"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:01:04 +00:00
parent 56cfa948b3
commit 2b9a6feca9
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
49 changed files with 3672 additions and 3672 deletions

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20060112 Multiple PHP Toolkit for PayPal Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/421739"
},
{
"name": "http://www.uinc.ru/articles/vuln/ptpaypal050.shtml",
"refsource": "MISC",
"url": "http://www.uinc.ru/articles/vuln/ptpaypal050.shtml"
},
{
"name" : "16218",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16218"
"name": "18444",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18444"
},
{
"name": "ADV-2006-0183",
@ -78,9 +73,14 @@
"url": "http://www.osvdb.org/22378"
},
{
"name" : "18444",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18444"
"name": "16218",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16218"
},
{
"name": "20060112 Multiple PHP Toolkit for PayPal Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/421739"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[Dovecot] 20060208 1.0beta3 released",
"refsource" : "MLIST",
"url" : "http://www.dovecot.org/list/dovecot/2006-February/011367.html"
},
{
"name" : "16672",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16672"
},
{
"name" : "ADV-2006-0549",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0549"
},
{
"name": "18870",
"refsource": "SECUNIA",
@ -76,6 +61,21 @@
"name": "dovecot-append-dos(24709)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24709"
},
{
"name": "ADV-2006-0549",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0549"
},
{
"name": "[Dovecot] 20060208 1.0beta3 released",
"refsource": "MLIST",
"url": "http://www.dovecot.org/list/dovecot/2006-February/011367.html"
},
{
"name": "16672",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16672"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "webblog-cookie-auth-bypass(24755)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24755"
},
{
"name": "http://www.evuln.com/vulns/82/summary.html",
"refsource": "MISC",
@ -71,11 +76,6 @@
"name": "522",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/522"
},
{
"name" : "webblog-cookie-auth-bypass(24755)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24755"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "noahs-indexphp-xss(24895)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24895"
},
{
"name": "20060222 [KAPDA::#29]Noah's classifieds multiple vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/425783/100/0/threaded"
},
{
"name" : "http://www.kapda.ir/advisory-268.html",
"refsource" : "MISC",
"url" : "http://www.kapda.ir/advisory-268.html"
},
{
"name" : "16772",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16772"
},
{
"name" : "ADV-2006-0703",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0703"
},
{
"name": "1015667",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015667"
},
{
"name" : "noahs-indexphp-xss(24895)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24895"
"name": "16772",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16772"
},
{
"name": "http://www.kapda.ir/advisory-268.html",
"refsource": "MISC",
"url": "http://www.kapda.ir/advisory-268.html"
},
{
"name": "ADV-2006-0703",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0703"
}
]
}

View File

@ -53,9 +53,19 @@
"references": {
"reference_data": [
{
"name" : "20060325 [eVuln] DSDownload Multiple SQL Injection Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/428808/100/0/threaded"
"name": "23886",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23886"
},
{
"name": "1015755",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015755"
},
{
"name": "dsdownload-multiple-sql-injection(25193)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25193"
},
{
"name": "http://evuln.com/vulns/99/summary.html",
@ -68,39 +78,29 @@
"url": "http://www.securityfocus.com/bid/17116"
},
{
"name" : "ADV-2006-0934",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0934"
},
{
"name" : "23886",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23886"
"name": "19202",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19202"
},
{
"name": "23887",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23887"
},
{
"name" : "1015755",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015755"
},
{
"name" : "19202",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19202"
},
{
"name": "626",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/626"
},
{
"name" : "dsdownload-multiple-sql-injection(25193)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25193"
"name": "ADV-2006-0934",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0934"
},
{
"name": "20060325 [eVuln] DSDownload Multiple SQL Injection Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/428808/100/0/threaded"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20060613 alipager xss attack",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/437508/100/200/threaded"
},
{
"name": "alipager-chat-xss(27269)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27269"
},
{
"name": "20060613 alipager xss attack",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/437508/100/200/threaded"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060719 AFCommerce Shopping Cart",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440589/100/0/threaded"
},
{
"name" : "20060720 Re: AFCommerce Shopping Cart",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440848/100/100/threaded"
"name": "afcommerce-newreview-xss(27847)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27847"
},
{
"name": "19074",
@ -68,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/19074"
},
{
"name" : "1016538",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016538"
"name": "20060720 Re: AFCommerce Shopping Cart",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440848/100/100/threaded"
},
{
"name": "1255",
@ -78,9 +73,14 @@
"url": "http://securityreason.com/securityalert/1255"
},
{
"name" : "afcommerce-newreview-xss(27847)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27847"
"name": "1016538",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016538"
},
{
"name": "20060719 AFCommerce Shopping Cart",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440589/100/0/threaded"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "21435",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21435"
},
{
"name": "ADV-2006-3227",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3227"
},
{
"name": "http://drupal.org/node/77756",
"refsource": "CONFIRM",
@ -62,16 +72,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19441"
},
{
"name" : "ADV-2006-3227",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3227"
},
{
"name" : "21435",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21435"
},
{
"name": "bibliography-unspecified-sql-injection(28296)",
"refsource": "XF",

