"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:07:55 +00:00
parent 3d570e8696
commit 452e95c734
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
47 changed files with 3574 additions and 3574 deletions

View File

@ -62,6 +62,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://evuln.com/vulns/6/summary.html" "url": "http://evuln.com/vulns/6/summary.html"
}, },
{
"name": "18268",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18268"
},
{ {
"name": "16106", "name": "16106",
"refsource": "BID", "refsource": "BID",
@ -71,11 +76,6 @@
"name": "ADV-2006-0002", "name": "ADV-2006-0002",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0002" "url": "http://www.vupen.com/english/advisories/2006/0002"
},
{
"name" : "18268",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18268"
} }
] ]
} }

View File

@ -52,6 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "22412",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22412"
},
{
"name": "22407",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22407"
},
{
"name": "22405",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22405"
},
{
"name": "22411",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22411"
},
{ {
"name": "http://sourceforge.net/project/shownotes.php?release_id=382411&group_id=122682", "name": "http://sourceforge.net/project/shownotes.php?release_id=382411&group_id=122682",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -63,9 +83,14 @@
"url": "http://www.securityfocus.com/bid/16273" "url": "http://www.securityfocus.com/bid/16273"
}, },
{ {
"name" : "ADV-2006-0231", "name": "22404",
"refsource" : "VUPEN", "refsource": "OSVDB",
"url" : "http://www.vupen.com/english/advisories/2006/0231" "url": "http://www.osvdb.org/22404"
},
{
"name": "18459",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18459"
}, },
{ {
"name": "22403", "name": "22403",
@ -73,29 +98,14 @@
"url": "http://www.osvdb.org/22403" "url": "http://www.osvdb.org/22403"
}, },
{ {
"name" : "22404", "name": "22410",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://www.osvdb.org/22404" "url": "http://www.osvdb.org/22410"
}, },
{ {
"name" : "22405", "name": "ADV-2006-0231",
"refsource" : "OSVDB", "refsource": "VUPEN",
"url" : "http://www.osvdb.org/22405" "url": "http://www.vupen.com/english/advisories/2006/0231"
},
{
"name" : "22406",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22406"
},
{
"name" : "22407",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22407"
},
{
"name" : "22408",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22408"
}, },
{ {
"name": "22409", "name": "22409",
@ -103,24 +113,14 @@
"url": "http://www.osvdb.org/22409" "url": "http://www.osvdb.org/22409"
}, },
{ {
"name" : "22410", "name": "22406",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://www.osvdb.org/22410" "url": "http://www.osvdb.org/22406"
}, },
{ {
"name" : "22411", "name": "22408",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://www.osvdb.org/22411" "url": "http://www.osvdb.org/22408"
},
{
"name" : "22412",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22412"
},
{
"name" : "22413",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22413"
}, },
{ {
"name": "22414", "name": "22414",
@ -133,9 +133,9 @@
"url": "http://www.osvdb.org/22415" "url": "http://www.osvdb.org/22415"
}, },
{ {
"name" : "18459", "name": "22413",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/18459" "url": "http://www.osvdb.org/22413"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060204 PeopleSoft (Oracle) PSCipher Encryption Weakness",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/424086/100/0/threaded"
},
{ {
"name": "16507", "name": "16507",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "22952", "name": "22952",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/22952" "url": "http://www.osvdb.org/22952"
},
{
"name": "20060204 PeopleSoft (Oracle) PSCipher Encryption Weakness",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/424086/100/0/threaded"
} }
] ]
} }

View File

@ -57,26 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/425936/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/425936/100/0/threaded"
}, },
{
"name" : "http://www.nsag.ru/vuln/953.html",
"refsource" : "MISC",
"url" : "http://www.nsag.ru/vuln/953.html"
},
{
"name" : "16797",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16797"
},
{
"name" : "ADV-2006-0717",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0717"
},
{
"name" : "18989",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18989"
},
{ {
"name": "485", "name": "485",
"refsource": "SREASON", "refsource": "SREASON",
@ -86,6 +66,26 @@
"name": "thebat-subject-bo(24882)", "name": "thebat-subject-bo(24882)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24882" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24882"
},
{
"name": "16797",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16797"
},
{
"name": "18989",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18989"
},
{
"name": "http://www.nsag.ru/vuln/953.html",
"refsource": "MISC",
"url": "http://www.nsag.ru/vuln/953.html"
},
{
"name": "ADV-2006-0717",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0717"
} }
] ]
} }

View File

@ -52,60 +52,60 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060706 Mico crashes when contected with wrong IOR / DoS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/439439/100/0/threaded"
},
{ {
"name": "20060709 Re: Mico crashes when contected with wrong IOR / DoS", "name": "20060709 Re: Mico crashes when contected with wrong IOR / DoS",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/439606" "url": "http://www.securityfocus.com/archive/1/439606"
}, },
{
"name" : "20060710 Re: Mico crashes when contected with wrong IOR / DoS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/439655/100/0/threaded"
},
{
"name" : "20060706 Mico crashes when contected with wrong IOR / DoS",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047708.html"
},
{
"name" : "http://mico.org/down.html",
"refsource" : "CONFIRM",
"url" : "http://mico.org/down.html"
},
{
"name" : "18869",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18869"
},
{
"name" : "ADV-2006-2709",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2709"
},
{
"name" : "27029",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27029"
},
{ {
"name": "20970", "name": "20970",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20970" "url": "http://secunia.com/advisories/20970"
}, },
{
"name": "18869",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18869"
},
{
"name": "20060706 Mico crashes when contected with wrong IOR / DoS",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047708.html"
},
{
"name": "20060710 Re: Mico crashes when contected with wrong IOR / DoS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/439655/100/0/threaded"
},
{
"name": "27029",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27029"
},
{ {
"name": "1210", "name": "1210",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1210" "url": "http://securityreason.com/securityalert/1210"
}, },
{
"name": "20060706 Mico crashes when contected with wrong IOR / DoS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/439439/100/0/threaded"
},
{
"name": "http://mico.org/down.html",
"refsource": "CONFIRM",
"url": "http://mico.org/down.html"
},
{ {
"name": "mico-setanswerinvoke-dos(27686)", "name": "mico-setanswerinvoke-dos(27686)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27686" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27686"
},
{
"name": "ADV-2006-2709",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2709"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "1984", "name": "27031",
"refsource" : "EXPLOIT-DB", "refsource": "OSVDB",
"url" : "https://www.exploit-db.com/exploits/1984" "url": "http://www.osvdb.org/27031"
},
{
"name" : "1985",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1985"
}, },
{ {
"name": "1992", "name": "1992",
@ -73,9 +68,14 @@
"url": "http://www.rarlabs.com/rarnew.htm" "url": "http://www.rarlabs.com/rarnew.htm"
}, },
{ {
"name" : "27031", "name": "1984",
"refsource" : "OSVDB", "refsource": "EXPLOIT-DB",
"url" : "http://www.osvdb.org/27031" "url": "https://www.exploit-db.com/exploits/1984"
},
{
"name": "1985",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1985"
} }
] ]
} }

View File

@ -53,14 +53,49 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060809 Multiple buffer-overflows in AlsaPlayer 0.99.76", "name": "19450",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/442725/100/0/threaded" "url": "http://www.securityfocus.com/bid/19450"
},
{
"name": "27883",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27883"
},
{
"name": "1356",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1356"
},
{
"name": "27885",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27885"
},
{
"name": "27884",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27884"
},
{
"name": "21749",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21749"
},
{
"name": "alsaplayer-reconnect-bo(28306)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28306"
},
{
"name": "22018",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22018"
}, },
{ {
"name": "20060809 Multiple buffer-overflows in AlsaPlayer 0.99.76", "name": "20060809 Multiple buffer-overflows in AlsaPlayer 0.99.76",
"refsource" : "FULLDISC", "refsource": "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0249.html" "url": "http://www.securityfocus.com/archive/1/442725/100/0/threaded"
}, },
{ {
"name": "http://aluigi.altervista.org/adv/alsapbof-adv.txt", "name": "http://aluigi.altervista.org/adv/alsapbof-adv.txt",
@ -68,9 +103,9 @@
"url": "http://aluigi.altervista.org/adv/alsapbof-adv.txt" "url": "http://aluigi.altervista.org/adv/alsapbof-adv.txt"
}, },
{ {
"name" : "DSA-1179", "name": "21422",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2006/dsa-1179" "url": "http://secunia.com/advisories/21422"
}, },
{ {
"name": "GLSA-200608-24", "name": "GLSA-200608-24",
@ -83,54 +118,9 @@
"url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html" "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
}, },
{ {
"name" : "19450", "name": "DSA-1179",
"refsource" : "BID", "refsource": "DEBIAN",
"url" : "http://www.securityfocus.com/bid/19450" "url": "http://www.debian.org/security/2006/dsa-1179"
},
{
"name" : "ADV-2006-3235",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3235"
},
{
"name" : "27883",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27883"
},
{
"name" : "27884",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27884"
},
{
"name" : "27885",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27885"
},
{
"name" : "21422",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21422"
},
{
"name" : "21639",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21639"
},
{
"name" : "22018",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22018"
},
{
"name" : "21749",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21749"
},
{
"name" : "1356",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1356"
}, },
{ {
"name": "alsaplayer-cddblookup-bo(28308)", "name": "alsaplayer-cddblookup-bo(28308)",
@ -143,9 +133,19 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28307" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28307"
}, },
{ {
"name" : "alsaplayer-reconnect-bo(28306)", "name": "ADV-2006-3235",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28306" "url": "http://www.vupen.com/english/advisories/2006/3235"
},
{
"name": "20060809 Multiple buffer-overflows in AlsaPlayer 0.99.76",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0249.html"
},
{
"name": "21639",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21639"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060815 local file include in PHP-Nuke (autohtml.php)", "name": "1398",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/443289/100/0/threaded" "url": "http://securityreason.com/securityalert/1398"
}, },
{ {
"name": "http://www.lezr.com/vb/showthread.php?p=104324", "name": "http://www.lezr.com/vb/showthread.php?p=104324",
@ -67,15 +67,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/19525" "url": "http://www.securityfocus.com/bid/19525"
}, },
{
"name" : "1398",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1398"
},
{ {
"name": "phpnuke-autohtml-file-include(28388)", "name": "phpnuke-autohtml-file-include(28388)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28388" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28388"
},
{
"name": "20060815 local file include in PHP-Nuke (autohtml.php)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443289/100/0/threaded"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "2186", "name": "spidey-blog-projegoster-sql-injection(28374)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/2186" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28374"
}, },
{ {
"name": "19518", "name": "19518",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/21482" "url": "http://secunia.com/advisories/21482"
}, },
{ {
"name" : "spidey-blog-projegoster-sql-injection(28374)", "name": "2186",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28374" "url": "https://www.exploit-db.com/exploits/2186"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2010-2749", "ID": "CVE-2010-2749",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2867", "ID": "CVE-2010-2867",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20100824 TPTI-10-14: Adobe Shockwave Director rcsL Chunk Pointer Offset Remote Code Execution Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/513299/100/0/threaded"
},
{ {
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14", "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14",
"refsource": "MISC", "refsource": "MISC",
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14" "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14"
}, },
{
"name": "1024361",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024361"
},
{ {
"name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,15 +72,15 @@
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021"
}, },
{
"name" : "1024361",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024361"
},
{ {
"name": "ADV-2010-2176", "name": "ADV-2010-2176",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2176" "url": "http://www.vupen.com/english/advisories/2010/2176"
},
{
"name": "20100824 TPTI-10-14: Adobe Shockwave Director rcsL Chunk Pointer Offset Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/513299/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2872", "ID": "CVE-2010-2872",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20100824 ZDI-10-161: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "name": "1024361",
"refsource" : "BUGTRAQ", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/archive/1/513306/100/0/threaded" "url": "http://www.securitytracker.com/id?1024361"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-161",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-161"
}, },
{ {
"name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html"
}, },
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-161",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-161"
},
{ {
"name": "oval:org.mitre.oval:def:11889", "name": "oval:org.mitre.oval:def:11889",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889"
}, },
{ {
"name" : "1024361", "name": "20100824 ZDI-10-161: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability",
"refsource" : "SECTRACK", "refsource": "BUGTRAQ",
"url" : "http://www.securitytracker.com/id?1024361" "url": "http://www.securityfocus.com/archive/1/513306/100/0/threaded"
}, },
{ {
"name": "ADV-2010-2176", "name": "ADV-2010-2176",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2010-3034", "ID": "CVE-2010-3034",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,11 +52,36 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "adselfservice-resetresult-security-bypass(65348)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65348"
},
{
"name": "43241",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43241"
},
{
"name": "ADV-2011-0392",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0392"
},
{ {
"name": "20110210 CORE-2011-0103 - ZOHO ManageEngine ADSelfService multiple vulnerabilities", "name": "20110210 CORE-2011-0103 - ZOHO ManageEngine ADSelfService multiple vulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516396/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/516396/100/0/threaded"
}, },
{
"name": "8089",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8089"
},
{
"name": "70869",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/70869"
},
{ {
"name": "http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities", "name": "http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities",
"refsource": "MISC", "refsource": "MISC",
@ -66,31 +91,6 @@
"name": "46331", "name": "46331",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/46331" "url": "http://www.securityfocus.com/bid/46331"
},
{
"name" : "70869",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/70869"
},
{
"name" : "43241",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43241"
},
{
"name" : "8089",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/8089"
},
{
"name" : "ADV-2011-0392",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0392"
},
{
"name" : "adselfservice-resetresult-security-bypass(65348)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65348"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "VU#870532",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/870532"
},
{ {
"name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt", "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html", "name": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html" "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
},
{
"name" : "VU#870532",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/870532"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1024861",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024861"
},
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-282", "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-282",
"refsource": "MISC", "refsource": "MISC",
@ -66,11 +71,6 @@
"name": "69853", "name": "69853",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/69853" "url": "http://osvdb.org/69853"
},
{
"name" : "1024861",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024861"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1082", "ID": "CVE-2011-1082",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "[oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/02/2"
},
{ {
"name": "[linux-kernel] 20110205 [PATCH] epoll: Prevent deadlock through unsafe ->f_op->poll() calls.", "name": "[linux-kernel] 20110205 [PATCH] epoll: Prevent deadlock through unsafe ->f_op->poll() calls.",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lkml.org/lkml/2011/2/5/220" "url": "https://lkml.org/lkml/2011/2/5/220"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681575",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681575"
},
{ {
"name": "[oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll", "name": "[oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/02/1" "url": "http://openwall.com/lists/oss-security/2011/03/02/1"
}, },
{
"name" : "[oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/02/2"
},
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -76,11 +81,6 @@
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38", "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38" "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=681575",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=681575"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1770", "ID": "CVE-2011-1770",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,44 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[linux-kernel] 20110506 Re: [PATCH] dccp: handle invalid feature options length", "name": "1025592",
"refsource" : "MLIST", "refsource": "SECTRACK",
"url" : "http://marc.info/?l=linux-kernel&m=130469305815140&w=2" "url": "http://www.securitytracker.com/id?1025592"
}, },
{ {
"name": "[linux-kernel] 20110506 [PATCH] dccp: handle invalid feature options length", "name": "[linux-kernel] 20110506 [PATCH] dccp: handle invalid feature options length",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel&m=130468845209036&w=2" "url": "http://marc.info/?l=linux-kernel&m=130468845209036&w=2"
}, },
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.33/ChangeLog-2.6.33.14",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.33/ChangeLog-2.6.33.14"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=703011",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=703011"
},
{
"name" : "FEDORA-2011-7551",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061366.html"
},
{
"name" : "FEDORA-2011-7823",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html"
},
{ {
"name": "47769", "name": "47769",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/47769" "url": "http://www.securityfocus.com/bid/47769"
}, },
{ {
"name" : "1025592", "name": "[linux-kernel] 20110506 Re: [PATCH] dccp: handle invalid feature options length",
"refsource" : "SECTRACK", "refsource": "MLIST",
"url" : "http://www.securitytracker.com/id?1025592" "url": "http://marc.info/?l=linux-kernel&m=130469305815140&w=2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=703011",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703011"
}, },
{ {
"name": "44932", "name": "44932",
@ -101,6 +86,21 @@
"name": "8286", "name": "8286",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8286" "url": "http://securityreason.com/securityalert/8286"
},
{
"name": "FEDORA-2011-7823",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.33/ChangeLog-2.6.33.14",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.33/ChangeLog-2.6.33.14"
},
{
"name": "FEDORA-2011-7551",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061366.html"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20110506 Security Advisory: DNS BIND Security Advisory: RRSIG Queries Can Trigger Server Crash When Using Response Policy Zones",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/517900/100/0/threaded"
},
{
"name" : "https://www.isc.org/CVE-2011-1907",
"refsource" : "CONFIRM",
"url" : "https://www.isc.org/CVE-2011-1907"
},
{
"name" : "47734",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/47734"
},
{ {
"name": "1025503", "name": "1025503",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025503" "url": "http://www.securitytracker.com/id?1025503"
}, },
{
"name": "ADV-2011-1183",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1183"
},
{ {
"name": "44416", "name": "44416",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44416" "url": "http://secunia.com/advisories/44416"
}, },
{ {
"name" : "ADV-2011-1183", "name": "47734",
"refsource" : "VUPEN", "refsource": "BID",
"url" : "http://www.vupen.com/english/advisories/2011/1183" "url": "http://www.securityfocus.com/bid/47734"
},
{
"name": "https://www.isc.org/CVE-2011-1907",
"refsource": "CONFIRM",
"url": "https://www.isc.org/CVE-2011-1907"
},
{
"name": "20110506 Security Advisory: DNS BIND Security Advisory: RRSIG Queries Can Trigger Server Crash When Using Response Policy Zones",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/517900/100/0/threaded"
}, },
{ {
"name": "iscbind-rrsig-dos(67297)", "name": "iscbind-rrsig-dos(67297)",

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "18184",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/18184"
},
{
"name" : "http://www.security-assessment.com/files/documents/advisory/Final_Draft-Multiple_Stack_Buffer_Overflows.pdf",
"refsource" : "MISC",
"url" : "http://www.security-assessment.com/files/documents/advisory/Final_Draft-Multiple_Stack_Buffer_Overflows.pdf"
},
{ {
"name": "50850", "name": "50850",
"refsource": "BID", "refsource": "BID",
@ -72,6 +62,16 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/77454" "url": "http://osvdb.org/77454"
}, },
{
"name": "18184",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18184"
},
{
"name": "http://www.security-assessment.com/files/documents/advisory/Final_Draft-Multiple_Stack_Buffer_Overflows.pdf",
"refsource": "MISC",
"url": "http://www.security-assessment.com/files/documents/advisory/Final_Draft-Multiple_Stack_Buffer_Overflows.pdf"
},
{ {
"name": "47044", "name": "47044",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-3059", "ID": "CVE-2014-3059",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3355", "ID": "CVE-2014-3355",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,25 +57,25 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata/cvrf/cisco-sa-20140924-metadata_cvrf.xml" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata/cvrf/cisco-sa-20140924-metadata_cvrf.xml"
}, },
{
"name" : "20140924 Cisco IOS Software Metadata Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata"
},
{ {
"name": "70130", "name": "70130",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/70130" "url": "http://www.securityfocus.com/bid/70130"
}, },
{
"name" : "1030894",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030894"
},
{ {
"name": "ciscoios-cve20143355-dos(96175)", "name": "ciscoios-cve20143355-dos(96175)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96175" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96175"
},
{
"name": "20140924 Cisco IOS Software Metadata Vulnerabilities",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata"
},
{
"name": "1030894",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030894"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3480", "ID": "CVE-2014-3480",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,55 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[file] 20140612 file-5.19 is now available",
"refsource" : "MLIST",
"url" : "http://mx.gw.com/pipermail/file/2014/001553.html"
},
{
"name" : "http://www.php.net/ChangeLog-5.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php"
},
{
"name" : "https://bugs.php.net/bug.php?id=67412",
"refsource" : "CONFIRM",
"url" : "https://bugs.php.net/bug.php?id=67412"
},
{
"name" : "https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382",
"refsource" : "CONFIRM",
"url" : "https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382"
},
{
"name" : "http://support.apple.com/kb/HT6443",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6443"
},
{ {
"name": "https://support.apple.com/HT204659", "name": "https://support.apple.com/HT204659",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT204659" "url": "https://support.apple.com/HT204659"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "name": "68238",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" "url": "http://www.securityfocus.com/bid/68238"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "name": "RHSA-2014:1766",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" "url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
},
{
"name" : "APPLE-SA-2015-04-08-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
},
{
"name" : "DSA-2974",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2974"
}, },
{ {
"name": "DSA-3021", "name": "DSA-3021",
@ -113,39 +78,74 @@
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2" "url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
}, },
{ {
"name" : "SSRT101681", "name": "https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382",
"refsource" : "HP", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=bugtraq&m=141017844705317&w=2" "url": "https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382"
}, },
{ {
"name" : "RHSA-2014:1765", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1765.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
}, },
{ {
"name" : "RHSA-2014:1766", "name": "DSA-2974",
"refsource" : "REDHAT", "refsource": "DEBIAN",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1766.html" "url": "http://www.debian.org/security/2014/dsa-2974"
},
{
"name" : "openSUSE-SU-2014:1236",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
},
{
"name" : "68238",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68238"
}, },
{ {
"name": "59794", "name": "59794",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59794" "url": "http://secunia.com/advisories/59794"
}, },
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "[file] 20140612 file-5.19 is now available",
"refsource": "MLIST",
"url": "http://mx.gw.com/pipermail/file/2014/001553.html"
},
{
"name": "APPLE-SA-2015-04-08-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT6443",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6443"
},
{
"name": "https://bugs.php.net/bug.php?id=67412",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=67412"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"name": "RHSA-2014:1765",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
},
{
"name": "SSRT101681",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
},
{ {
"name": "59831", "name": "59831",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59831" "url": "http://secunia.com/advisories/59831"
},
{
"name": "openSUSE-SU-2014:1236",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.com/files/126645/BarracudaDrive-6.7.2-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/126645/BarracudaDrive-6.7.2-Cross-Site-Scripting.html"
},
{ {
"name": "67428", "name": "67428",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "58712", "name": "58712",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58712" "url": "http://secunia.com/advisories/58712"
},
{
"name": "http://packetstormsecurity.com/files/126645/BarracudaDrive-6.7.2-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/126645/BarracudaDrive-6.7.2-Cross-Site-Scripting.html"
} }
] ]
} }

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20140527 Fwd: [ruby-core:62800] [ruby-trunk - Bug #9709] Large string causes SEGV\twith x64-mingw32", "name": "ruby-cve20143916-dos(93505)",
"refsource" : "MLIST", "refsource": "XF",
"url" : "http://seclists.org/oss-sec/2014/q2/362" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93505"
},
{
"name" : "[oss-security] 20140529 Re: Fwd: [ruby-core:62800] [ruby-trunk - Bug #9709] Large string causes SEGV with x64-mingw32",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q2/375"
},
{
"name" : "https://bugs.ruby-lang.org/issues/9709",
"refsource" : "MISC",
"url" : "https://bugs.ruby-lang.org/issues/9709"
}, },
{ {
"name": "67705", "name": "67705",
@ -73,9 +63,19 @@
"url": "http://www.securityfocus.com/bid/67705" "url": "http://www.securityfocus.com/bid/67705"
}, },
{ {
"name" : "ruby-cve20143916-dos(93505)", "name": "https://bugs.ruby-lang.org/issues/9709",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/93505" "url": "https://bugs.ruby-lang.org/issues/9709"
},
{
"name": "[oss-security] 20140529 Re: Fwd: [ruby-core:62800] [ruby-trunk - Bug #9709] Large string causes SEGV with x64-mingw32",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q2/375"
},
{
"name": "[oss-security] 20140527 Fwd: [ruby-core:62800] [ruby-trunk - Bug #9709] Large string causes SEGV\twith x64-mingw32",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q2/362"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7108", "ID": "CVE-2014-7108",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{ {
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "VU#352729", "name": "VU#352729",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/352729" "url": "http://www.kb.cert.org/vuls/id/352729"
},
{
"name" : "VU#582497",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/582497"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7555", "ID": "CVE-2014-7555",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#855825",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/855825"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#855825", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/855825" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7690", "ID": "CVE-2014-7690",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#894457",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/894457"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#894457", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/894457" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20150110 Wordpress plugin Pods <= 2.4.3 XSS and CSRF vulnerabilities", "name": "71996",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/534437/100/0/threaded" "url": "http://www.securityfocus.com/bid/71996"
}, },
{ {
"name": "20150112 Wordpress plugin Pods <= 2.4.3 XSS and CSRF vulnerabilities", "name": "20150112 Wordpress plugin Pods <= 2.4.3 XSS and CSRF vulnerabilities",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jan/26" "url": "http://seclists.org/fulldisclosure/2015/Jan/26"
}, },
{
"name" : "http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html"
},
{ {
"name": "https://wordpress.org/plugins/pods/changelog/", "name": "https://wordpress.org/plugins/pods/changelog/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/pods/changelog/" "url": "https://wordpress.org/plugins/pods/changelog/"
}, },
{ {
"name" : "71996", "name": "http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/71996" "url": "http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html"
},
{
"name": "20150110 Wordpress plugin Pods <= 2.4.3 XSS and CSRF vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534437/100/0/threaded"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8222", "ID": "CVE-2014-8222",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2014-8399", "ID": "CVE-2014-8399",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/desrt/systemd-shim/commit/d2e91c118f6128875274a638007702d1cc665893",
"refsource" : "CONFIRM",
"url" : "https://github.com/desrt/systemd-shim/commit/d2e91c118f6128875274a638007702d1cc665893"
},
{ {
"name": "USN-2392-1", "name": "USN-2392-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2392-1" "url": "http://www.ubuntu.com/usn/USN-2392-1"
},
{
"name": "https://github.com/desrt/systemd-shim/commit/d2e91c118f6128875274a638007702d1cc665893",
"refsource": "CONFIRM",
"url": "https://github.com/desrt/systemd-shim/commit/d2e91c118f6128875274a638007702d1cc665893"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "DSA-3085",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3085"
},
{ {
"name": "[oss-security] 20141125 Re: WordPress 4.0.1 Security Release", "name": "[oss-security] 20141125 Re: WordPress 4.0.1 Security Release",
"refsource": "MLIST", "refsource": "MLIST",
@ -62,20 +67,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://core.trac.wordpress.org/changeset/30444" "url": "https://core.trac.wordpress.org/changeset/30444"
}, },
{
"name" : "https://wordpress.org/news/2014/11/wordpress-4-0-1/",
"refsource" : "CONFIRM",
"url" : "https://wordpress.org/news/2014/11/wordpress-4-0-1/"
},
{ {
"name": "http://advisories.mageia.org/MGASA-2014-0493.html", "name": "http://advisories.mageia.org/MGASA-2014-0493.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0493.html" "url": "http://advisories.mageia.org/MGASA-2014-0493.html"
}, },
{ {
"name" : "DSA-3085", "name": "1031243",
"refsource" : "DEBIAN", "refsource": "SECTRACK",
"url" : "http://www.debian.org/security/2014/dsa-3085" "url": "http://www.securitytracker.com/id/1031243"
}, },
{ {
"name": "MDVSA-2014:233", "name": "MDVSA-2014:233",
@ -83,9 +83,9 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233"
}, },
{ {
"name" : "1031243", "name": "https://wordpress.org/news/2014/11/wordpress-4-0-1/",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1031243" "url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://www.mantisbt.org/bugs/view.php?id=17890",
"refsource": "CONFIRM",
"url": "https://www.mantisbt.org/bugs/view.php?id=17890"
},
{
"name": "https://github.com/mantisbt/mantisbt/commit/511564cc",
"refsource": "CONFIRM",
"url": "https://github.com/mantisbt/mantisbt/commit/511564cc"
},
{
"name": "62101",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62101"
},
{ {
"name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT",
"refsource": "MLIST", "refsource": "MLIST",
@ -62,25 +77,10 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q4/902" "url": "http://seclists.org/oss-sec/2014/q4/902"
}, },
{
"name" : "https://github.com/mantisbt/mantisbt/commit/511564cc",
"refsource" : "CONFIRM",
"url" : "https://github.com/mantisbt/mantisbt/commit/511564cc"
},
{
"name" : "https://www.mantisbt.org/bugs/view.php?id=17890",
"refsource" : "CONFIRM",
"url" : "https://www.mantisbt.org/bugs/view.php?id=17890"
},
{ {
"name": "DSA-3120", "name": "DSA-3120",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3120" "url": "http://www.debian.org/security/2015/dsa-3120"
},
{
"name" : "62101",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62101"
} }
] ]
} }

View File

@ -57,16 +57,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/03/21/1" "url": "http://www.openwall.com/lists/oss-security/2016/03/21/1"
}, },
{
"name" : "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-52774",
"refsource" : "CONFIRM",
"url" : "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-52774"
},
{ {
"name": "https://moodle.org/mod/forum/discuss.php?d=330180", "name": "https://moodle.org/mod/forum/discuss.php?d=330180",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://moodle.org/mod/forum/discuss.php?d=330180" "url": "https://moodle.org/mod/forum/discuss.php?d=330180"
}, },
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-52774",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-52774"
},
{ {
"name": "1035333", "name": "1035333",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -53,120 +53,15 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34", "name": "1036688",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34" "url": "http://www.securitytracker.com/id/1036688"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"
},
{
"name" : "http://www.splunk.com/view/SP-CAAAPSV",
"refsource" : "CONFIRM",
"url" : "http://www.splunk.com/view/SP-CAAAPSV"
},
{
"name" : "http://www.splunk.com/view/SP-CAAAPUE",
"refsource" : "CONFIRM",
"url" : "http://www.splunk.com/view/SP-CAAAPUE"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
},
{
"name" : "https://bto.bluecoat.com/security-advisory/sa132",
"refsource" : "CONFIRM",
"url" : "https://bto.bluecoat.com/security-advisory/sa132"
},
{
"name" : "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
"refsource" : "CONFIRM",
"url" : "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10171",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10171"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21995039",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21995039"
},
{
"name" : "https://www.tenable.com/security/tns-2016-16",
"refsource" : "CONFIRM",
"url" : "https://www.tenable.com/security/tns-2016-16"
},
{
"name" : "https://source.android.com/security/bulletin/2017-03-01.html",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-03-01.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
}, },
{ {
"name": "https://www.tenable.com/security/tns-2016-20", "name": "https://www.tenable.com/security/tns-2016-20",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-20" "url": "https://www.tenable.com/security/tns-2016-20"
}, },
{
"name" : "https://www.tenable.com/security/tns-2016-21",
"refsource" : "CONFIRM",
"url" : "https://www.tenable.com/security/tns-2016-21"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us"
},
{
"name" : "FreeBSD-SA-16:26",
"refsource" : "FREEBSD",
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc"
},
{
"name" : "RHSA-2016:1940",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1940.html"
},
{ {
"name": "RHSA-2018:2185", "name": "RHSA-2018:2185",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -178,9 +73,14 @@
"url": "https://access.redhat.com/errata/RHSA-2018:2186" "url": "https://access.redhat.com/errata/RHSA-2018:2186"
}, },
{ {
"name" : "RHSA-2018:2187", "name": "http://www.splunk.com/view/SP-CAAAPUE",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "https://access.redhat.com/errata/RHSA-2018:2187" "url": "http://www.splunk.com/view/SP-CAAAPUE"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
}, },
{ {
"name": "92557", "name": "92557",
@ -193,9 +93,109 @@
"url": "http://www.securitytracker.com/id/1037968" "url": "http://www.securitytracker.com/id/1037968"
}, },
{ {
"name" : "1036688", "name": "RHSA-2016:1940",
"refsource" : "SECTRACK", "refsource": "REDHAT",
"url" : "http://www.securitytracker.com/id/1036688" "url": "http://rhn.redhat.com/errata/RHSA-2016-1940.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"
},
{
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
"refsource": "CONFIRM",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us"
},
{
"name": "http://www.splunk.com/view/SP-CAAAPSV",
"refsource": "CONFIRM",
"url": "http://www.splunk.com/view/SP-CAAAPSV"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "https://www.tenable.com/security/tns-2016-16",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-16"
},
{
"name": "https://www.tenable.com/security/tns-2016-21",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-21"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10171",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10171"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa132",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa132"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name": "FreeBSD-SA-16:26",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc"
},
{
"name": "https://source.android.com/security/bulletin/2017-03-01.html",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01.html"
},
{
"name": "RHSA-2018:2187",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2187"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
} }
] ]
} }

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160330 CVE-2016-2385 Kamailio SEAS module heap buffer overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/537926/100/0/threaded"
},
{
"name" : "39638",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39638/"
},
{ {
"name": "http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html", "name": "http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html" "url": "http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html"
}, },
{
"name" : "https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/",
"refsource" : "MISC",
"url" : "https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/"
},
{
"name" : "http://www.kamailio.org/pub/kamailio/4.3.5/ChangeLog",
"refsource" : "CONFIRM",
"url" : "http://www.kamailio.org/pub/kamailio/4.3.5/ChangeLog"
},
{ {
"name": "https://github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643", "name": "https://github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643" "url": "https://github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643"
}, },
{
"name": "https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/",
"refsource": "MISC",
"url": "https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/"
},
{ {
"name": "DSA-3535", "name": "DSA-3535",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3535" "url": "http://www.debian.org/security/2016/dsa-3535"
}, },
{
"name": "39638",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39638/"
},
{ {
"name": "DSA-3537", "name": "DSA-3537",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3537" "url": "http://www.debian.org/security/2016/dsa-3537"
},
{
"name": "20160330 CVE-2016-2385 Kamailio SEAS module heap buffer overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537926/100/0/threaded"
},
{
"name": "http://www.kamailio.org/pub/kamailio/4.3.5/ChangeLog",
"refsource": "CONFIRM",
"url": "http://www.kamailio.org/pub/kamailio/4.3.5/ChangeLog"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20160819 Onapsis Security Advisory ONAPSIS-2016-027: SAP HANA User information disclosure", "name": "92346",
"refsource" : "FULLDISC", "refsource": "BID",
"url" : "http://seclists.org/fulldisclosure/2016/Aug/92" "url": "http://www.securityfocus.com/bid/92346"
}, },
{ {
"name": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components", "name": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components",
@ -63,9 +63,9 @@
"url": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components" "url": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components"
}, },
{ {
"name" : "https://www.onapsis.com/research/security-advisories/sap-hana-user-information-disclosure", "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-027: SAP HANA User information disclosure",
"refsource" : "MISC", "refsource": "FULLDISC",
"url" : "https://www.onapsis.com/research/security-advisories/sap-hana-user-information-disclosure" "url": "http://seclists.org/fulldisclosure/2016/Aug/92"
}, },
{ {
"name": "http://packetstormsecurity.com/files/138444/SAP-HANA-DB-1.00.091.00.1418659308-Information-Disclosure.html", "name": "http://packetstormsecurity.com/files/138444/SAP-HANA-DB-1.00.091.00.1418659308-Information-Disclosure.html",
@ -73,9 +73,9 @@
"url": "http://packetstormsecurity.com/files/138444/SAP-HANA-DB-1.00.091.00.1418659308-Information-Disclosure.html" "url": "http://packetstormsecurity.com/files/138444/SAP-HANA-DB-1.00.091.00.1418659308-Information-Disclosure.html"
}, },
{ {
"name" : "92346", "name": "https://www.onapsis.com/research/security-advisories/sap-hana-user-information-disclosure",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/92346" "url": "https://www.onapsis.com/research/security-advisories/sap-hana-user-information-disclosure"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7757", "ID": "CVE-2016-7757",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {