"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:52:43 +00:00
parent 0b35ee0ba3
commit 443c6ef499
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
52 changed files with 3483 additions and 3483 deletions

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20011114 ICMP Unreachable Vulnerability in Cisco 12000 Series Internet Router",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/GSR-unreachables-pub.shtml"
},
{ {
"name": "M-018", "name": "M-018",
"refsource": "CIAC", "refsource": "CIAC",
@ -67,15 +62,20 @@
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7536" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7536"
}, },
{
"name" : "3534",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/3534"
},
{ {
"name": "794", "name": "794",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/794" "url": "http://www.osvdb.org/794"
},
{
"name": "20011114 ICMP Unreachable Vulnerability in Cisco 12000 Series Internet Router",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/GSR-unreachables-pub.shtml"
},
{
"name": "3534",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3534"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20010710 FreeBSD 4.3 local root, yet Linux and *BSD much better than Windows",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-07/0179.html"
},
{ {
"name": "L-111", "name": "L-111",
"refsource": "CIAC", "refsource": "CIAC",
"url": "http://ciac.llnl.gov/ciac/bulletins/l-111.shtml" "url": "http://ciac.llnl.gov/ciac/bulletins/l-111.shtml"
}, },
{
"name" : "VU#943633",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/943633"
},
{
"name" : "FreeBSD-SA-01:42",
"refsource" : "FREEBSD",
"url" : "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:42.signal.v1.1.asc"
},
{ {
"name": "bsd-rfork-signal-handlers(6829)", "name": "bsd-rfork-signal-handlers(6829)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6829" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6829"
}, },
{
"name" : "3007",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/3007"
},
{ {
"name": "1897", "name": "1897",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/1897" "url": "http://www.osvdb.org/1897"
},
{
"name": "20010710 FreeBSD 4.3 local root, yet Linux and *BSD much better than Windows",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-07/0179.html"
},
{
"name": "FreeBSD-SA-01:42",
"refsource": "FREEBSD",
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:42.signal.v1.1.asc"
},
{
"name": "VU#943633",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/943633"
},
{
"name": "3007",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3007"
} }
] ]
} }

View File

@ -52,25 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "oval:org.mitre.oval:def:5628",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5628"
},
{ {
"name": "20010604 yet another sym link followers", "name": "20010604 yet another sym link followers",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/188568" "url": "http://www.securityfocus.com/archive/1/188568"
}, },
{
"name" : "VU#127435",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/127435"
},
{ {
"name": "L-093", "name": "L-093",
"refsource": "CIAC", "refsource": "CIAC",
"url": "http://ciac.llnl.gov/ciac/bulletins/l-093.shtml" "url": "http://ciac.llnl.gov/ciac/bulletins/l-093.shtml"
}, },
{ {
"name" : "HPSBUX0106-153", "name": "2821",
"refsource" : "HP", "refsource": "BID",
"url" : "http://online.securityfocus.com/advisories/3354" "url": "http://www.securityfocus.com/bid/2821"
},
{
"name": "VU#127435",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/127435"
}, },
{ {
"name": "http://www.kb.cert.org/vuls/id/TJSL-4Z5Q92", "name": "http://www.kb.cert.org/vuls/id/TJSL-4Z5Q92",
@ -78,19 +83,14 @@
"url": "http://www.kb.cert.org/vuls/id/TJSL-4Z5Q92" "url": "http://www.kb.cert.org/vuls/id/TJSL-4Z5Q92"
}, },
{ {
"name" : "oval:org.mitre.oval:def:5628", "name": "HPSBUX0106-153",
"refsource" : "OVAL", "refsource": "HP",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5628" "url": "http://online.securityfocus.com/advisories/3354"
}, },
{ {
"name": "hpux-kmmodreg-symlink(6656)", "name": "hpux-kmmodreg-symlink(6656)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6656" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6656"
},
{
"name" : "2821",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2821"
} }
] ]
} }

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20010405 Trustix Security Advisory #2001-0003 - kernel", "name": "RHSA-2001:047",
"refsource" : "BUGTRAQ", "refsource": "REDHAT",
"url" : "http://marc.info/?l=bugtraq&m=98653252326445&w=2" "url": "http://www.redhat.com/support/errata/RHSA-2001-047.html"
},
{
"name" : "20010409 PROGENY-SA-2001-01: execve()/ptrace() exploit in Linux kernels",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=98684172109474&w=2"
},
{
"name" : "http://www.linux.org.uk/VERSION/relnotes.2219.html",
"refsource" : "CONFIRM",
"url" : "http://www.linux.org.uk/VERSION/relnotes.2219.html"
},
{
"name" : "IMNX-2001-70-010-01",
"refsource" : "IMMUNIX",
"url" : "http://marc.info/?l=bugtraq&m=98575345009963&w=2"