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060818 Joomla Rssxt <= 1.0 Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443628/100/100/threaded"
},
{
"name" : "20060818 Re: Joomla Rssxt <= 1.0 Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/444058/100/100/threaded"
},
{
"name": "19593",
"refsource": "BID",
@ -72,10 +62,20 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28096"
},
{
"name": "20060818 Joomla Rssxt <= 1.0 Remote File Include Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443628/100/100/threaded"
},
{
"name": "1456",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1456"
},
{
"name": "20060818 Re: Joomla Rssxt <= 1.0 Remote File Include Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/444058/100/100/threaded"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-4809",
"STATE": "PUBLIC"
},
@ -53,54 +53,69 @@
"references": {
"reference_data": [
{
"name" : "http://www.discontinuity.info/~rowan/pocs/libimlib2_pocs-1.2.0-2.2.tar.gz",
"refsource" : "MISC",
"url" : "http://www.discontinuity.info/~rowan/pocs/libimlib2_pocs-1.2.0-2.2.tar.gz"
},
{
"name" : "GLSA-200612-20",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200612-20.xml"
},
{
"name" : "MDKSA-2006:198",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:198"
"name": "22932",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22932"
},
{
"name": "MDKSA-2007:156",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:156"
},
{
"name": "22752",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22752"
},
{
"name": "imlib2-loaderpnmc-bo(30070)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30070"
},
{
"name": "MDKSA-2006:198",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:198"
},
{
"name": "30104",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/30104"
},
{
"name": "SUSE-SR:2006:026",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html"
},
{
"name" : "USN-376-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-376-1"
},
{
"name" : "USN-376-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-376-2"
},
{
"name": "20903",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20903"
},
{
"name": "http://www.discontinuity.info/~rowan/pocs/libimlib2_pocs-1.2.0-2.2.tar.gz",
"refsource": "MISC",
"url": "http://www.discontinuity.info/~rowan/pocs/libimlib2_pocs-1.2.0-2.2.tar.gz"
},
{
"name": "USN-376-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-376-2"
},
{
"name": "GLSA-200612-20",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200612-20.xml"
},
{
"name": "ADV-2006-4349",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4349"
},
{
"name" : "30104",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/30104"
"name": "23441",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23441"
},
{
"name": "22732",
@ -113,24 +128,9 @@
"url": "http://secunia.com/advisories/22744"
},
{
"name" : "22752",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22752"
},
{
"name" : "23441",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23441"
},
{
"name" : "22932",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22932"
},
{
"name" : "imlib2-loaderpnmc-bo(30070)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30070"
"name": "USN-376-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-376-1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2213",
"STATE": "PUBLIC"
},
@ -53,50 +53,20 @@
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-16.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-16.html"
"name": "ADV-2011-0192",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0192"
},
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4435"
},
{
"name" : "APPLE-SA-2010-11-10-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name" : "GLSA-201101-09",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201101-09.xml"
},
{
"name": "HPSBMA02592",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=128767780602751&w=2"
},
{
"name" : "SSRT100300",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=128767780602751&w=2"
},
{
"name" : "42364",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/42364"
},
{
"name" : "oval:org.mitre.oval:def:10983",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10983"
},
{
"name" : "oval:org.mitre.oval:def:16020",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16020"
},
{
"name": "1024621",
"refsource": "SECTRACK",
@ -108,9 +78,39 @@
"url": "http://secunia.com/advisories/43026"
},
{
"name" : "ADV-2011-0192",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0192"
"name": "GLSA-201101-09",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201101-09.xml"
},
{
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "42364",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42364"
},
{
"name": "SSRT100300",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=128767780602751&w=2"
},
{
"name": "oval:org.mitre.oval:def:10983",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10983"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-16.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-16.html"
},
{
"name": "oval:org.mitre.oval:def:16020",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16020"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21431472",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21431472"
"name": "ADV-2010-1281",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1281"
},
{
"name": "40007",
@ -63,9 +63,9 @@
"url": "http://secunia.com/advisories/40007"
},
{
"name" : "ADV-2010-1281",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1281"
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21431472",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21431472"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2801",
"STATE": "PUBLIC"
},
@ -53,54 +53,49 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20100802 CVE Request [two ids] -- cabextract -- 1, Infinite loop in MS-ZIP and Quantum decoders (minor) 2, Integer wrap-around (crash) by processing certain *.cab files in test archive mode",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=128076168623266&w=2"
},
{
"name" : "[oss-security] 20100802 Re: CVE Request [two ids] -- cabextract -- 1, Infinite loop in MS-ZIP and Quantum decoders (minor) 2, Integer wrap-around (crash) by processing certain *.cab files in test archive mode",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=128077976522470&w=2"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=329891",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=329891"
},
{
"name" : "http://libmspack.svn.sourceforge.net/viewvc/libmspack/libmspack/trunk/mspack/qtmd.c?r1=114&r2=113",
"refsource" : "CONFIRM",
"url" : "http://libmspack.svn.sourceforge.net/viewvc/libmspack/libmspack/trunk/mspack/qtmd.c?r1=114&r2=113"
"name": "ADV-2010-1903",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1903"
},
{
"name": "http://libmspack.svn.sourceforge.net/viewvc/libmspack?view=revision&revision=118",
"refsource": "CONFIRM",
"url": "http://libmspack.svn.sourceforge.net/viewvc/libmspack?view=revision&revision=118"
},
{
"name": "[oss-security] 20100802 CVE Request [two ids] -- cabextract -- 1, Infinite loop in MS-ZIP and Quantum decoders (minor) 2, Integer wrap-around (crash) by processing certain *.cab files in test archive mode",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128076168623266&w=2"
},
{
"name": "http://libmspack.svn.sourceforge.net/viewvc/libmspack/libmspack/trunk/mspack/qtmd.c?r1=114&r2=113",
"refsource": "CONFIRM",
"url": "http://libmspack.svn.sourceforge.net/viewvc/libmspack/libmspack/trunk/mspack/qtmd.c?r1=114&r2=113"
},
{
"name": "[oss-security] 20100802 Re: CVE Request [two ids] -- cabextract -- 1, Infinite loop in MS-ZIP and Quantum decoders (minor) 2, Integer wrap-around (crash) by processing certain *.cab files in test archive mode",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128077976522470&w=2"
},
{
"name": "http://www.cabextract.org.uk/#changes",
"refsource": "CONFIRM",
"url": "http://www.cabextract.org.uk/#changes"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=620454",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=620454"
},
{
"name": "DSA-2087",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2087"
},
{
"name" : "42173",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/42173"
"name": "http://bugs.gentoo.org/show_bug.cgi?id=329891",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=329891"
},
{
"name" : "ADV-2010-1903",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1903"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=620454",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=620454"
},
{
"name": "ADV-2010-1997",
@ -111,6 +106,11 @@
"name": "cabextract-archive-code-execution(60891)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60891"
},
{
"name": "42173",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42173"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2879",
"STATE": "PUBLIC"
},
@ -53,30 +53,30 @@
"references": {
"reference_data": [
{
"name" : "20100824 TPTI-10-12: Adobe Shockwave TextXtra Allocator Integer Overflow Remote Code Execution Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/513300/100/0/threaded"
},
{
"name" : "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12",
"refsource" : "MISC",
"url" : "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12"
"name": "1024361",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024361"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html"
},
{
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12",
"refsource": "MISC",
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12"
},
{
"name": "20100824 TPTI-10-12: Adobe Shockwave TextXtra Allocator Integer Overflow Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/513300/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:11998",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998"
},
{
"name" : "1024361",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024361"
},
{
"name": "ADV-2010-2176",
"refsource": "VUPEN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3086",
"STATE": "PUBLIC"
},
@ -52,65 +52,65 @@
},
"references": {
"reference_data": [
{
"name" : "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name" : "[oss-security] 20101110 CVE-2010-3086 kernel panic via futex",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=128935856605589&w=2"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9d55b9923a1b7ea8193b8875c57ec940dc2ff027",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9d55b9923a1b7ea8193b8875c57ec940dc2ff027"
},
{
"name" : "http://kerneltrap.org/mailarchive/linux-kernel/2008/2/6/752194/thread",
"refsource" : "CONFIRM",
"url" : "http://kerneltrap.org/mailarchive/linux-kernel/2008/2/6/752194/thread"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=429412",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=429412"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=633170",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=633170"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name" : "RHSA-2010:0839",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"name" : "SUSE-SA:2010:060",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
},
{
"name": "1024709",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024709"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
},
{
"name": "http://kerneltrap.org/mailarchive/linux-kernel/2008/2/6/752194/thread",
"refsource": "CONFIRM",
"url": "http://kerneltrap.org/mailarchive/linux-kernel/2008/2/6/752194/thread"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=429412",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=429412"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9d55b9923a1b7ea8193b8875c57ec940dc2ff027",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9d55b9923a1b7ea8193b8875c57ec940dc2ff027"
},
{
"name": "SUSE-SA:2010:060",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
},
{
"name": "RHSA-2010:0839",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25"
},
{
"name": "[oss-security] 20101110 CVE-2010-3086 kernel panic via futex",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=128935856605589&w=2"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-3232",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:7575",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7575"
},
{
"name": "MS10-080",
"refsource": "MS",
@ -61,11 +66,6 @@
"name": "TA10-285A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-285A.html"
},
{
"name" : "oval:org.mitre.oval:def:7575",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7575"
}
]
}

View File

@ -52,60 +52,60 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=644933",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=644933"
},
{
"name" : "FEDORA-2010-16605",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050177.html"
},
{
"name" : "FEDORA-2010-16622",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050164.html"
},
{
"name": "FEDORA-2010-16762",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050269.html"
},
{
"name" : "MDVSA-2010:241",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:241"
},
{
"name" : "44563",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/44563"
},
{
"name" : "42048",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42048"
},
{
"name" : "42054",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42054"
},
{
"name": "ADV-2010-2898",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2898"
},
{
"name" : "ADV-2010-2848",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2848"
"name": "42054",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42054"
},
{
"name": "ADV-2010-3060",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3060"
},
{
"name": "FEDORA-2010-16622",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050164.html"
},
{
"name": "MDVSA-2010:241",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:241"
},
{
"name": "ADV-2010-2848",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2848"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=644933",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=644933"
},
{
"name": "42048",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42048"
},
{
"name": "FEDORA-2010-16605",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050177.html"
},
{
"name": "44563",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44563"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-4428",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
},
{
"name" : "45873",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/45873"
},
{
"name" : "70562",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/70562"
"name": "ADV-2011-0147",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0147"
},
{
"name": "1024978",
@ -73,19 +63,29 @@
"url": "http://www.securitytracker.com/id?1024978"
},
{
"name" : "42982",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42982"
},
{
"name" : "ADV-2011-0147",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0147"
"name": "45873",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45873"
},
{
"name": "peoplesoft-absence-info-disclosure(64791)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64791"
},
{
"name": "42982",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42982"
},
{
"name": "70562",
"refsource": "OSVDB",
"url": "http://osvdb.org/70562"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
}
]
}

