"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:49:48 +00:00
parent ce63486340
commit 2f69dc0fcc
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 4086 additions and 4086 deletions

View File

@ -52,30 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060109 [eVuln] Foxrum BBCode XSS Vulnerabilty",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/421277/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/20",
"refsource" : "MISC",
"url" : "http://evuln.com/vulns/20"
},
{ {
"name": "16172", "name": "16172",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/16172" "url": "http://www.securityfocus.com/bid/16172"
}, },
{ {
"name" : "ADV-2006-0121", "name": "http://evuln.com/vulns/20",
"refsource" : "VUPEN", "refsource": "MISC",
"url" : "http://www.vupen.com/english/advisories/2006/0121" "url": "http://evuln.com/vulns/20"
},
{
"name" : "18386",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18386"
}, },
{ {
"name": "325", "name": "325",
@ -86,6 +71,21 @@
"name": "foxrum-bbcode-xss(24043)", "name": "foxrum-bbcode-xss(24043)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24043" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24043"
},
{
"name": "ADV-2006-0121",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0121"
},
{
"name": "20060109 [eVuln] Foxrum BBCode XSS Vulnerabilty",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/421277/100/0/threaded"
},
{
"name": "18386",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18386"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060110 SUID root overflows in UNICOS and partial shellcode",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0343.html"
},
{ {
"name": "16205", "name": "16205",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "unicos-ftp-format-string(24277)", "name": "unicos-ftp-format-string(24277)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24277" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24277"
},
{
"name": "20060110 SUID root overflows in UNICOS and partial shellcode",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0343.html"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060107 Xoops Pool Module IMG Tag Cross Site Scripting", "name": "xoops-pool-imagetag-xss(24091)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/421325/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24091"
},
{
"name" : "http://www.xoops.org/modules/newbb/viewtopic.php?topic_id=45637&forum=2&post_id=200481",
"refsource" : "MISC",
"url" : "http://www.xoops.org/modules/newbb/viewtopic.php?topic_id=45637&forum=2&post_id=200481"
}, },
{ {
"name": "16189", "name": "16189",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/16189" "url": "http://www.securityfocus.com/bid/16189"
}, },
{ {
"name" : "xoops-pool-imagetag-xss(24091)", "name": "http://www.xoops.org/modules/newbb/viewtopic.php?topic_id=45637&forum=2&post_id=200481",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24091" "url": "http://www.xoops.org/modules/newbb/viewtopic.php?topic_id=45637&forum=2&post_id=200481"
},
{
"name": "20060107 Xoops Pool Module IMG Tag Cross Site Scripting",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/421325/100/0/threaded"
} }
] ]
} }

View File

@ -52,45 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060220 Secunia Research: NJStar Word Processor Font Name Buffer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/425498/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-5/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2006-5/advisory/"
},
{
"name" : "http://www.njstar.com/njstar/chinese/",
"refsource" : "CONFIRM",
"url" : "http://www.njstar.com/njstar/chinese/"
},
{
"name" : "http://www.njstar.com/njstar/japanese/",
"refsource" : "CONFIRM",
"url" : "http://www.njstar.com/njstar/japanese/"
},
{
"name" : "16737",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16737"
},
{ {
"name": "ADV-2006-0670", "name": "ADV-2006-0670",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0670" "url": "http://www.vupen.com/english/advisories/2006/0670"
}, },
{ {
"name" : "23354", "name": "njstar-font-name-bo(24773)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://www.osvdb.org/23354" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24773"
}, },
{ {
"name" : "1015649", "name": "http://www.njstar.com/njstar/chinese/",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://securitytracker.com/id?1015649" "url": "http://www.njstar.com/njstar/chinese/"
}, },
{ {
"name": "18702", "name": "18702",
@ -103,9 +78,34 @@
"url": "http://securityreason.com/securityalert/461" "url": "http://securityreason.com/securityalert/461"
}, },
{ {
"name" : "njstar-font-name-bo(24773)", "name": "http://www.njstar.com/njstar/japanese/",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24773" "url": "http://www.njstar.com/njstar/japanese/"
},
{
"name": "16737",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16737"
},
{
"name": "23354",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23354"
},
{
"name": "http://secunia.com/secunia_research/2006-5/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-5/advisory/"
},
{
"name": "20060220 Secunia Research: NJStar Word Processor Font Name Buffer Overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/425498/100/0/threaded"
},
{
"name": "1015649",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015649"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060306 Multiple vulnerabilities in Sauerbraten engine 2006_02_28", "name": "sauerbraten-engineserver-dos(25087)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/426865/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25087"
}, },
{ {
"name": "16986", "name": "16986",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/16986" "url": "http://www.securityfocus.com/bid/16986"
}, },
{ {
"name" : "ADV-2006-0848", "name": "20060306 Multiple vulnerabilities in Sauerbraten engine 2006_02_28",
"refsource" : "VUPEN", "refsource": "BUGTRAQ",
"url" : "http://www.vupen.com/english/advisories/2006/0848" "url": "http://www.securityfocus.com/archive/1/426865/100/0/threaded"
}, },
{ {
"name": "550", "name": "550",
@ -73,9 +73,9 @@
"url": "http://securityreason.com/securityalert/550" "url": "http://securityreason.com/securityalert/550"
}, },
{ {
"name" : "sauerbraten-engineserver-dos(25087)", "name": "ADV-2006-0848",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25087" "url": "http://www.vupen.com/english/advisories/2006/0848"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060309 txtForum: Multiple XSS Vulnerabilities", "name": "23957",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/archive/1/427186/100/0/threaded" "url": "http://www.osvdb.org/23957"
},
{
"name" : "http://www.seclab.tuwien.ac.at/advisories/TUVSA-0603-003.txt",
"refsource" : "MISC",
"url" : "http://www.seclab.tuwien.ac.at/advisories/TUVSA-0603-003.txt"
}, },
{ {
"name": "17054", "name": "17054",
@ -73,29 +68,34 @@
"url": "http://www.osvdb.org/23953" "url": "http://www.osvdb.org/23953"
}, },
{ {
"name" : "23954", "name": "23956",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://www.osvdb.org/23954" "url": "http://www.osvdb.org/23956"
},
{
"name": "http://www.seclab.tuwien.ac.at/advisories/TUVSA-0603-003.txt",
"refsource": "MISC",
"url": "http://www.seclab.tuwien.ac.at/advisories/TUVSA-0603-003.txt"
}, },
{ {
"name": "23955", "name": "23955",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/23955" "url": "http://www.osvdb.org/23955"
}, },
{
"name" : "23956",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23956"
},
{
"name" : "23957",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23957"
},
{ {
"name": "txtforum-multiple-xss(25132)", "name": "txtforum-multiple-xss(25132)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25132" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25132"
},
{
"name": "23954",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23954"
},
{
"name": "20060309 txtForum: Multiple XSS Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/427186/100/0/threaded"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://pridels0.blogspot.com/2006/03/blankol-xss-vuln.html", "name": "blankol-bol-xss(25488)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://pridels0.blogspot.com/2006/03/blankol-xss-vuln.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25488"
},
{
"name" : "17265",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17265"
}, },
{ {
"name": "ADV-2006-1111", "name": "ADV-2006-1111",
@ -78,9 +73,14 @@
"url": "http://secunia.com/advisories/19387" "url": "http://secunia.com/advisories/19387"
}, },
{ {
"name" : "blankol-bol-xss(25488)", "name": "17265",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25488" "url": "http://www.securityfocus.com/bid/17265"
},
{
"name": "http://pridels0.blogspot.com/2006/03/blankol-xss-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2006/03/blankol-xss-vuln.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060411 SAXoPRESS - directory traversal", "name": "ADV-2006-1327",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/430707/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2006/1327"
}, },
{ {
"name": "20060412 Re: SAXoPRESS - directory traversal aka Saxotech Online", "name": "20060412 Re: SAXoPRESS - directory traversal aka Saxotech Online",
@ -67,11 +67,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/17474" "url": "http://www.securityfocus.com/bid/17474"
}, },
{
"name" : "ADV-2006-1327",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1327"
},
{ {
"name": "19566", "name": "19566",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +76,11 @@
"name": "saxopress-pbcs-directory-traversal(25768)", "name": "saxopress-pbcs-directory-traversal(25768)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25768" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25768"
},
{
"name": "20060411 SAXoPRESS - directory traversal",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/430707/100/0/threaded"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=133988", "name": "18794",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=133988" "url": "http://www.securityfocus.com/bid/18794"
}, },
{ {
"name": "GLSA-200607-01", "name": "GLSA-200607-01",
@ -63,9 +63,9 @@
"url": "http://security.gentoo.org/glsa/glsa-200607-01.xml" "url": "http://security.gentoo.org/glsa/glsa-200607-01.xml"
}, },
{ {
"name" : "18794", "name": "http://bugs.gentoo.org/show_bug.cgi?id=133988",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/18794" "url": "http://bugs.gentoo.org/show_bug.cgi?id=133988"
}, },
{ {
"name": "20937", "name": "20937",

View File

@ -52,65 +52,65 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060913 Cisco IOS VTP issues",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/445896/100/0/threaded"
},
{
"name" : "20060913 Re: Cisco IOS VTP issues",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/445938/100/0/threaded"
},
{
"name" : "http://www.phenoelit.de/stuff/CiscoVTP.txt",
"refsource" : "MISC",
"url" : "http://www.phenoelit.de/stuff/CiscoVTP.txt"
},
{
"name" : "20060913 Cisco VLAN Trunking Protocol Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml"
},
{ {
"name": "VU#542108", "name": "VU#542108",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/542108" "url": "http://www.kb.cert.org/vuls/id/542108"
}, },
{
"name" : "19998",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19998"
},
{
"name" : "ADV-2006-3600",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3600"
},
{ {
"name": "ADV-2006-3601", "name": "ADV-2006-3601",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3601" "url": "http://www.vupen.com/english/advisories/2006/3601"
}, },
{ {
"name" : "28777", "name": "http://www.phenoelit.de/stuff/CiscoVTP.txt",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://www.osvdb.org/28777" "url": "http://www.phenoelit.de/stuff/CiscoVTP.txt"
},
{
"name" : "1016843",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016843"
}, },
{ {
"name": "21896", "name": "21896",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21896" "url": "http://secunia.com/advisories/21896"
}, },
{
"name": "19998",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19998"
},
{
"name": "20060913 Cisco VLAN Trunking Protocol Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml"
},
{
"name": "1016843",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016843"
},
{
"name": "20060913 Re: Cisco IOS VTP issues",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/445938/100/0/threaded"
},
{
"name": "28777",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28777"
},
{ {
"name": "cisco-ios-vtp-vlan-name-bo(28927)", "name": "cisco-ios-vtp-vlan-name-bo(28927)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28927" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28927"
},
{
"name": "ADV-2006-3600",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3600"
},
{
"name": "20060913 Cisco IOS VTP issues",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/445896/100/0/threaded"
} }
] ]
} }

View File

@ -57,26 +57,26 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2605" "url": "https://www.exploit-db.com/exploits/2605"
}, },
{
"name" : "20654",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20654"
},
{ {
"name": "ADV-2006-4146", "name": "ADV-2006-4146",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4146" "url": "http://www.vupen.com/english/advisories/2006/4146"
}, },
{
"name": "20654",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20654"
},
{
"name": "22496",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22496"
},
{ {
"name": "29935", "name": "29935",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/29935" "url": "http://www.osvdb.org/29935"
}, },
{
"name" : "29936",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/29936"
},
{ {
"name": "29937", "name": "29937",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -88,9 +88,9 @@
"url": "http://www.osvdb.org/29938" "url": "http://www.osvdb.org/29938"
}, },
{ {
"name" : "22496", "name": "29936",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/22496" "url": "http://www.osvdb.org/29936"
}, },
{ {
"name": "rssonate-project-file-include(29703)", "name": "rssonate-project-file-include(29703)",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2053", "ID": "CVE-2010-2053",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,56 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "FEDORA-2010-9692",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042699.html"
},
{
"name": "FEDORA-2010-9679",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042725.html"
},
{
"name": "39945",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39945"
},
{ {
"name": "[oss-security] 20100529 Fwd: emesene preditable temporary filename", "name": "[oss-security] 20100529 Fwd: emesene preditable temporary filename",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127514641525366&w=2" "url": "http://marc.info/?l=oss-security&m=127514641525366&w=2"
}, },
{
"name": "40115",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40115"
},
{
"name": "emesene-emsnpic-symlink(59045)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59045"
},
{
"name": "40455",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40455"
},
{
"name": "ADV-2010-1423",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1423"
},
{
"name": "FEDORA-2010-9696",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042683.html"
},
{
"name": "65018",
"refsource": "OSVDB",
"url": "http://osvdb.org/65018"
},
{ {
"name": "http://forum.emesene.org/index.php?topic=3441.0", "name": "http://forum.emesene.org/index.php?topic=3441.0",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,51 +111,6 @@
"name": "http://www.emesene.org/", "name": "http://www.emesene.org/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.emesene.org/" "url": "http://www.emesene.org/"
},
{
"name" : "FEDORA-2010-9679",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042725.html"
},
{
"name" : "FEDORA-2010-9692",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042699.html"
},
{
"name" : "FEDORA-2010-9696",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042683.html"
},
{
"name" : "40455",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40455"
},
{
"name" : "65018",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/65018"
},
{
"name" : "39945",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39945"
},
{
"name" : "40115",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40115"
},
{
"name" : "ADV-2010-1423",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1423"
},
{
"name" : "emesene-emsnpic-symlink(59045)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/59045"
} }
] ]
} }

