5a55123",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/"
} }
] ]
} }

View File

@ -53,34 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20161122 CVE Request: Linux: net/sctp: slab-out-of-bounds in sctp_sf_ootb", "name": "SUSE-SU-2016:3096",
"refsource" : "MLIST", "refsource": "SUSE",
"url" : "http://www.openwall.com/lists/oss-security/2016/11/22/18" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1397930",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1397930"
},
{
"name" : "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6"
},
{
"name" : "https://groups.google.com/forum/#!topic/syzkaller/pAUcHsUJbjk",
"refsource" : "CONFIRM",
"url" : "https://groups.google.com/forum/#!topic/syzkaller/pAUcHsUJbjk"
}, },
{ {
"name": "https://bto.bluecoat.com/security-advisory/sa134", "name": "https://bto.bluecoat.com/security-advisory/sa134",
@ -88,44 +63,9 @@
"url": "https://bto.bluecoat.com/security-advisory/sa134" "url": "https://bto.bluecoat.com/security-advisory/sa134"
}, },
{ {
"name" : "RHSA-2017:0086", "name": "SUSE-SU-2016:3206",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0086.html"
},
{
"name" : "RHSA-2017:0091",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0091.html"
},
{
"name" : "RHSA-2017:0113",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0113.html"
},
{
"name" : "RHSA-2017:0307",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0307.html"
},
{
"name" : "SUSE-SU-2016:3096",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html"
},
{
"name" : "SUSE-SU-2016:3113",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html"
},
{
"name" : "SUSE-SU-2016:3116",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html"
},
{
"name" : "SUSE-SU-2016:3117",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html"
}, },
{ {
"name": "SUSE-SU-2016:3169", "name": "SUSE-SU-2016:3169",
@ -133,9 +73,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html"
}, },
{ {
"name" : "SUSE-SU-2016:3183", "name": "1037339",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037339"
},
{
"name": "SUSE-SU-2016:3117",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html"
}, },
{ {
"name": "SUSE-SU-2016:3197", "name": "SUSE-SU-2016:3197",
@ -143,19 +88,39 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html"
}, },
{ {
"name" : "SUSE-SU-2016:3205", "name": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" "url": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6"
}, },
{ {
"name" : "SUSE-SU-2016:3206", "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8"
}, },
{ {
"name" : "SUSE-SU-2016:3247", "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6"
},
{
"name": "https://groups.google.com/forum/#!topic/syzkaller/pAUcHsUJbjk",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!topic/syzkaller/pAUcHsUJbjk"
},
{
"name": "RHSA-2017:0086",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0086.html"
},
{
"name": "RHSA-2017:0113",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0113.html"
},
{
"name": "RHSA-2017:0091",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0091.html"
}, },
{ {
"name": "94479", "name": "94479",
@ -163,9 +128,44 @@
"url": "http://www.securityfocus.com/bid/94479" "url": "http://www.securityfocus.com/bid/94479"
}, },
{ {
"name" : "1037339", "name": "SUSE-SU-2016:3247",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1037339" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html"
},
{
"name": "[oss-security] 20161122 CVE Request: Linux: net/sctp: slab-out-of-bounds in sctp_sf_ootb",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/11/22/18"
},
{
"name": "SUSE-SU-2016:3183",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930"
},
{
"name": "SUSE-SU-2016:3116",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html"
},
{
"name": "SUSE-SU-2016:3113",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html"
},
{
"name": "RHSA-2017:0307",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0307.html"
},
{
"name": "SUSE-SU-2016:3205",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9671", "ID": "CVE-2016-9671",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{ {
"name": "106573", "name": "106573",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106573" "url": "http://www.securityfocus.com/bid/106573"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
} }
] ]
} }