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "http://reversemode.com/index.php?option=com_content&task=view&id=70&Itemid=1",
"refsource" : "MISC",
"url" : "http://reversemode.com/index.php?option=com_content&task=view&id=70&Itemid=1"
},
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-301-01A.pdf",
"refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-301-01A.pdf"
},
{
"name" : "http://www.kb.cert.org/vuls/id/MORO-8D9JX8",
"refsource" : "CONFIRM",
"url" : "http://www.kb.cert.org/vuls/id/MORO-8D9JX8"
"name": "http://reversemode.com/index.php?option=com_content&task=view&id=70&Itemid=1",
"refsource": "MISC",
"url": "http://reversemode.com/index.php?option=com_content&task=view&id=70&Itemid=1"
},
{
"name": "VU#237495",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/237495"
},
{
"name": "http://www.moxa.com/support/download.aspx?d_id=2669",
@ -73,9 +73,9 @@
"url": "http://www.moxa.com/support/download.aspx?d_id=2669"
},
{
"name" : "VU#237495",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/237495"
"name": "http://www.kb.cert.org/vuls/id/MORO-8D9JX8",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MORO-8D9JX8"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://forum.snitz.com/forum/topic.asp?TOPIC_ID=69770",
"refsource" : "CONFIRM",
"url" : "http://forum.snitz.com/forum/topic.asp?TOPIC_ID=69770"
},
{
"name" : "45381",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/45381"
"name": "42308",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42308"
},
{
"name": "69793",
@ -68,9 +63,14 @@
"url": "http://osvdb.org/69793"
},
{
"name" : "42308",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42308"
"name": "45381",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45381"
},
{
"name": "http://forum.snitz.com/forum/topic.asp?TOPIC_ID=69770",
"refsource": "CONFIRM",
"url": "http://forum.snitz.com/forum/topic.asp?TOPIC_ID=69770"
}
]
}

View File

@ -52,21 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "maximo-laborreporting-csrf(72000)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72000"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21584666",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21584666"
},
{
"name" : "IV09193",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV09193"
},
{
"name" : "52333",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/52333"
},
{
"name": "48299",
"refsource": "SECUNIA",
@ -78,9 +73,14 @@
"url": "http://secunia.com/advisories/48305"
},
{
"name" : "maximo-laborreporting-csrf(72000)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72000"
"name": "52333",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52333"
},
{
"name": "IV09193",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV09193"
}
]
}

View File

@ -53,25 +53,25 @@
"references": {
"reference_data": [
{
"name" : "20111123 Wordpress clickdesk-live-support-chat plugin Cross-Site Scripting Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/520624/100/0/threaded"
"name": "50778",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50778"
},
{
"name": "http://wordpress.org/extend/plugins/clickdesk-live-support-chat-plugin/changelog/",
"refsource": "MISC",
"url": "http://wordpress.org/extend/plugins/clickdesk-live-support-chat-plugin/changelog/"
},
{
"name" : "50778",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/50778"
},
{
"name": "77338",
"refsource": "OSVDB",
"url": "http://osvdb.org/77338"
},
{
"name": "20111123 Wordpress clickdesk-live-support-chat plugin Cross-Site Scripting Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520624/100/0/threaded"
},
{
"name": "clickdesk-cdwidget-xss(71469)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-3086",
"STATE": "PUBLIC"
},
@ -57,65 +57,65 @@
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680333"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21686383",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21686383"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21686824",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21686824"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21680334",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21680334"
},
{
"name" : "IV62634",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV62634"
},
{
"name": "69183",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69183"
},
{
"name" : "60081",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60081"
},
{
"name" : "60317",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60317"
},
{
"name": "61577",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61577"
},
{
"name" : "61640",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/61640"
},
{
"name": "59680",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59680"
},
{
"name": "ibm-java-cve20143086-code-exec(94097)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94097"
},
{
"name": "IV62634",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV62634"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334"
},
{
"name": "60622",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60622"
},
{
"name" : "ibm-java-cve20143086-code-exec(94097)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/94097"
"name": "60081",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60081"
},
{
"name": "61640",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61640"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824"
},
{
"name": "60317",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60317"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3400",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-7260",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "JVNDB-2014-000143",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000143"
},
{
"name": "http://jvn.jp/en/jp/JVN16406395/360573/index.html",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "JVN#16406395",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN16406395/index.html"
},
{
"name" : "JVNDB-2014-000143",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000143"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-7845",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20141117 Moodle security issues are now public",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2014/11/17/11"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47050",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47050"
},
{
"name": "1031215",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031215"
},
{
"name": "https://moodle.org/mod/forum/discuss.php?d=275152",
"refsource": "CONFIRM",
"url": "https://moodle.org/mod/forum/discuss.php?d=275152"
},
{
"name" : "1031215",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031215"
"name": "[oss-security] 20141117 Moodle security issues are now public",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/11/17/11"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/support/alerts/aid-11192014.txt"
},
{
"name" : "62578",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62578"
},
{
"name": "airwave-cve20148368-priv-esc(98871)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98871"
},
{
"name": "62578",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62578"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "35344",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/35344"
},
{
"name": "http://packetstormsecurity.com/files/129229/RobotStats-1.0-SQL-Injection.html",
"refsource": "MISC",
@ -66,6 +61,11 @@
"name": "robotstats-robotslib-sql-injection(98951)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98951"
},
{
"name": "35344",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/35344"
}
]
}

View File

@ -52,35 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150124 Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2015/01/24/4"
},
{
"name" : "[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html"
},
{
"name": "https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu",
"refsource": "MISC",
"url": "https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu"
},
{
"name" : "http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b",
"refsource" : "CONFIRM",
"url" : "http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b"
},
{
"name": "https://bugs.busybox.net/show_bug.cgi?id=7652",
"refsource": "CONFIRM",
"url": "https://bugs.busybox.net/show_bug.cgi?id=7652"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1185707",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1185707"
"name": "[oss-security] 20150124 Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2015/01/24/4"
},
{
"name": "GLSA-201503-13",
@ -91,6 +76,21 @@
"name": "72324",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72324"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1185707",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185707"
},
{
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html"
},
{
"name": "http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b",
"refsource": "CONFIRM",
"url": "http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-9730",
"STATE": "PUBLIC"
},
@ -57,6 +57,36 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/06/02/7"
},
{
"name": "https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9"
},
{
"name": "SUSE-SU-2015:1611",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html"
},
{
"name": "SUSE-SU-2015:1324",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1228229",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228229"
},
{
"name": "74964",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74964"
},
{
"name": "openSUSE-SU-2015:1382",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9",
"refsource": "CONFIRM",
@ -67,45 +97,15 @@
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1228229",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1228229"
},
{
"name" : "https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9"
},
{
"name" : "SUSE-SU-2015:1592",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html"
},
{
"name" : "SUSE-SU-2015:1611",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html"
},
{
"name": "SUSE-SU-2015:1224",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html"
},
{
"name" : "SUSE-SU-2015:1324",
"name": "SUSE-SU-2015:1592",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html"
},
{
"name" : "openSUSE-SU-2015:1382",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html"
},
{
"name" : "74964",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/74964"
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2014-9884",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2016-2917",
"STATE": "PUBLIC"
},

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/latchset/jwcrypto/commit/eb5be5bd94c8cae1d7f3ba9801377084d8e5a7ba",
"refsource" : "CONFIRM",
"url" : "https://github.com/latchset/jwcrypto/commit/eb5be5bd94c8cae1d7f3ba9801377084d8e5a7ba"
},
{
"name": "https://github.com/latchset/jwcrypto/issues/65",
"refsource": "CONFIRM",
@ -67,15 +62,20 @@
"refsource": "CONFIRM",
"url": "https://github.com/latchset/jwcrypto/pull/66"
},
{
"name": "92729",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92729"
},
{
"name": "https://github.com/latchset/jwcrypto/releases/tag/v0.3.2",
"refsource": "CONFIRM",
"url": "https://github.com/latchset/jwcrypto/releases/tag/v0.3.2"
},
{
"name" : "92729",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92729"
"name": "https://github.com/latchset/jwcrypto/commit/eb5be5bd94c8cae1d7f3ba9801377084d8e5a7ba",
"refsource": "CONFIRM",
"url": "https://github.com/latchset/jwcrypto/commit/eb5be5bd94c8cae1d7f3ba9801377084d8e5a7ba"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-6355",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1036585",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036585"
},
{
"name": "20160810 Cisco IOS XR Software for Cisco ASR 9001 Aggregation Services Routers Fragmented Packet Denial of Service Vulnerability",
"refsource": "CISCO",
@ -61,11 +66,6 @@
"name": "92399",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92399"
},
{
"name" : "1036585",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036585"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Jan/92"
},
{
"name" : "http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html"
},
{
"name": "https://github.com/pedrib/PoC/blob/master/advisories/bmc-track-it-11.4.txt",
"refsource": "MISC",
@ -71,6 +66,11 @@
"name": "https://communities.bmc.com/community/bmcdn/bmc_track-it/blog/2016/01/04/track-it-security-advisory-24-dec-2015",
"refsource": "CONFIRM",
"url": "https://communities.bmc.com/community/bmcdn/bmc_track-it/blog/2016/01/04/track-it-security-advisory-24-dec-2015"
},
{
"name": "http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-6732",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2016-11-01.html",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2016-11-01.html"
},
{
"name": "94140",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94140"
},
{
"name": "https://source.android.com/security/bulletin/2016-11-01.html",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2016-11-01.html"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "95840",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95840"
},
{
"name": "https://github.com/libgd/libgd/blob/gd-2.2.4/CHANGELOG.md",
"refsource": "CONFIRM",
"url": "https://github.com/libgd/libgd/blob/gd-2.2.4/CHANGELOG.md"
},
{
"name" : "https://github.com/libgd/libgd/commit/4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae",
"refsource" : "CONFIRM",
"url" : "https://github.com/libgd/libgd/commit/4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae"
},
{
"name" : "https://github.com/libgd/libgd/pull/353",
"refsource" : "CONFIRM",
"url" : "https://github.com/libgd/libgd/pull/353"
},
{
"name": "DSA-3693",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3693"
},
{
"name" : "95840",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95840"
"name": "https://github.com/libgd/libgd/pull/353",
"refsource": "CONFIRM",
"url": "https://github.com/libgd/libgd/pull/353"
},
{
"name": "https://github.com/libgd/libgd/commit/4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae",
"refsource": "CONFIRM",
"url": "https://github.com/libgd/libgd/commit/4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT207421",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207421"
},
{
"name" : "https://support.apple.com/HT207422",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207422"
},
{
"name" : "https://support.apple.com/HT207424",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207424"
},
{
"name": "https://support.apple.com/HT207427",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207427"
},
{
"name" : "GLSA-201706-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201706-15"
},
{
"name": "94907",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94907"
},
{
"name": "https://support.apple.com/HT207421",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207421"
},
{
"name": "1037459",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037459"
},
{
"name": "https://support.apple.com/HT207422",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207422"
},
{
"name": "GLSA-201706-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-15"
},
{
"name": "https://support.apple.com/HT207424",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207424"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-5884",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2017/02/03/5"
},
{
"name" : "[oss-security] 20170204 Re: CVE request for two input validation flaws in gtk-vnc",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/02/05/5"
"name": "96016",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96016"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=778048",
@ -68,9 +68,9 @@
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=778048"
},
{
"name" : "https://git.gnome.org/browse/gtk-vnc/commit/?id=ea0386933214c9178aaea9f2f85049ea3fa3e14a",
"refsource" : "CONFIRM",
"url" : "https://git.gnome.org/browse/gtk-vnc/commit/?id=ea0386933214c9178aaea9f2f85049ea3fa3e14a"
"name": "RHSA-2017:2258",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2258"
},
{
"name": "FEDORA-2017-ab04a91edd",
@ -78,14 +78,14 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LGPQ5MQR6SN4DYTEFACHP2PP5RR26KYK/"
},
{
"name" : "RHSA-2017:2258",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2258"
"name": "https://git.gnome.org/browse/gtk-vnc/commit/?id=ea0386933214c9178aaea9f2f85049ea3fa3e14a",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/gtk-vnc/commit/?id=ea0386933214c9178aaea9f2f85049ea3fa3e14a"
},
{
"name" : "96016",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96016"
"name": "[oss-security] 20170204 Re: CVE request for two input validation flaws in gtk-vnc",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/02/05/5"
}
]
}