View File

@ -53,49 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20100610 CVE request for new wireshark vulnerabilities", "name": "SUSE-SR:2011:001",
"refsource" : "MLIST", "refsource": "SUSE",
"url" : "http://www.openwall.com/lists/oss-security/2010/06/11/1" "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
}, },
{ {
"name": "http://www.wireshark.org/security/wnpa-sec-2010-05.html", "name": "http://www.wireshark.org/security/wnpa-sec-2010-05.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2010-05.html" "url": "http://www.wireshark.org/security/wnpa-sec-2010-05.html"
}, },
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{ {
"name": "http://www.wireshark.org/security/wnpa-sec-2010-06.html", "name": "http://www.wireshark.org/security/wnpa-sec-2010-06.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2010-06.html" "url": "http://www.wireshark.org/security/wnpa-sec-2010-06.html"
}, },
{ {
"name" : "MDVSA-2010:113", "name": "[oss-security] 20100610 CVE request for new wireshark vulnerabilities",
"refsource" : "MANDRIVA", "refsource": "MLIST",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:113" "url": "http://www.openwall.com/lists/oss-security/2010/06/11/1"
},
{
"name" : "SUSE-SR:2011:001",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
},
{
"name" : "SUSE-SR:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name" : "40728",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40728"
},
{
"name" : "oval:org.mitre.oval:def:11488",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11488"
},
{
"name" : "40112",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40112"
}, },
{ {
"name": "42877", "name": "42877",
@ -103,14 +88,9 @@
"url": "http://secunia.com/advisories/42877" "url": "http://secunia.com/advisories/42877"
}, },
{ {
"name" : "43068", "name": "SUSE-SR:2011:002",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/43068" "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name" : "ADV-2010-1418",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1418"
}, },
{ {
"name": "ADV-2011-0076", "name": "ADV-2011-0076",
@ -118,9 +98,29 @@
"url": "http://www.vupen.com/english/advisories/2011/0076" "url": "http://www.vupen.com/english/advisories/2011/0076"
}, },
{ {
"name" : "ADV-2011-0212", "name": "40112",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40112"
},
{
"name": "40728",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40728"
},
{
"name": "ADV-2010-1418",
"refsource": "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0212" "url": "http://www.vupen.com/english/advisories/2010/1418"
},
{
"name": "oval:org.mitre.oval:def:11488",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11488"
},
{
"name": "MDVSA-2010:113",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:113"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2010-1411",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1411"
},
{ {
"name": "PM10270", "name": "PM10270",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM10270" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM10270"
}, },
{
"name" : "PM15830",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PM15830"
},
{ {
"name": "65439", "name": "65439",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/65439" "url": "http://www.osvdb.org/65439"
}, },
{
"name": "PM15830",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM15830"
},
{ {
"name": "40096", "name": "40096",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40096" "url": "http://secunia.com/advisories/40096"
},
{
"name" : "ADV-2010-1411",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1411"
} }
] ]
} }

View File

@ -57,6 +57,16 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/13970" "url": "http://www.exploit-db.com/exploits/13970"
}, },
{
"name": "videocommportal-video-sql-injection(59638)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59638"
},
{
"name": "65810",
"refsource": "OSVDB",
"url": "http://osvdb.org/65810"
},
{ {
"name": "http://packetstormsecurity.org/1006-exploits/2daybizvcp-sql.txt", "name": "http://packetstormsecurity.org/1006-exploits/2daybizvcp-sql.txt",
"refsource": "MISC", "refsource": "MISC",
@ -66,16 +76,6 @@
"name": "41022", "name": "41022",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/41022" "url": "http://www.securityfocus.com/bid/41022"
},
{
"name" : "65810",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/65810"
},
{
"name" : "videocommportal-video-sql-injection(59638)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/59638"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2484", "ID": "CVE-2010-2484",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,46 +52,46 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.php.net/releases/5_2_14.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/releases/5_2_14.php"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=619324",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=619324"
},
{
"name" : "http://support.apple.com/kb/HT4312",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4312"
},
{ {
"name": "http://support.apple.com/kb/HT4435", "name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4435" "url": "http://support.apple.com/kb/HT4435"
}, },
{
"name" : "APPLE-SA-2010-08-24-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
},
{
"name" : "APPLE-SA-2010-11-10-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{ {
"name": "HPSBOV02763", "name": "HPSBOV02763",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2" "url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
}, },
{
"name": "http://www.php.net/releases/5_2_14.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/releases/5_2_14.php"
},
{
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "APPLE-SA-2010-08-24-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=619324",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=619324"
},
{ {
"name": "SSRT100826", "name": "SSRT100826",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2" "url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
}, },
{
"name": "http://support.apple.com/kb/HT4312",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4312"
},
{ {
"name": "SUSE-SR:2010:018", "name": "SUSE-SR:2010:018",
"refsource": "SUSE", "refsource": "SUSE",

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html"
},
{ {
"name": "SUSE-SR:2011:001", "name": "SUSE-SR:2011:001",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
}, },
{
"name" : "SUSE-SR:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name" : "oval:org.mitre.oval:def:12047",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12047"
},
{
"name" : "42877",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42877"
},
{ {
"name": "43068", "name": "43068",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068" "url": "http://secunia.com/advisories/43068"
}, },
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "42877",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42877"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html"
},
{ {
"name": "ADV-2011-0076", "name": "ADV-2011-0076",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0076" "url": "http://www.vupen.com/english/advisories/2011/0076"
}, },
{ {
"name" : "ADV-2011-0212", "name": "oval:org.mitre.oval:def:12047",
"refsource" : "VUPEN", "refsource": "OVAL",
"url" : "http://www.vupen.com/english/advisories/2011/0212" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12047"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2010-3039", "ID": "CVE-2010-3039",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20101105 nSense-2010-003: Cisco Unified Communications Manager",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/514668/100/0/threaded"
},
{
"name" : "20101105 nSense-2010-003: Cisco Unified Communications Manager",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2010/Nov/40"
},
{
"name" : "http://www.nsense.fi/advisories/nsense_2010_003.txt",
"refsource" : "MISC",
"url" : "http://www.nsense.fi/advisories/nsense_2010_003.txt"
},
{ {
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21656", "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21656",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -77,16 +62,31 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/44672" "url": "http://www.securityfocus.com/bid/44672"
}, },
{
"name": "20101105 nSense-2010-003: Cisco Unified Communications Manager",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/514668/100/0/threaded"
},
{ {
"name": "1024694", "name": "1024694",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024694" "url": "http://www.securitytracker.com/id?1024694"
}, },
{
"name": "http://www.nsense.fi/advisories/nsense_2010_003.txt",
"refsource": "MISC",
"url": "http://www.nsense.fi/advisories/nsense_2010_003.txt"
},
{ {
"name": "42129", "name": "42129",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42129" "url": "http://secunia.com/advisories/42129"
}, },
{
"name": "20101105 nSense-2010-003: Cisco Unified Communications Manager",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2010/Nov/40"
},
{ {
"name": "ADV-2010-2915", "name": "ADV-2010-2915",
"refsource": "VUPEN", "refsource": "VUPEN",

View File

@ -52,6 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "43291",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43291"
},
{
"name": "ADV-2010-2425",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2425"
},
{
"name": "ibm-db2-sql-security-bypass(61873)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61873"
},
{
"name": "41444",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41444"
},
{ {
"name": "http://www.ibm.com/support/docview.wss?uid=swg21446455", "name": "http://www.ibm.com/support/docview.wss?uid=swg21446455",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,11 +82,6 @@
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC70406" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC70406"
}, },
{
"name" : "43291",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/43291"
},
{ {
"name": "68122", "name": "68122",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -81,21 +96,6 @@
"name": "1024458", "name": "1024458",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024458" "url": "http://www.securitytracker.com/id?1024458"
},
{
"name" : "41444",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41444"
},
{
"name" : "ADV-2010-2425",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2425"
},
{
"name" : "ibm-db2-sql-security-bypass(61873)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/61873"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2010-3651", "ID": "CVE-2010-3651",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4238", "ID": "CVE-2010-4238",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{ {
"name": "http://bugs.centos.org/bug_view_advanced_page.php?bug_id=4517", "name": "http://bugs.centos.org/bug_view_advanced_page.php?bug_id=4517",
"refsource": "MISC", "refsource": "MISC",
@ -68,9 +63,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=655623" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=655623"
}, },
{ {
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource" : "CONFIRM", "refsource": "BUGTRAQ",
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
}, },
{ {
"name": "RHSA-2011:0017", "name": "RHSA-2011:0017",
@ -78,9 +73,14 @@
"url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html" "url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html"
}, },
{ {
"name" : "45795", "name": "46397",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/45795" "url": "http://secunia.com/advisories/46397"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
}, },
{ {
"name": "42884", "name": "42884",
@ -88,9 +88,9 @@
"url": "http://secunia.com/advisories/42884" "url": "http://secunia.com/advisories/42884"
}, },
{ {
"name" : "46397", "name": "45795",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/46397" "url": "http://www.securityfocus.com/bid/45795"
}, },
{ {
"name": "xen-vdbcreate-dos(64698)", "name": "xen-vdbcreate-dos(64698)",

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.facebook.com/note.php?note_id=477865030928", "name": "40820",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40820"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=638646",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.facebook.com/note.php?note_id=477865030928" "url": "https://bugzilla.novell.com/show_bug.cgi?id=638646"
}, },
{ {
"name": "http://www.novell.com/support/viewContent.do?externalId=7007156&sliceId=1", "name": "http://www.novell.com/support/viewContent.do?externalId=7007156&sliceId=1",
@ -68,14 +73,9 @@
"url": "https://bugzilla.novell.com/show_bug.cgi?id=638644" "url": "https://bugzilla.novell.com/show_bug.cgi?id=638644"
}, },
{ {
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=638646", "name": "http://www.facebook.com/note.php?note_id=477865030928",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=638646" "url": "http://www.facebook.com/note.php?note_id=477865030928"
},
{
"name" : "40820",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40820"
} }
] ]
} }

View File

@ -52,36 +52,36 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20101126 [eVuln.com] SQL injection Auth Bypass in Easy Banner Free",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/514908/100/0/threaded"
},
{ {
"name": "http://evuln.com/vulns/147/summary.html", "name": "http://evuln.com/vulns/147/summary.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://evuln.com/vulns/147/summary.html" "url": "http://evuln.com/vulns/147/summary.html"
}, },
{
"name" : "http://packetstormsecurity.org/files/view/96153/easybannerfree-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/files/view/96153/easybannerfree-sql.txt"
},
{ {
"name": "45066", "name": "45066",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/45066" "url": "http://www.securityfocus.com/bid/45066"
}, },
{ {
"name" : "69511", "name": "20101126 [eVuln.com] SQL injection Auth Bypass in Easy Banner Free",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://www.osvdb.org/69511" "url": "http://www.securityfocus.com/archive/1/514908/100/0/threaded"
}, },
{ {
"name": "42316", "name": "42316",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42316" "url": "http://secunia.com/advisories/42316"
}, },
{
"name": "http://packetstormsecurity.org/files/view/96153/easybannerfree-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/files/view/96153/easybannerfree-sql.txt"
},
{
"name": "69511",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/69511"
},
{ {
"name": "8184", "name": "8184",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "15232", "name": "orangehrm-index-file-include(62388)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "http://www.exploit-db.com/exploits/15232" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62388"
}, },
{ {
"name": "43905", "name": "43905",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/43905" "url": "http://www.securityfocus.com/bid/43905"
}, },
{ {
"name" : "orangehrm-index-file-include(62388)", "name": "15232",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62388" "url": "http://www.exploit-db.com/exploits/15232"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.org/1011-exploits/wpvodpod-xss.txt", "name": "42195",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://packetstormsecurity.org/1011-exploits/wpvodpod-xss.txt" "url": "http://secunia.com/advisories/42195"
},
{
"name": "vodpod-gid-xss(63057)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63057"
}, },
{ {
"name": "http://www.johnleitch.net/Vulnerabilities/WordPress.Vodpod.Video.Gallery.3.1.5.Reflected.Cross-site.Scripting/58", "name": "http://www.johnleitch.net/Vulnerabilities/WordPress.Vodpod.Video.Gallery.3.1.5.Reflected.Cross-site.Scripting/58",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.johnleitch.net/Vulnerabilities/WordPress.Vodpod.Video.Gallery.3.1.5.Reflected.Cross-site.Scripting/58" "url": "http://www.johnleitch.net/Vulnerabilities/WordPress.Vodpod.Video.Gallery.3.1.5.Reflected.Cross-site.Scripting/58"
}, },
{
"name" : "69084",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/69084"
},
{
"name" : "42195",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42195"
},
{ {
"name": "8431", "name": "8431",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8431" "url": "http://securityreason.com/securityalert/8431"
}, },
{ {
"name" : "vodpod-gid-xss(63057)", "name": "http://packetstormsecurity.org/1011-exploits/wpvodpod-xss.txt",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/63057" "url": "http://packetstormsecurity.org/1011-exploits/wpvodpod-xss.txt"
},
{
"name": "69084",
"refsource": "OSVDB",
"url": "http://osvdb.org/69084"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1002", "ID": "CVE-2011-1002",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,134 +53,49 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20110218 CVE request: avahi daemon remote denial of service by sending NULL UDP", "name": "RHSA-2011:0779",
"refsource" : "MLIST", "refsource": "REDHAT",
"url" : "http://openwall.com/lists/oss-security/2011/02/18/1" "url": "http://www.redhat.com/support/errata/RHSA-2011-0779.html"
}, },
{ {
"name" : "[oss-security] 20110218 Re: CVE request: avahi daemon remote denial of service by sending NULL UDP", "name": "avahi-udp-packet-dos(65525)",
"refsource" : "MLIST", "refsource": "XF",
"url" : "http://openwall.com/lists/oss-security/2011/02/18/4" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65525"
}, },
{ {
"name": "[oss-security] 20110222 Re: [oss-security] CVE request: avahi daemon remote denial of service by sending NULL UDP", "name": "[oss-security] 20110222 Re: [oss-security] CVE request: avahi daemon remote denial of service by sending NULL UDP",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/02/22/9" "url": "http://www.openwall.com/lists/oss-security/2011/02/22/9"
}, },
{
"name" : "http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/",
"refsource" : "MISC",
"url" : "http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/"
},
{
"name" : "http://avahi.org/ticket/325",
"refsource" : "CONFIRM",
"url" : "http://avahi.org/ticket/325"
},
{
"name" : "http://git.0pointer.de/?p=avahi.git;a=commit;h=46109dfec75534fe270c0ab902576f685d5ab3a6",
"refsource" : "CONFIRM",
"url" : "http://git.0pointer.de/?p=avahi.git;a=commit;h=46109dfec75534fe270c0ab902576f685d5ab3a6"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=667187",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=667187"
},
{
"name" : "DSA-2174",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2174"
},
{
"name" : "FEDORA-2011-3033",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.html"
},
{
"name" : "MDVSA-2011:037",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:037"
},
{
"name" : "MDVSA-2011:040",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:040"
},
{ {
"name": "RHSA-2011:0436", "name": "RHSA-2011:0436",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0436.html" "url": "http://www.redhat.com/support/errata/RHSA-2011-0436.html"
}, },
{
"name" : "RHSA-2011:0779",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0779.html"
},
{
"name" : "SUSE-SR:2011:005",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name" : "USN-1084-1",
"refsource" : "UBUNTU",
"url" : "http://ubuntu.com/usn/usn-1084-1"
},
{
"name" : "46446",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46446"
},
{
"name" : "70948",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/70948"
},
{
"name" : "43361",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43361"
},
{
"name" : "43465",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43465"
},
{
"name" : "43605",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43605"
},
{
"name" : "43673",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43673"
},
{
"name" : "44131",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44131"
},
{
"name" : "ADV-2011-0448",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0448"
},
{
"name" : "ADV-2011-0499",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0499"
},
{ {
"name": "ADV-2011-0511", "name": "ADV-2011-0511",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0511" "url": "http://www.vupen.com/english/advisories/2011/0511"
}, },
{ {
"name" : "ADV-2011-0565", "name": "[oss-security] 20110218 CVE request: avahi daemon remote denial of service by sending NULL UDP",
"refsource" : "VUPEN", "refsource": "MLIST",
"url" : "http://www.vupen.com/english/advisories/2011/0565" "url": "http://openwall.com/lists/oss-security/2011/02/18/1"
},
{
"name": "43605",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43605"
},
{
"name": "43465",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43465"
},
{
"name": "43673",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43673"
}, },
{ {
"name": "ADV-2011-0601", "name": "ADV-2011-0601",
@ -188,9 +103,9 @@
"url": "http://www.vupen.com/english/advisories/2011/0601" "url": "http://www.vupen.com/english/advisories/2011/0601"
}, },
{ {
"name" : "ADV-2011-0670", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=667187",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2011/0670" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667187"
}, },
{ {
"name": "ADV-2011-0969", "name": "ADV-2011-0969",
@ -203,9 +118,94 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65524" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65524"
}, },
{ {
"name" : "avahi-udp-packet-dos(65525)", "name": "44131",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65525" "url": "http://secunia.com/advisories/44131"
},
{
"name": "MDVSA-2011:040",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:040"
},
{
"name": "46446",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46446"
},
{
"name": "MDVSA-2011:037",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:037"
},
{
"name": "ADV-2011-0448",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0448"
},
{
"name": "SUSE-SR:2011:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "DSA-2174",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2174"
},
{
"name": "ADV-2011-0499",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0499"
},
{
"name": "70948",
"refsource": "OSVDB",
"url": "http://osvdb.org/70948"
},
{
"name": "43361",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43361"
},
{
"name": "ADV-2011-0670",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0670"
},
{
"name": "http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/",
"refsource": "MISC",
"url": "http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/"
},
{
"name": "http://avahi.org/ticket/325",
"refsource": "CONFIRM",
"url": "http://avahi.org/ticket/325"
},
{
"name": "FEDORA-2011-3033",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.html"
},
{
"name": "ADV-2011-0565",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0565"
},
{
"name": "http://git.0pointer.de/?p=avahi.git;a=commit;h=46109dfec75534fe270c0ab902576f685d5ab3a6",
"refsource": "CONFIRM",
"url": "http://git.0pointer.de/?p=avahi.git;a=commit;h=46109dfec75534fe270c0ab902576f685d5ab3a6"
},
{
"name": "USN-1084-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1084-1"
},
{
"name": "[oss-security] 20110218 Re: CVE request: avahi daemon remote denial of service by sending NULL UDP",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/02/18/4"
} }
] ]
} }

View File

@ -52,20 +52,60 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681054",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681054"
},
{ {
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
}, },
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
},
{
"name": "44353",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44353"
},
{
"name": "1025450",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025450"
},
{
"name": "gnuclibrary-fnmatch-dos(66819)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66819"
},
{
"name": "MDVSA-2011:178",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"
},
{
"name": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html",
"refsource": "MISC",
"url": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{ {
"name": "http://code.google.com/p/chromium/issues/detail?id=48733", "name": "http://code.google.com/p/chromium/issues/detail?id=48733",
"refsource": "MISC", "refsource": "MISC",
"url": "http://code.google.com/p/chromium/issues/detail?id=48733" "url": "http://code.google.com/p/chromium/issues/detail?id=48733"
}, },
{ {
"name" : "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html", "name": "MDVSA-2011:179",
"refsource" : "MISC", "refsource": "MANDRIVA",
"url" : "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"
}, },
{ {
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=12583", "name": "http://sourceware.org/bugzilla/show_bug.cgi?id=12583",
@ -76,46 +116,6 @@
"name": "http://sourceware.org/git/?p=glibc.git;a=commit;h=8126d90480fa3e0c5c5cd0d02cb1c93174b45485", "name": "http://sourceware.org/git/?p=glibc.git;a=commit;h=8126d90480fa3e0c5c5cd0d02cb1c93174b45485",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://sourceware.org/git/?p=glibc.git;a=commit;h=8126d90480fa3e0c5c5cd0d02cb1c93174b45485" "url": "http://sourceware.org/git/?p=glibc.git;a=commit;h=8126d90480fa3e0c5c5cd0d02cb1c93174b45485"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=681054",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=681054"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name" : "MDVSA-2011:178",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"
},
{
"name" : "MDVSA-2011:179",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"
},
{
"name" : "1025450",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025450"
},
{
"name" : "44353",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44353"
},
{
"name" : "46397",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46397"
},
{
"name" : "gnuclibrary-fnmatch-dos(66819)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66819"
} }
] ]
} }

View File

@ -52,36 +52,36 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-02.pdf",
"refsource" : "MISC",
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-02.pdf"
},
{ {
"name": "http://www.citect.com/citectscada-batch", "name": "http://www.citect.com/citectscada-batch",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.citect.com/citectscada-batch" "url": "http://www.citect.com/citectscada-batch"
}, },
{
"name" : "https://my.mitsubishi-automation.com/downloads_show.php?portal_id=1&doc_type=safety&scat=2&sstr=MX4,SCADA",
"refsource" : "CONFIRM",
"url" : "https://my.mitsubishi-automation.com/downloads_show.php?portal_id=1&doc_type=safety&scat=2&sstr=MX4,SCADA"
},
{ {
"name": "76937", "name": "76937",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/76937" "url": "http://www.osvdb.org/76937"
}, },
{ {
"name" : "1026306", "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-02.pdf",
"refsource" : "SECTRACK", "refsource": "MISC",
"url" : "http://www.securitytracker.com/id?1026306" "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-02.pdf"
}, },
{ {
"name": "46779", "name": "46779",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46779" "url": "http://secunia.com/advisories/46779"
}, },
{
"name": "1026306",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026306"
},
{
"name": "https://my.mitsubishi-automation.com/downloads_show.php?portal_id=1&doc_type=safety&scat=2&sstr=MX4,SCADA",
"refsource": "CONFIRM",
"url": "https://my.mitsubishi-automation.com/downloads_show.php?portal_id=1&doc_type=safety&scat=2&sstr=MX4,SCADA"
},
{ {
"name": "46786", "name": "46786",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3347", "ID": "CVE-2014-3347",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "cisco-isr-cve20143347-dos(95558)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95558"
},
{ {
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35453", "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35453",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35453" "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35453"
}, },
{
"name": "1030772",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030772"
},
{ {
"name": "20140827 Cisco 1800 Series ISR ISDN Basic Rate Interface Denial of Service Vulnerability", "name": "20140827 Cisco 1800 Series ISR ISDN Basic Rate Interface Denial of Service Vulnerability",
"refsource": "CISCO", "refsource": "CISCO",
@ -66,16 +76,6 @@
"name": "69439", "name": "69439",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/69439" "url": "http://www.securityfocus.com/bid/69439"
},
{
"name" : "1030772",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030772"
},
{
"name" : "cisco-isr-cve20143347-dos(95558)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95558"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3403", "ID": "CVE-2014-3403",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20140514 Xen Security Advisory 95 - input handling vulnerabilities loading guest kernel on ARM",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/05/14/4"
},
{
"name" : "[oss-security] 20140515 Re: Xen Security Advisory 95 - input handling vulnerabilities loading guest kernel on ARM",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/05/15/6"
},
{
"name" : "[oss-security] 20140516 Xen Security Advisory 95 (CVE-2014-3714,CVE-2014-3715,CVE-2014-3716,CVE-2014-3717) - input handling vulnerabilities loading guest kernel on ARM",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/05/16/1"
},
{ {
"name": "http://xenbits.xen.org/xsa/advisory-95.html", "name": "http://xenbits.xen.org/xsa/advisory-95.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -76,6 +61,21 @@
"name": "1030252", "name": "1030252",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030252" "url": "http://www.securitytracker.com/id/1030252"
},
{
"name": "[oss-security] 20140514 Xen Security Advisory 95 - input handling vulnerabilities loading guest kernel on ARM",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/05/14/4"
},
{
"name": "[oss-security] 20140516 Xen Security Advisory 95 (CVE-2014-3714,CVE-2014-3715,CVE-2014-3716,CVE-2014-3717) - input handling vulnerabilities loading guest kernel on ARM",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/05/16/1"
},
{
"name": "[oss-security] 20140515 Re: Xen Security Advisory 95 - input handling vulnerabilities loading guest kernel on ARM",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/05/15/6"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7454", "ID": "CVE-2014-7454",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#709217",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/709217"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#709217", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/709217" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8057", "ID": "CVE-2014-8057",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8200", "ID": "CVE-2014-8200",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt",
"refsource" : "MISC",
"url" : "https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt"
},
{ {
"name": "https://networks.unify.com/security/advisories/OBSO-1501-02.pdf", "name": "https://networks.unify.com/security/advisories/OBSO-1501-02.pdf",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://networks.unify.com/security/advisories/OBSO-1501-02.pdf" "url": "https://networks.unify.com/security/advisories/OBSO-1501-02.pdf"
},
{
"name": "https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt",
"refsource": "MISC",
"url": "https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt"
} }
] ]
} }

View File

@ -52,21 +52,36 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "113110",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/113110"
},
{
"name": "croogo-multiple-post-xss(96991)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96991"
},
{ {
"name": "34959", "name": "34959",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/34959" "url": "http://www.exploit-db.com/exploits/34959"
}, },
{ {
"name" : "http://packetstormsecurity.com/files/128639/Croogo-2.0.0-Cross-Site-Scripting.html", "name": "113113",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://packetstormsecurity.com/files/128639/Croogo-2.0.0-Cross-Site-Scripting.html" "url": "http://www.osvdb.org/113113"
}, },
{ {
"name": "http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php", "name": "http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php",
"refsource": "MISC", "refsource": "MISC",
"url": "http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php" "url": "http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php"
}, },
{
"name": "http://packetstormsecurity.com/files/128639/Croogo-2.0.0-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128639/Croogo-2.0.0-Cross-Site-Scripting.html"
},
{ {
"name": "http://blog.croogo.org/blog/croogo-210-released", "name": "http://blog.croogo.org/blog/croogo-210-released",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -77,25 +92,10 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/113109" "url": "http://www.osvdb.org/113109"
}, },
{
"name" : "113110",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/113110"
},
{ {
"name": "113111", "name": "113111",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/113111" "url": "http://www.osvdb.org/113111"
},
{
"name" : "113113",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/113113"
},
{
"name" : "croogo-multiple-post-xss(96991)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/96991"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://wordpress.org/plugins/cart66-lite/changelog/",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/cart66-lite/changelog/"
},
{ {
"name": "https://research.g0blin.co.uk/g0blin-00021/", "name": "https://research.g0blin.co.uk/g0blin-00021/",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://plugins.trac.wordpress.org/changeset/1052064/cart66-lite", "name": "https://plugins.trac.wordpress.org/changeset/1052064/cart66-lite",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://plugins.trac.wordpress.org/changeset/1052064/cart66-lite" "url": "https://plugins.trac.wordpress.org/changeset/1052064/cart66-lite"
},
{
"name" : "https://wordpress.org/plugins/cart66-lite/changelog/",
"refsource" : "CONFIRM",
"url" : "https://wordpress.org/plugins/cart66-lite/changelog/"
} }
] ]
} }

View File

@ -53,19 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20150318 Multiple Cross-Site Scripting vulnerabilities in Websense Reporting", "name": "https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://www.securityfocus.com/archive/1/534915/100/0/threaded" "url": "https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html"
}, },
{ {
"name" : "20150318 Cross-Site Scripting vulnerability in Websense Explorer report scheduler", "name": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/534917/100/0/threaded" "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"
}, },
{ {
"name" : "20150318 Multiple Cross-Site Scripting vulnerabilities in Websense Reporting", "name": "https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html",
"refsource" : "FULLDISC", "refsource": "MISC",
"url" : "http://seclists.org/fulldisclosure/2015/Mar/110" "url": "https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html"
},
{
"name": "http://www.websense.com/support/article/kbarticle/v7-8-3-About-Hotfix-02-for-Web-Security-Solutions",
"refsource": "CONFIRM",
"url": "http://www.websense.com/support/article/kbarticle/v7-8-3-About-Hotfix-02-for-Web-Security-Solutions"
}, },
{ {
"name": "20150318 Cross-Site Scripting vulnerability in Websense Explorer report scheduler", "name": "20150318 Cross-Site Scripting vulnerability in Websense Explorer report scheduler",
@ -77,35 +82,30 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/130905/Websense-Reporting-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/130905/Websense-Reporting-Cross-Site-Scripting.html"
}, },
{
"name" : "https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html",
"refsource" : "MISC",
"url" : "https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html"
},
{
"name" : "https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html",
"refsource" : "MISC",
"url" : "https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html"
},
{ {
"name": "http://packetstormsecurity.com/files/130903/Websense-Explorer-Report-Scheduler-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/130903/Websense-Explorer-Report-Scheduler-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/130903/Websense-Explorer-Report-Scheduler-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/130903/Websense-Explorer-Report-Scheduler-Cross-Site-Scripting.html"
}, },
{ {
"name" : "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", "name": "20150318 Multiple Cross-Site Scripting vulnerabilities in Websense Reporting",
"refsource" : "CONFIRM", "refsource": "FULLDISC",
"url" : "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0" "url": "http://seclists.org/fulldisclosure/2015/Mar/110"
},
{
"name" : "http://www.websense.com/support/article/kbarticle/v7-8-3-About-Hotfix-02-for-Web-Security-Solutions",
"refsource" : "CONFIRM",
"url" : "http://www.websense.com/support/article/kbarticle/v7-8-3-About-Hotfix-02-for-Web-Security-Solutions"
}, },
{ {
"name": "http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-01-for-Web-Security-Solutions", "name": "http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-01-for-Web-Security-Solutions",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-01-for-Web-Security-Solutions" "url": "http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-01-for-Web-Security-Solutions"
},
{
"name": "20150318 Cross-Site Scripting vulnerability in Websense Explorer report scheduler",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534917/100/0/threaded"
},
{
"name": "20150318 Multiple Cross-Site Scripting vulnerabilities in Websense Reporting",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534915/100/0/threaded"
} }
] ]
} }

View File

@ -52,26 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/inverse-inc/sogo/commit/80a09407652ec04e8c9fb6cb48e1029e69a15765",
"refsource": "CONFIRM",
"url": "https://github.com/inverse-inc/sogo/commit/80a09407652ec04e8c9fb6cb48e1029e69a15765"
},
{ {
"name": "[oss-security] 20160709 Re: CVE request: several SOGo issues (DOS, XSS, information leakage)", "name": "[oss-security] 20160709 Re: CVE request: several SOGo issues (DOS, XSS, information leakage)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/09/3" "url": "http://www.openwall.com/lists/oss-security/2016/07/09/3"
}, },
{
"name" : "https://github.com/inverse-inc/sogo/commit/1a7fc2a0e90a19dfb1fce292ae5ff53aa513ade9",
"refsource" : "CONFIRM",
"url" : "https://github.com/inverse-inc/sogo/commit/1a7fc2a0e90a19dfb1fce292ae5ff53aa513ade9"
},
{ {
"name": "https://github.com/inverse-inc/sogo/commit/3a5e44e7eb8b390b67a8f8a83030b49606956501", "name": "https://github.com/inverse-inc/sogo/commit/3a5e44e7eb8b390b67a8f8a83030b49606956501",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/inverse-inc/sogo/commit/3a5e44e7eb8b390b67a8f8a83030b49606956501" "url": "https://github.com/inverse-inc/sogo/commit/3a5e44e7eb8b390b67a8f8a83030b49606956501"
}, },
{
"name" : "https://github.com/inverse-inc/sogo/commit/80a09407652ec04e8c9fb6cb48e1029e69a15765",
"refsource" : "CONFIRM",
"url" : "https://github.com/inverse-inc/sogo/commit/80a09407652ec04e8c9fb6cb48e1029e69a15765"
},
{ {
"name": "https://github.com/inverse-inc/sogo/commit/c94595ea7f0f843c2d7abf25df039b2bbe707625", "name": "https://github.com/inverse-inc/sogo/commit/c94595ea7f0f843c2d7abf25df039b2bbe707625",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -81,6 +76,11 @@
"name": "https://sogo.nu/bugs/view.php?id=2598", "name": "https://sogo.nu/bugs/view.php?id=2598",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://sogo.nu/bugs/view.php?id=2598" "url": "https://sogo.nu/bugs/view.php?id=2598"
},
{
"name": "https://github.com/inverse-inc/sogo/commit/1a7fc2a0e90a19dfb1fce292ae5ff53aa513ade9",
"refsource": "CONFIRM",
"url": "https://github.com/inverse-inc/sogo/commit/1a7fc2a0e90a19dfb1fce292ae5ff53aa513ade9"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2016-2295", "ID": "CVE-2016-2295",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-2445", "ID": "CVE-2016-2445",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-7014", "ID": "CVE-2016-7014",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1036986",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036986"
},
{ {
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html", "name": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "93496", "name": "93496",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/93496" "url": "http://www.securityfocus.com/bid/93496"
},
{
"name" : "1036986",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036986"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7326", "ID": "CVE-2016-7326",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,49 +53,49 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-622", "name": "SUSE-SU-2016:3148",
"refsource" : "MISC", "refsource": "SUSE",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-622" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
},
{
"name" : "GLSA-201701-17",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-17"
}, },
{ {
"name": "MS16-154", "name": "MS16-154",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
}, },
{
"name" : "RHSA-2016:2947",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
},
{
"name" : "SUSE-SU-2016:3148",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
},
{
"name" : "openSUSE-SU-2016:3160",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
},
{ {
"name": "94871", "name": "94871",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94871" "url": "http://www.securityfocus.com/bid/94871"
}, },
{
"name": "GLSA-201701-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-17"
},
{ {
"name": "1037442", "name": "1037442",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037442" "url": "http://www.securitytracker.com/id/1037442"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-622",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-622"
},
{
"name": "RHSA-2016:2947",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
},
{
"name": "openSUSE-SU-2016:3160",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7897", "ID": "CVE-2016-7897",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html", "name": "GLSA-201709-15",
"refsource" : "MISC", "refsource": "GENTOO",
"url" : "https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html" "url": "https://security.gentoo.org/glsa/201709-15"
},
{
"name" : "https://crbug.com/740803",
"refsource" : "MISC",
"url" : "https://crbug.com/740803"
}, },
{ {
"name": "DSA-3926", "name": "DSA-3926",
@ -68,9 +63,14 @@
"url": "http://www.debian.org/security/2017/dsa-3926" "url": "http://www.debian.org/security/2017/dsa-3926"
}, },
{ {
"name" : "GLSA-201709-15", "name": "https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html",
"refsource" : "GENTOO", "refsource": "MISC",
"url" : "https://security.gentoo.org/glsa/201709-15" "url": "https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html"
},
{
"name": "99950",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99950"
}, },
{ {
"name": "RHSA-2017:1833", "name": "RHSA-2017:1833",
@ -78,9 +78,9 @@
"url": "https://access.redhat.com/errata/RHSA-2017:1833" "url": "https://access.redhat.com/errata/RHSA-2017:1833"
}, },
{ {
"name" : "99950", "name": "https://crbug.com/740803",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/99950" "url": "https://crbug.com/740803"
} }
] ]
} }