}, },
{ {
"name": "CSSA-2001-012.0", "name": "CSSA-2001-012.0",
@ -78,9 +63,9 @@
"url": "http://marc.info/?l=bugtraq&m=98637996127004&w=2" "url": "http://marc.info/?l=bugtraq&m=98637996127004&w=2"
}, },
{ {
"name" : "MDKSA-2001:037", "name": "http://www.linux.org.uk/VERSION/relnotes.2219.html",
"refsource" : "MANDRAKE", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=bugtraq&m=98759029811377&w=2" "url": "http://www.linux.org.uk/VERSION/relnotes.2219.html"
}, },
{ {
"name": "DSA-047", "name": "DSA-047",
@ -88,9 +73,19 @@
"url": "https://www.debian.org/security/2001/dsa-047" "url": "https://www.debian.org/security/2001/dsa-047"
}, },
{ {
"name" : "SuSE-SA:2001:018", "name": "MDKSA-2001:037",
"refsource" : "SUSE", "refsource": "MANDRAKE",
"url" : "http://marc.info/?l=bugtraq&m=99013830726309&w=2" "url": "http://marc.info/?l=bugtraq&m=98759029811377&w=2"
},
{
"name": "20010409 PROGENY-SA-2001-01: execve()/ptrace() exploit in Linux kernels",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=98684172109474&w=2"
},
{
"name": "IMNX-2001-70-010-01",
"refsource": "IMMUNIX",
"url": "http://marc.info/?l=bugtraq&m=98575345009963&w=2"
}, },
{ {
"name": "CLA-2001:394", "name": "CLA-2001:394",
@ -98,9 +93,14 @@
"url": "http://marc.info/?l=bugtraq&m=98775114228203&w=2" "url": "http://marc.info/?l=bugtraq&m=98775114228203&w=2"
}, },
{ {
"name" : "RHSA-2001:047", "name": "20010405 Trustix Security Advisory #2001-0003 - kernel",
"refsource" : "REDHAT", "refsource": "BUGTRAQ",
"url" : "http://www.redhat.com/support/errata/RHSA-2001-047.html" "url": "http://marc.info/?l=bugtraq&m=98653252326445&w=2"
},
{
"name": "SuSE-SA:2001:018",
"refsource": "SUSE",
"url": "http://marc.info/?l=bugtraq&m=99013830726309&w=2"
} }
] ]
} }

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060423 Buffer-overflow and crash in Fenice OMS 1.10", "name": "19770",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/431870/100/0/threaded" "url": "http://secunia.com/advisories/19770"
},
{
"name" : "20060607 Re: Buffer-overflow and crash in Fenice OMS 1.10",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/436256/100/0/threaded"
},
{
"name" : "http://aluigi.altervista.org/adv/fenicex-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/fenicex-adv.txt"
}, },
{ {
"name": "17678", "name": "17678",
@ -73,19 +63,19 @@
"url": "http://www.securityfocus.com/bid/17678" "url": "http://www.securityfocus.com/bid/17678"
}, },
{ {
"name" : "ADV-2006-1491", "name": "fenice-contentlength-dos(26080)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2006/1491" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26080"
}, },
{ {
"name" : "24882", "name": "http://aluigi.altervista.org/adv/fenicex-adv.txt",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://www.osvdb.org/24882" "url": "http://aluigi.altervista.org/adv/fenicex-adv.txt"
}, },
{ {
"name" : "19770", "name": "20060423 Buffer-overflow and crash in Fenice OMS 1.10",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/19770" "url": "http://www.securityfocus.com/archive/1/431870/100/0/threaded"
}, },
{ {
"name": "794", "name": "794",
@ -93,9 +83,19 @@
"url": "http://securityreason.com/securityalert/794" "url": "http://securityreason.com/securityalert/794"
}, },
{ {
"name" : "fenice-contentlength-dos(26080)", "name": "ADV-2006-1491",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26080" "url": "http://www.vupen.com/english/advisories/2006/1491"
},
{
"name": "20060607 Re: Buffer-overflow and crash in Fenice OMS 1.10",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/436256/100/0/threaded"
},
{
"name": "24882",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24882"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.fckeditor.net/whatsnew/default.html",
"refsource" : "CONFIRM",
"url" : "http://www.fckeditor.net/whatsnew/default.html"
},
{
"name" : "18029",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18029"
},
{
"name" : "ADV-2006-1856",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1856"
},
{ {
"name": "25631", "name": "25631",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -76,6 +61,21 @@
"name": "20122", "name": "20122",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20122" "url": "http://secunia.com/advisories/20122"
},
{
"name": "http://www.fckeditor.net/whatsnew/default.html",
"refsource": "CONFIRM",
"url": "http://www.fckeditor.net/whatsnew/default.html"
},
{
"name": "ADV-2006-1856",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1856"
},
{
"name": "18029",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18029"
} }
] ]
} }

View File

@ -57,6 +57,16 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://pridels0.blogspot.com/2006/06/vanillasoft-helpdesk-xss-vuln.html" "url": "http://pridels0.blogspot.com/2006/06/vanillasoft-helpdesk-xss-vuln.html"
}, },
{
"name": "20544",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20544"
},
{
"name": "1016254",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016254"
},
{ {
"name": "18368", "name": "18368",
"refsource": "BID", "refsource": "BID",
@ -67,16 +77,6 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2247" "url": "http://www.vupen.com/english/advisories/2006/2247"
}, },
{
"name" : "1016254",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016254"
},
{
"name" : "20544",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20544"
},
{ {
"name": "vanillasoft-helpdesk-default-xss(27020)", "name": "vanillasoft-helpdesk-default-xss(27020)",
"refsource": "XF", "refsource": "XF",

View File

@ -67,40 +67,40 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://docushare.xerox.com/doug/dsweb/Get/Document-20353/SA30426-workaround.html" "url": "https://docushare.xerox.com/doug/dsweb/Get/Document-20353/SA30426-workaround.html"
}, },
{
"name" : "https://docushare.xerox.com/doug/dsweb/View/Collection-7503",
"refsource" : "MISC",
"url" : "https://docushare.xerox.com/doug/dsweb/View/Collection-7503"
},
{ {
"name": "29430", "name": "29430",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/29430" "url": "http://www.securityfocus.com/bid/29430"
}, },
{
"name" : "1020147",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020147"
},
{ {
"name": "ADV-2008-1701", "name": "ADV-2008-1701",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1701/references" "url": "http://www.vupen.com/english/advisories/2008/1701/references"
}, },
{
"name": "1020147",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020147"
},
{ {
"name": "30426", "name": "30426",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30426" "url": "http://secunia.com/advisories/30426"
}, },
{ {
"name" : "4638", "name": "https://docushare.xerox.com/doug/dsweb/View/Collection-7503",
"refsource" : "SREASON", "refsource": "MISC",
"url" : "http://securityreason.com/securityalert/4638" "url": "https://docushare.xerox.com/doug/dsweb/View/Collection-7503"
}, },
{ {
"name": "xerox-docushare-dsweb-xss(42748)", "name": "xerox-docushare-dsweb-xss(42748)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42748" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42748"
},
{
"name": "4638",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4638"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "7215",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7215"
},
{
"name" : "http://z0rlu.blogspot.com/2008/11/bandwebsite-15-sqlxss-multiple-remote.html",
"refsource" : "MISC",
"url" : "http://z0rlu.blogspot.com/2008/11/bandwebsite-15-sqlxss-multiple-remote.html"
},
{ {
"name": "32454", "name": "32454",
"refsource": "BID", "refsource": "BID",
@ -76,6 +66,16 @@
"name": "bandwebsite-info-xss(46817)", "name": "bandwebsite-info-xss(46817)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46817" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46817"
},
{
"name": "http://z0rlu.blogspot.com/2008/11/bandwebsite-15-sqlxss-multiple-remote.html",
"refsource": "MISC",
"url": "http://z0rlu.blogspot.com/2008/11/bandwebsite-15-sqlxss-multiple-remote.html"
},
{
"name": "7215",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7215"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2180", "ID": "CVE-2011-2180",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2711", "ID": "CVE-2011-2711",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,66 +52,61 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[cgit] 20110722 [PATCH] Fix potential XSS vulnerability in rename hint",
"refsource" : "MLIST",
"url" : "http://hjemli.net/pipermail/cgit/2011-July/000276.html"
},
{
"name" : "[oss-security] 20110722 CVE Request -- cGit -- XSS flaw in rename hint",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/07/22/2"
},
{
"name" : "[oss-security] 20110722 Re: CVE Request -- cGit -- XSS flaw in rename hint",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/07/22/6"
},
{
"name" : "[oss-security] 20110722 Re: CVE Request -- cGit -- XSS flaw in rename hint",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/07/22/7"
},
{
"name" : "[oss-security] 20110724 Re: Re: CVE Request -- cGit -- XSS flaw in rename hint",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/07/24/3"
},
{ {
"name": "[oss-security] 20110724 Re: Re: CVE Request -- cGit -- XSS flaw in rename hint", "name": "[oss-security] 20110724 Re: Re: CVE Request -- cGit -- XSS flaw in rename hint",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/24/4" "url": "http://www.openwall.com/lists/oss-security/2011/07/24/4"
}, },
{
"name" : "http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5",
"refsource" : "CONFIRM",
"url" : "http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=725042", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=725042",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725042" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=725042"
}, },
{
"name" : "openSUSE-SU-2011:0891",
"refsource" : "SUSE",
"url" : "https://hermes.opensuse.org/messages/10998459"
},
{ {
"name": "48866", "name": "48866",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/48866" "url": "http://www.securityfocus.com/bid/48866"
}, },
{
"name": "[oss-security] 20110724 Re: Re: CVE Request -- cGit -- XSS flaw in rename hint",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/24/3"
},
{
"name": "[oss-security] 20110722 Re: CVE Request -- cGit -- XSS flaw in rename hint",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/22/6"
},
{
"name": "http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5",
"refsource": "CONFIRM",
"url": "http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5"
},
{
"name": "openSUSE-SU-2011:0891",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/10998459"
},
{ {
"name": "74050", "name": "74050",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/74050" "url": "http://www.osvdb.org/74050"
}, },
{
"name": "[oss-security] 20110722 CVE Request -- cGit -- XSS flaw in rename hint",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/22/2"
},
{ {
"name": "45358", "name": "45358",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45358" "url": "http://secunia.com/advisories/45358"
}, },
{
"name": "[oss-security] 20110722 Re: CVE Request -- cGit -- XSS flaw in rename hint",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/22/7"
},
{ {
"name": "45541", "name": "45541",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -121,6 +116,11 @@
"name": "cgit-renamehint-xss(68754)", "name": "cgit-renamehint-xss(68754)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68754" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68754"
},
{
"name": "[cgit] 20110722 [PATCH] Fix potential XSS vulnerability in rename hint",
"refsource": "MLIST",
"url": "http://hjemli.net/pipermail/cgit/2011-July/000276.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-2965", "ID": "CVE-2011-2965",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "48527",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48527"
},
{
"name": "oval:org.mitre.oval:def:15033",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15033"
},
{
"name": "openSUSE-SU-2012:0466",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html"
},
{ {
"name": "http://code.google.com/p/chromium/issues/detail?id=117736", "name": "http://code.google.com/p/chromium/issues/detail?id=117736",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -63,14 +78,9 @@
"url": "http://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html" "url": "http://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html"
}, },
{ {
"name" : "GLSA-201203-19", "name": "1026841",
"refsource" : "GENTOO", "refsource": "SECTRACK",
"url" : "http://security.gentoo.org/glsa/glsa-201203-19.xml" "url": "http://www.securitytracker.com/id?1026841"
},
{
"name" : "openSUSE-SU-2012:0466",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html"
}, },
{ {
"name": "52674", "name": "52674",
@ -78,29 +88,19 @@
"url": "http://www.securityfocus.com/bid/52674" "url": "http://www.securityfocus.com/bid/52674"
}, },
{ {
"name" : "oval:org.mitre.oval:def:15033", "name": "google-nativeui-weak-security(74215)",
"refsource" : "OVAL", "refsource": "XF",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15033" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74215"
}, },
{ {
"name" : "1026841", "name": "GLSA-201203-19",
"refsource" : "SECTRACK", "refsource": "GENTOO",
"url" : "http://www.securitytracker.com/id?1026841" "url": "http://security.gentoo.org/glsa/glsa-201203-19.xml"
}, },
{ {
"name": "48512", "name": "48512",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48512" "url": "http://secunia.com/advisories/48512"
},
{
"name" : "48527",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48527"
},
{
"name" : "google-nativeui-weak-security(74215)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/74215"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-3213", "ID": "CVE-2011-3213",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT5002",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5002"
},
{ {
"name": "APPLE-SA-2011-10-12-3", "name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
}, },
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{ {
"name": "50085", "name": "50085",
"refsource": "BID", "refsource": "BID",

View File

@ -52,45 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20110913 CVE Request: Multiple issues fixed in wireshark 1.6.2",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/09/13/1"
},
{
"name" : "[oss-security] 20110914 Re: CVE Request: Multiple issues fixed in wireshark 1.6.2",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/09/14/5"
},
{
"name" : "[oss-security] 20110914 Re: CVE Request: Multiple issues fixed in wireshark 1.6.2",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/09/14/9"
},
{ {
"name": "[oss-security] 20110914 Re: CVE Request: Multiple issues fixed in wireshark 1.6.2", "name": "[oss-security] 20110914 Re: CVE Request: Multiple issues fixed in wireshark 1.6.2",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/09/14/10" "url": "http://www.openwall.com/lists/oss-security/2011/09/14/10"
}, },
{
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=38430",
"refsource" : "CONFIRM",
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=38430"
},
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2011-16.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2011-16.html"
},
{ {
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6139", "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6139",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6139" "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6139"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=737783", "name": "[oss-security] 20110914 Re: CVE Request: Multiple issues fixed in wireshark 1.6.2",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=737783" "url": "http://www.openwall.com/lists/oss-security/2011/09/14/9"
},
{
"name": "oval:org.mitre.oval:def:14886",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14886"
},
{
"name": "[oss-security] 20110914 Re: CVE Request: Multiple issues fixed in wireshark 1.6.2",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/09/14/5"
}, },
{ {
"name": "MDVSA-2011:138", "name": "MDVSA-2011:138",
@ -98,9 +83,24 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:138" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:138"
}, },
{ {
"name" : "oval:org.mitre.oval:def:14886", "name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=38430",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14886" "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=38430"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=737783",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737783"
},
{
"name": "[oss-security] 20110913 CVE Request: Multiple issues fixed in wireshark 1.6.2",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/09/13/1"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2011-16.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2011-16.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2011/mfsa2011-54.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2011/mfsa2011-54.html"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=691299", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=691299",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -68,29 +63,9 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:192" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:192"
}, },
{ {
"name" : "openSUSE-SU-2012:0007", "name": "47334",
"refsource" : "SUSE", "refsource": "SECUNIA",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html" "url": "http://secunia.com/advisories/47334"
},
{
"name" : "openSUSE-SU-2012:0039",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html"
},
{
"name" : "oval:org.mitre.oval:def:14424",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14424"
},
{
"name" : "1026445",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1026445"
},
{
"name" : "1026446",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1026446"
}, },
{ {
"name": "1026447", "name": "1026447",
@ -98,24 +73,49 @@
"url": "http://www.securitytracker.com/id?1026447" "url": "http://www.securitytracker.com/id?1026447"
}, },
{ {
"name" : "47302", "name": "1026446",
"refsource" : "SECUNIA", "refsource": "SECTRACK",
"url" : "http://secunia.com/advisories/47302" "url": "http://www.securitytracker.com/id?1026446"
},
{
"name" : "47334",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/47334"
}, },
{ {
"name": "49055", "name": "49055",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49055" "url": "http://secunia.com/advisories/49055"
}, },
{
"name": "1026445",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026445"
},
{ {
"name": "firefox-yarr-dos(71909)", "name": "firefox-yarr-dos(71909)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71909" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71909"
},
{
"name": "oval:org.mitre.oval:def:14424",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14424"
},
{
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-54.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-54.html"
},
{
"name": "47302",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47302"
},
{
"name": "openSUSE-SU-2012:0039",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html"
},
{
"name": "openSUSE-SU-2012:0007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2011-3918", "ID": "CVE-2011-3918",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4080", "ID": "CVE-2011-4080",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcc",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcc"
},
{ {
"name": "[oss-security] 20111026 Re: CVE Request -- kernel: sysctl: restrict write access to dmesg_restrict", "name": "[oss-security] 20111026 Re: CVE Request -- kernel: sysctl: restrict write access to dmesg_restrict",
"refsource": "MLIST", "refsource": "MLIST",
@ -66,11 +71,6 @@
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bfdc0b497faa82a0ba2f9dddcf109231dd519fcc", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bfdc0b497faa82a0ba2f9dddcf109231dd519fcc",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bfdc0b497faa82a0ba2f9dddcf109231dd519fcc" "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bfdc0b497faa82a0ba2f9dddcf109231dd519fcc"
},
{
"name" : "https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcc",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcc"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4306", "ID": "CVE-2011-4306",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0329", "ID": "CVE-2013-0329",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20130220 Re: Jenkins CVE request for Jenkins Security Advisory 2013-02-16",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/02/21/7"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=914877", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=914877",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914877" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=914877"
}, },
{
"name": "RHSA-2013:0638",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0638.html"
},
{
"name": "[oss-security] 20130220 Re: Jenkins CVE request for Jenkins Security Advisory 2013-02-16",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/7"
},
{ {
"name": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb", "name": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,11 +76,6 @@
"name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16", "name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16" "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16"
},
{
"name" : "RHSA-2013:0638",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0638.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2013-0898", "ID": "CVE-2013-0898",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-0992", "ID": "CVE-2013-0992",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT5766",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5766"
},
{ {
"name": "http://support.apple.com/kb/HT5785", "name": "http://support.apple.com/kb/HT5785",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5785" "url": "http://support.apple.com/kb/HT5785"
}, },
{
"name": "54886",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54886"
},
{ {
"name": "http://support.apple.com/kb/HT5934", "name": "http://support.apple.com/kb/HT5934",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5934" "url": "http://support.apple.com/kb/HT5934"
}, },
{
"name" : "APPLE-SA-2013-05-16-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/May/msg00000.html"
},
{ {
"name": "APPLE-SA-2013-06-04-2", "name": "APPLE-SA-2013-06-04-2",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00001.html"
}, },
{ {
"name" : "APPLE-SA-2013-09-18-2", "name": "http://support.apple.com/kb/HT5766",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html" "url": "http://support.apple.com/kb/HT5766"
}, },
{ {
"name": "oval:org.mitre.oval:def:17621", "name": "oval:org.mitre.oval:def:17621",
@ -88,9 +83,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17621" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17621"
}, },
{ {
"name" : "54886", "name": "APPLE-SA-2013-05-16-1",
"refsource" : "SECUNIA", "refsource": "APPLE",
"url" : "http://secunia.com/advisories/54886" "url": "http://lists.apple.com/archives/security-announce/2013/May/msg00000.html"
},
{
"name": "APPLE-SA-2013-09-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1223", "ID": "CVE-2013-1223",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-1547", "ID": "CVE-2013-1547",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-1688", "ID": "CVE-2013-1688",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "USN-1890-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1890-1"
},
{ {
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-52.html", "name": "http://www.mozilla.org/security/announce/2013/mfsa2013-52.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-52.html" "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-52.html"
}, },
{
"name": "oval:org.mitre.oval:def:16427",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16427"
},
{
"name": "openSUSE-SU-2013:1142",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=873966", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=873966",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,21 +81,6 @@
"name": "openSUSE-SU-2013:1140", "name": "openSUSE-SU-2013:1140",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html"
},
{
"name" : "openSUSE-SU-2013:1142",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html"
},
{
"name" : "USN-1890-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1890-1"
},
{
"name" : "oval:org.mitre.oval:def:16427",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16427"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1781", "ID": "CVE-2013-1781",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://drupalcode.org/project/professional_theme.git/commitdiff/e3fa6a2",
"refsource": "CONFIRM",
"url": "http://drupalcode.org/project/professional_theme.git/commitdiff/e3fa6a2"
},
{ {
"name": "[oss-security] 20130227 Re: CVE Request for Drupal Contributed Modules", "name": "[oss-security] 20130227 Re: CVE Request for Drupal Contributed Modules",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/28/3" "url": "http://www.openwall.com/lists/oss-security/2013/02/28/3"
}, },
{
"name" : "http://drupal.org/node/1929486",
"refsource" : "MISC",
"url" : "http://drupal.org/node/1929486"
},
{ {
"name": "http://drupal.org/node/1730768", "name": "http://drupal.org/node/1730768",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -73,9 +73,9 @@
"url": "http://drupalcode.org/project/professional_theme.git/commitdiff/0640ddc" "url": "http://drupalcode.org/project/professional_theme.git/commitdiff/0640ddc"
}, },
{ {
"name" : "http://drupalcode.org/project/professional_theme.git/commitdiff/e3fa6a2", "name": "http://drupal.org/node/1929486",
"refsource" : "CONFIRM", "refsource": "MISC",
"url" : "http://drupalcode.org/project/professional_theme.git/commitdiff/e3fa6a2" "url": "http://drupal.org/node/1929486"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-4064", "ID": "CVE-2013-4064",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21659959",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21659959"
},
{ {
"name": "ibm-inotes-cve20134064-xss(86595)", "name": "ibm-inotes-cve20134064-xss(86595)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86595" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86595"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21659959",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21659959"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/26553" "url": "http://www.exploit-db.com/exploits/26553"
}, },
{
"name": "machform-formmaker-view-xss(85389)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85389"
},
{ {
"name": "http://packetstormsecurity.com/files/122255/Machform-Form-Maker-2-XSS-Shell-Upload-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/122255/Machform-Form-Maker-2-XSS-Shell-Upload-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
@ -66,11 +71,6 @@
"name": "94803", "name": "94803",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/94803" "url": "http://osvdb.org/94803"
},
{
"name" : "machform-formmaker-view-xss(85389)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85389"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/27602" "url": "http://www.exploit-db.com/exploits/27602"
}, },
{
"name": "96306",
"refsource": "OSVDB",
"url": "http://osvdb.org/96306"
},
{ {
"name": "20130902 DotNetNuke (DNNArticle Module) SQL Injection Vulnerability", "name": "20130902 DotNetNuke (DNNArticle Module) SQL Injection Vulnerability",
"refsource": "FULLDISC", "refsource": "FULLDISC",
@ -71,11 +76,6 @@
"name": "61788", "name": "61788",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/61788" "url": "http://www.securityfocus.com/bid/61788"
},
{
"name" : "96306",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/96306"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-5325", "ID": "CVE-2013-5325",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb13-25.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb13-25.html"
},
{ {
"name": "oval:org.mitre.oval:def:19053", "name": "oval:org.mitre.oval:def:19053",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19053" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19053"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb13-25.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb13-25.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-5634", "ID": "CVE-2013-5634",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20130826 Re: CVE request: Linux Kernel: ARM: KVM: NULL pointer dereferences", "name": "61995",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2013/08/26/4" "url": "http://www.securityfocus.com/bid/61995"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e8180dcaa8470ceca21109f143876fdcd9fe050a",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e8180dcaa8470ceca21109f143876fdcd9fe050a"
}, },
{ {
"name": "https://github.com/torvalds/linux/commit/e8180dcaa8470ceca21109f143876fdcd9fe050a", "name": "https://github.com/torvalds/linux/commit/e8180dcaa8470ceca21109f143876fdcd9fe050a",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/e8180dcaa8470ceca21109f143876fdcd9fe050a" "url": "https://github.com/torvalds/linux/commit/e8180dcaa8470ceca21109f143876fdcd9fe050a"
}, },
{
"name": "[oss-security] 20130826 Re: CVE request: Linux Kernel: ARM: KVM: NULL pointer dereferences",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/08/26/4"
},
{ {
"name": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.10.bz2", "name": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.10.bz2",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.10.bz2" "url": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.10.bz2"
}, },
{ {
"name" : "61995", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e8180dcaa8470ceca21109f143876fdcd9fe050a",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/61995" "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e8180dcaa8470ceca21109f143876fdcd9fe050a"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5816", "ID": "CVE-2013-5816",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5899", "ID": "CVE-2013-5899",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,94 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "name": "oracle-cpujan2014-cve20135899(90346)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90346"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777"
},
{
"name" : "HPSBUX02972",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
},
{
"name" : "HPSBUX02973",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name" : "SSRT101454",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
},
{
"name" : "SSRT101455",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name" : "RHSA-2014:0030",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
},
{
"name" : "RHSA-2014:0134",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0134.html"
},
{
"name" : "RHSA-2014:0135",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0135.html"
}, },
{ {
"name": "RHSA-2014:0414", "name": "RHSA-2014:0414",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0414" "url": "https://access.redhat.com/errata/RHSA-2014:0414"
}, },
{
"name" : "SUSE-SU-2014:0246",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html"
},
{
"name" : "SUSE-SU-2014:0266",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html"
},
{
"name" : "SUSE-SU-2014:0451",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html"
},
{
"name" : "64758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64758"
},
{
"name" : "64928",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64928"
},
{ {
"name": "102014", "name": "102014",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/102014" "url": "http://osvdb.org/102014"
}, },
{ {
"name" : "1029608", "name": "SSRT101455",
"refsource" : "SECTRACK", "refsource": "HP",
"url" : "http://www.securitytracker.com/id/1029608" "url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
}, },
{ {
"name" : "56485", "name": "RHSA-2014:0135",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/56485" "url": "http://rhn.redhat.com/errata/RHSA-2014-0135.html"
}, },
{ {
"name": "56535", "name": "56535",
@ -148,9 +83,74 @@
"url": "http://secunia.com/advisories/56535" "url": "http://secunia.com/advisories/56535"
}, },
{ {
"name" : "oracle-cpujan2014-cve20135899(90346)", "name": "RHSA-2014:0030",
"refsource" : "XF", "refsource": "REDHAT",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90346" "url": "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
},
{
"name": "56485",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56485"
},
{
"name": "SSRT101454",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777"
},
{
"name": "64928",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64928"
},
{
"name": "HPSBUX02972",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
},
{
"name": "SUSE-SU-2014:0451",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html"
},
{
"name": "HPSBUX02973",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name": "1029608",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029608"
},
{
"name": "SUSE-SU-2014:0266",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "SUSE-SU-2014:0246",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "RHSA-2014:0134",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0134.html"
} }
] ]
} }

View File

@ -53,11 +53,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1509220",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1509220"
},
{ {
"name": "https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8", "name": "https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,6 +67,11 @@
"name": "GLSA-201711-05", "name": "GLSA-201711-05",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201711-05" "url": "https://security.gentoo.org/glsa/201711-05"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1509220",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509220"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://sourceforge.net/p/mpg123/bugs/254/",
"refsource" : "CONFIRM",
"url" : "https://sourceforge.net/p/mpg123/bugs/254/"
},
{ {
"name": "https://sourceforge.net/p/mpg123/mailman/message/35987663/", "name": "https://sourceforge.net/p/mpg123/mailman/message/35987663/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://sourceforge.net/p/mpg123/mailman/message/35987663/" "url": "https://sourceforge.net/p/mpg123/mailman/message/35987663/"
},
{
"name": "https://sourceforge.net/p/mpg123/bugs/254/",
"refsource": "CONFIRM",
"url": "https://sourceforge.net/p/mpg123/bugs/254/"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1039791",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039791"
},
{ {
"name": "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html", "name": "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "102140", "name": "102140",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102140" "url": "http://www.securityfocus.com/bid/102140"
},
{
"name" : "1039791",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039791"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4201", "ID": "CVE-2017-4201",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4366", "ID": "CVE-2017-4366",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4401", "ID": "CVE-2017-4401",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4454", "ID": "CVE-2017-4454",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4633", "ID": "CVE-2017-4633",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {