"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:55:44 +00:00
parent c7f81bfaac
commit 3cb49d75f7
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 3700 additions and 3706 deletions

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20010701 WFTPD v3.00 R5 Directory Traversal",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/194442"
},
{
"name": "ftp-lnk-directory-traversal(6760)",
"refsource": "XF",
@ -66,6 +61,11 @@
"name": "2957",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2957"
},
{
"name": "20010701 WFTPD v3.00 R5 Directory Traversal",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/194442"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://downloads.securityfocus.com/vulnerabilities/exploits/duclassified-detail.asp-sql-inj.txt",
"refsource" : "MISC",
"url" : "http://downloads.securityfocus.com/vulnerabilities/exploits/duclassified-detail.asp-sql-inj.txt"
},
{
"name": "17722",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17722"
},
{
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/duclassified-detail.asp-sql-inj.txt",
"refsource": "MISC",
"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/duclassified-detail.asp-sql-inj.txt"
}
]
}

View File

@ -53,50 +53,50 @@
"references": {
"reference_data": [
{
"name" : "20060512 Dovecot IMAP: Mailbox names list disclosure with mboxes",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/433878/100/0/threaded"
"name": "DSA-1080",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1080"
},
{
"name": "http://www.dovecot.org/list/dovecot-news/2006-May/000006.html",
"refsource": "MISC",
"url": "http://www.dovecot.org/list/dovecot-news/2006-May/000006.html"
},
{
"name" : "http://dovecot.org/list/dovecot-cvs/2006-May/005563.html",
"refsource" : "CONFIRM",
"url" : "http://dovecot.org/list/dovecot-cvs/2006-May/005563.html"
},
{
"name" : "DSA-1080",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1080"
},
{
"name" : "17961",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17961"
},
{
"name": "ADV-2006-2013",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2013"
},
{
"name" : "20308",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20308"
},
{
"name": "20315",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20315"
},
{
"name": "17961",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17961"
},
{
"name": "913",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/913"
},
{
"name": "20308",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20308"
},
{
"name": "http://dovecot.org/list/dovecot-cvs/2006-May/005563.html",
"refsource": "CONFIRM",
"url": "http://dovecot.org/list/dovecot-cvs/2006-May/005563.html"
},
{
"name": "20060512 Dovecot IMAP: Mailbox names list disclosure with mboxes",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/433878/100/0/threaded"
},
{
"name": "dovecot-imap-list-information-disclosure(26536)",
"refsource": "XF",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "102345",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102345-1"
},
{
"name" : "18018",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18018"
"name": "1016112",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016112"
},
{
"name": "ADV-2006-1832",
@ -68,19 +63,24 @@
"url": "http://www.vupen.com/english/advisories/2006/1832"
},
{
"name" : "1016112",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016112"
"name": "sun-java-unauth-access(26477)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26477"
},
{
"name": "18018",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18018"
},
{
"name": "102345",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102345-1"
},
{
"name": "20144",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20144"
},
{
"name" : "sun-java-unauth-access(26477)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26477"
}
]
}

View File

@ -52,26 +52,166 @@
},
"references": {
"reference_data": [
{
"name": "21176",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21176"
},
{
"name": "MDKSA-2006:145",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145"
},
{
"name": "ADV-2006-3748",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3748"
},
{
"name": "USN-297-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/297-3/"
},
{
"name": "USN-296-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/296-1/"
},
{
"name": "oval:org.mitre.oval:def:9768",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9768"
},
{
"name": "USN-323-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/323-1/"
},
{
"name": "20561",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20561"
},
{
"name": "21210",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21210"
},
{
"name": "RHSA-2006:0594",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
},
{
"name": "21336",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21336"
},
{
"name": "20060602 rPSA-2006-0091-1 firefox thunderbird",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435795/100/0/threaded"
},
{
"name": "RHSA-2006:0610",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html"
},
{
"name": "20376",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20376"
},
{
"name": "RHSA-2006:0609",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"name": "21178",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21178"
},
{
"name": "1016202",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016202"
},
{
"name": "http://www.mozilla.org/security/announce/2006/mfsa2006-36.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-36.html"
},
{
"name": "18228",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18228"
},
{
"name": "21532",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21532"
},
{
"name": "21270",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21270"
},
{
"name": "ADV-2008-0083",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name": "21188",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21188"
},
{
"name": "21134",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21134"
},
{
"name": "21631",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21631"
},
{
"name": "SSRT061181",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name": "mozilla-pluginspage-code-execution(26847)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26847"
},
{
"name": "USN-296-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/296-2/"
},
{
"name": "DSA-1118",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1118"
},
{
"name": "HPSBUX02153",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name": "DSA-1120",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1120"
},
{
"name": "RHSA-2006:0611",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
},
{
"name": "DSA-1134",
"refsource": "DEBIAN",
@ -83,119 +223,9 @@
"url": "http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml"
},
{
"name" : "HPSBUX02153",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name" : "SSRT061181",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name" : "MDKSA-2006:143",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143"
},
{
"name" : "MDKSA-2006:145",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145"
},
{
"name" : "RHSA-2006:0578",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0578.html"
},
{
"name" : "RHSA-2006:0610",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0610.html"
},
{
"name" : "RHSA-2006:0611",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
},
{
"name" : "RHSA-2006:0609",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"name" : "RHSA-2006:0594",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
},
{
"name" : "SUSE-SA:2006:035",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_35_mozilla.html"
},
{
"name" : "USN-296-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/296-1/"
},
{
"name" : "USN-296-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/296-2/"
},
{
"name" : "USN-297-3",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/297-3/"
},
{
"name" : "USN-323-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/323-1/"
},
{
"name" : "18228",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18228"
},
{
"name" : "oval:org.mitre.oval:def:9768",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9768"
},
{
"name" : "ADV-2006-2106",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2106"
},
{
"name" : "ADV-2006-3748",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3748"
},
{
"name" : "ADV-2008-0083",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name" : "1016202",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016202"
},
{
"name" : "20376",
"name": "21324",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/20376"
},
{
"name" : "20561",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20561"
},
{
"name" : "21134",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21134"
"url": "http://secunia.com/advisories/21324"
},
{
"name": "21183",
@ -203,24 +233,9 @@
"url": "http://secunia.com/advisories/21183"
},
{
"name" : "21176",
"name": "22066",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/21176"
},
{
"name" : "21178",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21178"
},
{
"name" : "21188",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21188"
},
{
"name" : "21210",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21210"
"url": "http://secunia.com/advisories/22066"
},
{
"name": "21269",
@ -228,39 +243,24 @@
"url": "http://secunia.com/advisories/21269"
},
{
"name" : "21270",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21270"
"name": "SUSE-SA:2006:035",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_35_mozilla.html"
},
{
"name" : "21336",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21336"
"name": "RHSA-2006:0578",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0578.html"
},
{
"name" : "21324",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21324"
"name": "ADV-2006-2106",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2106"
},
{
"name" : "21532",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21532"
},
{
"name" : "21631",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21631"
},
{
"name" : "22066",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22066"
},
{
"name" : "mozilla-pluginspage-code-execution(26847)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26847"
"name": "MDKSA-2006:143",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "ingate-ssltls-dos(26977)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26977"
},
{
"name": "1016245",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016245"
},
{
"name": "1016244",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016244"
},
{
"name": "http://www.ingate.com/relnote-441.php",
"refsource": "CONFIRM",
@ -67,25 +82,10 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2183"
},
{
"name" : "1016244",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016244"
},
{
"name" : "1016245",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016245"
},
{
"name": "20479",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20479"
},
{
"name" : "ingate-ssltls-dos(26977)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26977"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "imgsvr-http-post-dos(27613)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27613"
},
{
"name": "1232",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1232"
},
{
"name": "20060703 imgsvr dos exploit by n00b",
"refsource": "BUGTRAQ",
@ -61,16 +71,6 @@
"name": "18784",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18784"
},
{
"name" : "1232",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1232"
},
{
"name" : "imgsvr-http-post-dos(27613)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27613"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2006-6001",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,21 +57,16 @@
"refsource": "MISC",
"url": "http://bugs.shaftnet.org/task/113"
},
{
"name" : "http://po.shaftnet.org/po_stable_changelog",
"refsource" : "CONFIRM",
"url" : "http://po.shaftnet.org/po_stable_changelog"
},
{
"name" : "21351",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21351"
},
{
"name": "ADV-2006-4766",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4766"
},
{
"name": "http://po.shaftnet.org/po_stable_changelog",
"refsource": "CONFIRM",
"url": "http://po.shaftnet.org/po_stable_changelog"
},
{
"name": "23176",
"refsource": "SECUNIA",
@ -81,6 +76,11 @@
"name": "photoorganizer-auth-security-bypass(30577)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30577"
},
{
"name": "21351",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21351"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20060506 ChipmunkBlogger improper input sanitizing",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-05/0104.html"
},
{
"name": "17862",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17862"
},
{
"name": "chipmunkblogger-multiple-xss(26296)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26296"
},
{
"name": "2306",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2306"
},
{
"name" : "chipmunkblogger-multiple-xss(26296)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26296"
"name": "20060506 ChipmunkBlogger improper input sanitizing",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-05/0104.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2011-0418",
"STATE": "PUBLIC"
},
@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "20110502 Multiple Vendors libc/glob(3) GLOB_BRACE|GLOB_LIMIT memory exhaustion",
"refsource" : "SREASONRES",
"url" : "http://securityreason.com/achievement_securityalert/97"
},
{
"name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c#rev1.28",
"refsource": "CONFIRM",
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c#rev1.28"
},
{
"name" : "http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c.diff?r1=1.27&r2=1.28&f=h",
"refsource" : "CONFIRM",
"url" : "http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c.diff?r1=1.27&r2=1.28&f=h"
},
{
"name" : "http://www.pureftpd.org/project/pure-ftpd/news",
"refsource" : "CONFIRM",
"url" : "http://www.pureftpd.org/project/pure-ftpd/news"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=704283",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=704283"
"name": "ADV-2011-1273",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1273"
},
{
"name": "MDVSA-2011:094",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:094"
},
{
"name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c.diff?r1=1.27&r2=1.28&f=h",
"refsource": "CONFIRM",
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c.diff?r1=1.27&r2=1.28&f=h"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=704283",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=704283"
},
{
"name": "47671",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47671"
},
{
"name": "20110502 Multiple Vendors libc/glob(3) GLOB_BRACE|GLOB_LIMIT memory exhaustion",
"refsource": "SREASONRES",
"url": "http://securityreason.com/achievement_securityalert/97"
},
{
"name": "8228",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8228"
},
{
"name" : "ADV-2011-1273",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/1273"
"name": "http://www.pureftpd.org/project/pure-ftpd/news",
"refsource": "CONFIRM",
"url": "http://www.pureftpd.org/project/pure-ftpd/news"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "16004",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/16004"
},
{
"name": "45826",
"refsource": "BID",
@ -67,15 +62,20 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/70451"
},
{
"name": "phpfusion-team-structure-sql-injection(64727)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64727"
},
{
"name": "42943",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42943"
},
{
"name" : "phpfusion-team-structure-sql-injection(64727)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64727"
"name": "16004",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/16004"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-0602",
"STATE": "PUBLIC"
},
@ -53,39 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20110208 Adobe Reader and Acrobat JP2K Invalid Indexing Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=891"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
},
{
"name" : "RHSA-2011:0301",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0301.html"
"name": "ADV-2011-0492",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0492"
},
{
"name": "46221",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46221"
},
{
"name": "43470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43470"
},
{
"name": "oval:org.mitre.oval:def:12562",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12562"
},
{
"name" : "1025033",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025033"
},
{
"name" : "43470",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43470"
"name": "RHSA-2011:0301",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0301.html"
},
{
"name": "ADV-2011-0337",
@ -93,9 +83,19 @@
"url": "http://www.vupen.com/english/advisories/2011/0337"
},
{
"name" : "ADV-2011-0492",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0492"
"name": "1025033",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025033"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
},
{
"name": "20110208 Adobe Reader and Acrobat JP2K Invalid Indexing Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=891"
}
]
}

View File

@ -52,15 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "FEDORA-2011-0514",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053461.html"
},
{
"name": "ADV-2011-0227",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0227"
},
{
"name": "[security-announce] 20110118 Globus Security Advisory 2011-01: myproxy-logon identity checking of server",
"refsource": "MLIST",
"url": "http://lists.globus.org/pipermail/security-announce/2011-January/000018.html"
},
{
"name" : "http://grid.ncsa.illinois.edu/myproxy/security/myproxy-adv-2011-01.txt",
"refsource" : "MISC",
"url" : "http://grid.ncsa.illinois.edu/myproxy/security/myproxy-adv-2011-01.txt"
"name": "43103",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43103"
},
{
"name": "myproxy-ssl-spoofing(64830)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64830"
},
{
"name": "FEDORA-2011-0512",
@ -68,9 +83,9 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053473.html"
},
{
"name" : "FEDORA-2011-0514",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053461.html"
"name": "http://grid.ncsa.illinois.edu/myproxy/security/myproxy-adv-2011-01.txt",
"refsource": "MISC",
"url": "http://grid.ncsa.illinois.edu/myproxy/security/myproxy-adv-2011-01.txt"
},
{
"name": "45916",
@ -86,21 +101,6 @@
"name": "42972",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42972"
},
{
"name" : "43103",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43103"
},
{
"name" : "ADV-2011-0227",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0227"
},
{
"name" : "myproxy-ssl-spoofing(64830)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64830"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-2560",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-2826",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=89453",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=89453"
"name": "oval:org.mitre.oval:def:14383",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14383"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html",
@ -63,9 +63,9 @@
"url": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html"
},
{
"name" : "oval:org.mitre.oval:def:14383",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14383"
"name": "http://code.google.com/p/chromium/issues/detail?id=89453",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=89453"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2900",
"STATE": "PUBLIC"
},
@ -52,41 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110803 CVE id request: shttpd/mongoose/yassl embedded webserver",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/08/03/5"
},
{
"name" : "[oss-security] 20110803 Re: CVE id request: shttpd/mongoose/yassl embedded webserver",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/08/03/9"
},
{
"name" : "https://code.google.com/p/mongoose/source/detail?r=556f4de91eae4bac40dc5d4ddbd9ec7c424711d0",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/mongoose/source/detail?r=556f4de91eae4bac40dc5d4ddbd9ec7c424711d0"
},
{
"name" : "FEDORA-2011-11636",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065273.html"
},
{
"name": "FEDORA-2011-11823",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065505.html"
},
{
"name" : "FEDORA-2011-11825",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065537.html"
},
{
"name": "48980",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48980"
},
{
"name": "https://code.google.com/p/mongoose/source/detail?r=556f4de91eae4bac40dc5d4ddbd9ec7c424711d0",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/mongoose/source/detail?r=556f4de91eae4bac40dc5d4ddbd9ec7c424711d0"
},
{
"name": "45464",
"refsource": "SECUNIA",
@ -98,14 +78,34 @@
"url": "http://secunia.com/advisories/45902"
},
{
"name" : "8337",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/8337"
"name": "FEDORA-2011-11825",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065537.html"
},
{
"name": "mongoose-put-bo(68991)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68991"
},
{
"name": "[oss-security] 20110803 CVE id request: shttpd/mongoose/yassl embedded webserver",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/03/5"
},
{
"name": "8337",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8337"
},
{
"name": "FEDORA-2011-11636",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065273.html"
},
{
"name": "[oss-security] 20110803 Re: CVE id request: shttpd/mongoose/yassl embedded webserver",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/03/9"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3287",
"STATE": "PUBLIC"
},

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2011/09/beta-channel-update-for-chromebooks.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2011/09/beta-channel-update-for-chromebooks.html"
"name": "oval:org.mitre.oval:def:13853",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13853"
},
{
"name": "75378",
@ -63,9 +63,9 @@
"url": "http://osvdb.org/75378"
},
{
"name" : "oval:org.mitre.oval:def:13853",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13853"
"name": "http://googlechromereleases.blogspot.com/2011/09/beta-channel-update-for-chromebooks.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/09/beta-channel-update-for-chromebooks.html"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://aluigi.altervista.org/adv/twincat_1-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/twincat_1-adv.txt"
"name": "twincat-datagram-dos(69765)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69765"
},
{
"name": "8380",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8380"
},
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-06.pdf",
@ -68,14 +73,9 @@
"url": "http://osvdb.org/75495"
},
{
"name" : "8380",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/8380"
},
{
"name" : "twincat-datagram-dos(69765)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69765"
"name": "http://aluigi.altervista.org/adv/twincat_1-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/twincat_1-adv.txt"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-3906",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=98809",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=98809"
"name": "oval:org.mitre.oval:def:14548",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14548"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html",
@ -63,9 +63,9 @@
"url": "http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html"
},
{
"name" : "oval:org.mitre.oval:def:14548",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14548"
"name": "http://code.google.com/p/chromium/issues/detail?id=98809",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=98809"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-3937",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=71db86d53b5c6872cea31bf714a1a38ec78feaba",
"refsource": "CONFIRM",
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=71db86d53b5c6872cea31bf714a1a38ec78feaba"
},
{
"name": "MDVSA-2013:079",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
},
{
"name": "http://ffmpeg.org/security.html",
"refsource": "CONFIRM",
@ -62,20 +72,10 @@
"refsource": "CONFIRM",
"url": "http://git.libav.org/?p=libav.git;a=commit;h=71db86d53b5c6872cea31bf714a1a38ec78feaba"
},
{
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=71db86d53b5c6872cea31bf714a1a38ec78feaba",
"refsource" : "CONFIRM",
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=71db86d53b5c6872cea31bf714a1a38ec78feaba"
},
{
"name": "http://libav.org/news.html",
"refsource": "CONFIRM",
"url": "http://libav.org/news.html"
},
{
"name" : "MDVSA-2013:079",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4118",
"STATE": "PUBLIC"
},
@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20111104 CVE request: Mahara",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/11/04/7"
},
{
"name" : "[oss-security] 20111104 Re: CVE request: Mahara",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/11/04/10"
},
{
"name" : "http://mahara.org/interaction/forum/topic.php?id=4138",
"refsource" : "CONFIRM",
"url" : "http://mahara.org/interaction/forum/topic.php?id=4138"
},
{
"name": "http://security.debian.org/debian-security/pool/updates/main/m/mahara/mahara_1.2.6-2+squeeze3.debian.tar.gz",
"refsource": "CONFIRM",
"url": "http://security.debian.org/debian-security/pool/updates/main/m/mahara/mahara_1.2.6-2+squeeze3.debian.tar.gz"
},
{
"name" : "https://bugs.launchpad.net/mahara/+bug/884223",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/mahara/+bug/884223"
},
{
"name": "https://launchpad.net/mahara/+milestone/1.4.1",
"refsource": "CONFIRM",
"url": "https://launchpad.net/mahara/+milestone/1.4.1"
},
{
"name": "http://mahara.org/interaction/forum/topic.php?id=4138",
"refsource": "CONFIRM",
"url": "http://mahara.org/interaction/forum/topic.php?id=4138"
},
{
"name": "[oss-security] 20111104 Re: CVE request: Mahara",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/11/04/10"
},
{
"name": "DSA-2334",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2334"
},
{
"name": "[oss-security] 20111104 CVE request: Mahara",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/11/04/7"
},
{
"name": "46719",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46719"
},
{
"name": "https://bugs.launchpad.net/mahara/+bug/884223",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/mahara/+bug/884223"
}
]
}

View File

@ -53,40 +53,40 @@
"references": {
"reference_data": [
{
"name" : "20130128 [KIS-2013-01] DataLife Engine 9.7 (preview.php) PHP Code Injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-01/0117.html"
},
{
"name" : "24438",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/24438"
"name": "57603",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57603"
},
{
"name": "24444",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/24444"
},
{
"name" : "http://karmainsecurity.com/KIS-2013-01",
"refsource" : "MISC",
"url" : "http://karmainsecurity.com/KIS-2013-01"
},
{
"name": "http://dleviet.com/dle/bug-fix/3281-security-patches-for-dle-97.html",
"refsource": "CONFIRM",
"url": "http://dleviet.com/dle/bug-fix/3281-security-patches-for-dle-97.html"
},
{
"name" : "57603",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/57603"
},
{
"name": "89662",
"refsource": "OSVDB",
"url": "http://osvdb.org/89662"
},
{
"name": "24438",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/24438"
},
{
"name": "20130128 [KIS-2013-01] DataLife Engine 9.7 (preview.php) PHP Code Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-01/0117.html"
},
{
"name": "http://karmainsecurity.com/KIS-2013-01",
"refsource": "MISC",
"url": "http://karmainsecurity.com/KIS-2013-01"
},
{
"name": "51971",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-1714",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-73.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-73.html"
"name": "DSA-2746",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2746"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=879787",
@ -63,9 +63,9 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=879787"
},
{
"name" : "DSA-2746",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2746"
"name": "61882",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61882"
},
{
"name": "DSA-2735",
@ -73,9 +73,9 @@
"url": "http://www.debian.org/security/2013/dsa-2735"
},
{
"name" : "61882",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/61882"
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-73.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-73.html"
},
{
"name": "oval:org.mitre.oval:def:18002",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1844",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-5155",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1029054",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029054"
},
{
"name": "http://support.apple.com/kb/HT5934",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "APPLE-SA-2013-09-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
},
{
"name" : "1029054",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029054"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-5593",
"STATE": "PUBLIC"
},
@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-94.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-94.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=868327",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=868327"
"name": "openSUSE-SU-2013:1633",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html"
},
{
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "oval:org.mitre.oval:def:19263",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19263"
},
{
"name": "openSUSE-SU-2013:1634",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html"
},
{
"name" : "openSUSE-SU-2013:1633",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html"
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=868327",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=868327"
},
{
"name" : "oval:org.mitre.oval:def:19263",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19263"
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-94.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-94.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-2889",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140418 Re: CVE request Linux kernel: arch: x86: net: bpf_jit: an off-by-one bug in x86_64 cond jump target",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/04/18/6"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a03ffcf873fe0f2565386ca8ef832144c42e67fa",
"refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "https://github.com/torvalds/linux/commit/a03ffcf873fe0f2565386ca8ef832144c42e67fa",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/a03ffcf873fe0f2565386ca8ef832144c42e67fa"
},
{
"name": "[oss-security] 20140418 Re: CVE request Linux kernel: arch: x86: net: bpf_jit: an off-by-one bug in x86_64 cond jump target",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/04/18/6"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-2894",
"STATE": "PUBLIC"
},
@ -52,45 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[Qemu-devel] 20140412 [PATCH for 2.0] ide: Correct improper smart self test c",
"refsource" : "MLIST",
"url" : "https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02016.html"
},
{
"name" : "[Qemu-devel] 20140414 Re: [PATCH for 2.0] ide: Correct improper smart self test c",
"refsource" : "MLIST",
"url" : "https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02152.html"
},
{
"name" : "[Qemu-devel] 20140414 Re: [PATCH for 2.0] ide: Correct improper smart self test c",
"refsource" : "MLIST",
"url" : "https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02095.html"
},
{
"name" : "[oss-security] 20140415 CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/04/15/4"
},
{
"name" : "[oss-security] 20140418 Re: CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/04/18/5"
},
{
"name": "RHSA-2014:0743",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
},
{
"name": "[Qemu-devel] 20140412 [PATCH for 2.0] ide: Correct improper smart self test c",
"refsource": "MLIST",
"url": "https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02016.html"
},
{
"name": "RHSA-2014:0744",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
},
{
"name" : "RHSA-2014:0704",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0704.html"
"name": "[Qemu-devel] 20140414 Re: [PATCH for 2.0] ide: Correct improper smart self test c",
"refsource": "MLIST",
"url": "https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02095.html"
},
{
"name": "USN-2182-1",
@ -98,15 +78,35 @@
"url": "http://www.ubuntu.com/usn/USN-2182-1"
},
{
"name" : "66932",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/66932"
"name": "[Qemu-devel] 20140414 Re: [PATCH for 2.0] ide: Correct improper smart self test c",
"refsource": "MLIST",
"url": "https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02152.html"
},
{
"name": "57945",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57945"
},
{
"name": "[oss-security] 20140418 Re: CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/04/18/5"
},
{
"name": "RHSA-2014:0704",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0704.html"
},
{
"name": "[oss-security] 20140415 CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/04/15/4"
},
{
"name": "66932",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66932"
},
{
"name": "58191",
"refsource": "SECUNIA",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-2970",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6899",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#905193",
"refsource": "CERT-VN",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0159",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0159"
},
{
"name": "97449",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97449"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0159",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0159"
},
{
"name": "1038243",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-09-05T00:00:00",
"ID": "CVE-2017-0777",
"STATE": "PUBLIC"
@ -59,15 +59,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-09-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-09-01"
},
{
"name": "100649",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100649"
},
{
"name": "https://source.android.com/security/bulletin/2017-09-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-09-01"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-1000363",
"REQUESTER": "roee.hay@hcl.com",
"STATE": "PUBLIC"
@ -12,24 +12,18 @@
"product": {
"product_data": [
{
"product_name" : "Linux Kernel",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "4.11.1"
},
{
"version_value" : "3.18.53"
},
{
"version_value" : "2.6.39"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Linux Kernel"
"vendor_name": "n/a"
}
]
}
@ -51,7 +45,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-276"
"value": "n/a"
}
]
}
@ -59,6 +53,11 @@
},
"references": {
"reference_data": [
{
"name": "98651",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98651"
},
{
"name": "https://alephsecurity.com/vulns/aleph-2017023",
"refsource": "MISC",
@ -68,11 +67,6 @@
"name": "DSA-3945",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3945"
},
{
"name" : "98651",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/98651"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-11-17",
"ID": "CVE-2017-1000393",
"REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.73.1 and earlier, 2.83 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Incorrect Access Control"
"value": "n/a"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components"
},
{
"name": "https://www.qualcomm.com/company/product-security/bulletins",
"refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "1041432",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041432"
},
{
"name": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components"
}
]
}

View File

@ -71,9 +71,9 @@
"references": {
"reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/121375",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/121375"
"name": "99227",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99227"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22004270",
@ -81,9 +81,9 @@
"url": "http://www.ibm.com/support/docview.wss?uid=swg22004270"
},
{
"name" : "99227",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99227"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/121375",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/121375"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1850",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4308",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4404",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4746",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4841",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{