"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:12:41 +00:00
parent 102ddaf35b
commit 4d7f1f4e7b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3275 additions and 3275 deletions

View File

@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.securemac.com/macosxnidump.php",
"refsource" : "MISC",
"url" : "http://www.securemac.com/macosxnidump.php"
},
{
"name" : "http://www.securiteam.com/securityreviews/5QP032A4UU.html",
"refsource" : "MISC",
"url" : "http://www.securiteam.com/securityreviews/5QP032A4UU.html"
},
{
"name" : "20010903 Re: Possible Issue with Netinfo and Mac OS X",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=99953038722104&w=2"
},
{
"name" : "20020915 nidump on OS X",
"refsource" : "BUGTRAQ",
"url" : "http://lists.insecure.org/lists/bugtraq/2002/Sep/0128.html"
},
{ {
"name": "http://lists.apple.com/mhonarc/security-announce/msg00038.html", "name": "http://lists.apple.com/mhonarc/security-announce/msg00038.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -81,6 +61,26 @@
"name": "1001946", "name": "1001946",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1001946" "url": "http://securitytracker.com/id?1001946"
},
{
"name": "http://www.securiteam.com/securityreviews/5QP032A4UU.html",
"refsource": "MISC",
"url": "http://www.securiteam.com/securityreviews/5QP032A4UU.html"
},
{
"name": "http://www.securemac.com/macosxnidump.php",
"refsource": "MISC",
"url": "http://www.securemac.com/macosxnidump.php"
},
{
"name": "20020915 nidump on OS X",
"refsource": "BUGTRAQ",
"url": "http://lists.insecure.org/lists/bugtraq/2002/Sep/0128.html"
},
{
"name": "20010903 Re: Possible Issue with Netinfo and Mac OS X",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=99953038722104&w=2"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2001-1492", "ID": "CVE-2001-1492",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20011201 easynews 1.5 let's remote users modify database",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-12/0000.html"
},
{ {
"name": "3643", "name": "3643",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "easynews-php-modify-data(7657)", "name": "easynews-php-modify-data(7657)",
"refsource": "XF", "refsource": "XF",
"url": "http://www.iss.net/security_center/static/7657.php" "url": "http://www.iss.net/security_center/static/7657.php"
},
{
"name": "20011201 easynews 1.5 let's remote users modify database",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-12/0000.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20011204 Microsoft's Outlook Express 6 \"E-mail attachment security\" Flawed", "name": "oe-blocked-attachment-forward(7670)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/243869" "url": "http://www.iss.net/security_center/static/7670.php"
}, },
{ {
"name": "http://www.windows-help.net/microsoft/oe6-attach.html", "name": "http://www.windows-help.net/microsoft/oe6-attach.html",
@ -63,9 +63,9 @@
"url": "http://www.windows-help.net/microsoft/oe6-attach.html" "url": "http://www.windows-help.net/microsoft/oe6-attach.html"
}, },
{ {
"name" : "oe-blocked-attachment-forward(7670)", "name": "20011204 Microsoft's Outlook Express 6 \"E-mail attachment security\" Flawed",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "http://www.iss.net/security_center/static/7670.php" "url": "http://www.securityfocus.com/archive/1/243869"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060429 Thyme 1.3 Cross Site Scripting",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432588/100/0/threaded"
},
{ {
"name": "http://www.aria-security.net/portals/thyme", "name": "http://www.aria-security.net/portals/thyme",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.aria-security.net/portals/thyme" "url": "http://www.aria-security.net/portals/thyme"
}, },
{
"name" : "20060908 Vendor ACK for CVE-2006-2117 (Thyme)",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2006-September/001019.html"
},
{
"name" : "17746",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17746"
},
{ {
"name": "ADV-2006-1602", "name": "ADV-2006-1602",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1602" "url": "http://www.vupen.com/english/advisories/2006/1602"
}, },
{
"name": "822",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/822"
},
{ {
"name": "19909", "name": "19909",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19909" "url": "http://secunia.com/advisories/19909"
}, },
{ {
"name" : "822", "name": "17746",
"refsource" : "SREASON", "refsource": "BID",
"url" : "http://securityreason.com/securityalert/822" "url": "http://www.securityfocus.com/bid/17746"
},
{
"name": "20060429 Thyme 1.3 Cross Site Scripting",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432588/100/0/threaded"
},
{
"name": "20060908 Vendor ACK for CVE-2006-2117 (Thyme)",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2006-September/001019.html"
}, },
{ {
"name": "thyme-index-xss(26188)", "name": "thyme-index-xss(26188)",

View File

@ -52,31 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060512 Buffer-overflow and NULL pointer crash in Genecys 0.2",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/433929/30/5010/threaded"
},
{
"name" : "20060512 Buffer-overflow and NULL pointer crash in Genecys 0.2",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046015.html"
},
{
"name" : "http://aluigi.altervista.org/adv/genecysbof-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/genecysbof-adv.txt"
},
{
"name" : "17969",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17969"
},
{
"name" : "ADV-2006-1815",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1815"
},
{ {
"name": "25482", "name": "25482",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -87,15 +62,40 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20099" "url": "http://secunia.com/advisories/20099"
}, },
{
"name": "http://aluigi.altervista.org/adv/genecysbof-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/genecysbof-adv.txt"
},
{
"name": "ADV-2006-1815",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1815"
},
{
"name": "20060512 Buffer-overflow and NULL pointer crash in Genecys 0.2",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/433929/30/5010/threaded"
},
{ {
"name": "944", "name": "944",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/944" "url": "http://securityreason.com/securityalert/944"
}, },
{
"name": "17969",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17969"
},
{ {
"name": "genecys-netparserc-dos(26523)", "name": "genecys-netparserc-dos(26523)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26523" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26523"
},
{
"name": "20060512 Buffer-overflow and NULL pointer crash in Genecys 0.2",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046015.html"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "21423",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21423"
},
{ {
"name": "ADV-2006-4875", "name": "ADV-2006-4875",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4875" "url": "http://www.vupen.com/english/advisories/2006/4875"
}, },
{
"name" : "23193",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23193"
},
{ {
"name": "cerberus-spellwin-xss(30719)", "name": "cerberus-spellwin-xss(30719)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30719" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30719"
},
{
"name": "21423",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21423"
},
{
"name": "23193",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23193"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061229 Spooky Login Multiple HTML Injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/455603/100/0/threaded"
},
{ {
"name": "21822", "name": "21822",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/21822" "url": "http://www.securityfocus.com/bid/21822"
},
{
"name": "20061229 Spooky Login Multiple HTML Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/455603/100/0/threaded"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061230 Enigma WordPress Bridge (boarddir) Remote File Include",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/455555/100/0/threaded"
},
{ {
"name": "3051", "name": "3051",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -68,9 +63,14 @@
"url": "http://www.attrition.org/pipermail/vim/2007-January/001207.html" "url": "http://www.attrition.org/pipermail/vim/2007-January/001207.html"
}, },
{ {
"name" : "21826", "name": "2093",
"refsource" : "BID", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/bid/21826" "url": "http://securityreason.com/securityalert/2093"
},
{
"name": "20061230 Enigma WordPress Bridge (boarddir) Remote File Include",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/455555/100/0/threaded"
}, },
{ {
"name": "017459", "name": "017459",
@ -78,9 +78,9 @@
"url": "http://securitytracker.com/id?017459" "url": "http://securitytracker.com/id?017459"
}, },
{ {
"name" : "2093", "name": "21826",
"refsource" : "SREASON", "refsource": "BID",
"url" : "http://securityreason.com/securityalert/2093" "url": "http://www.securityfocus.com/bid/21826"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "3044",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3044"
},
{ {
"name": "voodoo-chat-users-info-disclosure(31221)", "name": "voodoo-chat-users-info-disclosure(31221)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31221" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31221"
},
{
"name": "3044",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3044"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.phpmyfaq.de/advisory_2006-12-15.php",
"refsource" : "CONFIRM",
"url" : "http://www.phpmyfaq.de/advisory_2006-12-15.php"
},
{ {
"name": "21945", "name": "21945",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/21945" "url": "http://www.securityfocus.com/bid/21945"
}, },
{
"name" : "ADV-2007-0077",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0077"
},
{ {
"name": "23651", "name": "23651",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23651" "url": "http://secunia.com/advisories/23651"
},
{
"name": "http://www.phpmyfaq.de/advisory_2006-12-15.php",
"refsource": "CONFIRM",
"url": "http://www.phpmyfaq.de/advisory_2006-12-15.php"
},
{
"name": "ADV-2007-0077",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0077"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "20060523 Re: Microsoft Internet Explorer - Crash on mouse button click",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434903/30/4800/threaded"
},
{
"name": "20060605 Re: [Full Disclosure] [Kil13r-SA-20060520] Microsoft Internet Explorer Crash Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435990"
},
{
"name": "20060525 Re: Microsoft Internet Explorer - Crash on mouse button click",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435168/30/4680/threaded"
},
{ {
"name": "20060520 Microsoft Internet Explorer - Crash on mouse button click", "name": "20060520 Microsoft Internet Explorer - Crash on mouse button click",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -62,25 +77,10 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435004/30/4740/threaded" "url": "http://www.securityfocus.com/archive/1/435004/30/4740/threaded"
}, },
{
"name" : "20060523 Re: Microsoft Internet Explorer - Crash on mouse button click",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/434903/30/4800/threaded"
},
{ {
"name": "20060524 Re: Microsoft Internet Explorer - Crash on mouse button click", "name": "20060524 Re: Microsoft Internet Explorer - Crash on mouse button click",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435147/30/4680/threaded" "url": "http://www.securityfocus.com/archive/1/435147/30/4680/threaded"
},
{
"name" : "20060525 Re: Microsoft Internet Explorer - Crash on mouse button click",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/435168/30/4680/threaded"
},
{
"name" : "20060605 Re: [Full Disclosure] [Kil13r-SA-20060520] Microsoft Internet Explorer Crash Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/435990"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0355", "ID": "CVE-2011-0355",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "43084",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43084"
},
{ {
"name": "20110208 VMSA-2011-0002 Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi", "name": "20110208 VMSA-2011-0002 Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516259/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/516259/100/0/threaded"
}, },
{ {
"name" : "[security-announce] 20110207 VMSA-2011-0002 Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi", "name": "cisco-nexus-packets-dos(65217)",
"refsource" : "MLIST", "refsource": "XF",
"url" : "http://lists.vmware.com/pipermail/security-announce/2011/000118.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65217"
},
{
"name" : "http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3_c/release/notes/n1000v_rn.html",
"refsource" : "CONFIRM",
"url" : "http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3_c/release/notes/n1000v_rn.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0002.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0002.html"
},
{
"name" : "46247",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46247"
},
{
"name" : "70837",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/70837"
}, },
{ {
"name": "1025030", "name": "1025030",
@ -88,9 +73,19 @@
"url": "http://securitytracker.com/id?1025030" "url": "http://securitytracker.com/id?1025030"
}, },
{ {
"name" : "43084", "name": "ADV-2011-0314",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/43084" "url": "http://www.vupen.com/english/advisories/2011/0314"
},
{
"name": "46247",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46247"
},
{
"name": "[security-announce] 20110207 VMSA-2011-0002 Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi",
"refsource": "MLIST",
"url": "http://lists.vmware.com/pipermail/security-announce/2011/000118.html"
}, },
{ {
"name": "8090", "name": "8090",
@ -98,19 +93,24 @@
"url": "http://securityreason.com/securityalert/8090" "url": "http://securityreason.com/securityalert/8090"
}, },
{ {
"name" : "ADV-2011-0314", "name": "70837",
"refsource" : "VUPEN", "refsource": "OSVDB",
"url" : "http://www.vupen.com/english/advisories/2011/0314" "url": "http://www.osvdb.org/70837"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0002.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0002.html"
},
{
"name": "http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3_c/release/notes/n1000v_rn.html",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3_c/release/notes/n1000v_rn.html"
}, },
{ {
"name": "ADV-2011-0315", "name": "ADV-2011-0315",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0315" "url": "http://www.vupen.com/english/advisories/2011/0315"
},
{
"name" : "cisco-nexus-packets-dos(65217)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65217"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-0707", "ID": "CVE-2011-0707",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,154 +53,154 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[mailman-announce] 20110213 Mailman Security Patch Announcement", "name": "ADV-2011-0487",
"refsource" : "MLIST", "refsource": "VUPEN",
"url" : "http://mail.python.org/pipermail/mailman-announce/2011-February/000157.html" "url": "http://www.vupen.com/english/advisories/2011/0487"
},
{
"name" : "[mailman-announce] 20110218 Mailman Security Patch Announcement",
"refsource" : "MLIST",
"url" : "http://mail.python.org/pipermail/mailman-announce/2011-February/000158.html"
},
{
"name" : "http://support.apple.com/kb/HT5002",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5002"
},
{
"name" : "APPLE-SA-2011-10-12-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name" : "DSA-2170",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2170"
},
{
"name" : "FEDORA-2011-2030",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056399.html"
}, },
{ {
"name": "FEDORA-2011-2102", "name": "FEDORA-2011-2102",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056387.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056387.html"
}, },
{
"name" : "FEDORA-2011-2125",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056363.html"
},
{
"name" : "MDVSA-2011:036",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:036"
},
{ {
"name": "RHSA-2011:0307", "name": "RHSA-2011:0307",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0307.html" "url": "http://www.redhat.com/support/errata/RHSA-2011-0307.html"
}, },
{
"name" : "RHSA-2011:0308",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0308.html"
},
{
"name" : "SUSE-SR:2011:009",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name" : "openSUSE-SU-2011:0424",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2011-05/msg00000.html"
},
{
"name" : "USN-1069-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1069-1"
},
{
"name" : "46464",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46464"
},
{ {
"name": "70936", "name": "70936",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/70936" "url": "http://osvdb.org/70936"
}, },
{
"name" : "1025106",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025106"
},
{ {
"name": "43294", "name": "43294",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43294" "url": "http://secunia.com/advisories/43294"
}, },
{
"name" : "43389",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43389"
},
{
"name" : "43425",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43425"
},
{
"name" : "43549",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43549"
},
{
"name" : "43580",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43580"
},
{
"name" : "43829",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43829"
},
{
"name" : "ADV-2011-0435",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0435"
},
{
"name" : "ADV-2011-0436",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0436"
},
{
"name" : "ADV-2011-0460",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0460"
},
{
"name" : "ADV-2011-0487",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0487"
},
{
"name" : "ADV-2011-0542",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0542"
},
{ {
"name": "ADV-2011-0720", "name": "ADV-2011-0720",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0720" "url": "http://www.vupen.com/english/advisories/2011/0720"
}, },
{
"name": "SUSE-SR:2011:009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "ADV-2011-0435",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0435"
},
{
"name": "ADV-2011-0460",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0460"
},
{
"name": "openSUSE-SU-2011:0424",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2011-05/msg00000.html"
},
{
"name": "DSA-2170",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2170"
},
{
"name": "[mailman-announce] 20110213 Mailman Security Patch Announcement",
"refsource": "MLIST",
"url": "http://mail.python.org/pipermail/mailman-announce/2011-February/000157.html"
},
{
"name": "USN-1069-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1069-1"
},
{
"name": "RHSA-2011:0308",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0308.html"
},
{
"name": "ADV-2011-0436",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0436"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "MDVSA-2011:036",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:036"
},
{
"name": "[mailman-announce] 20110218 Mailman Security Patch Announcement",
"refsource": "MLIST",
"url": "http://mail.python.org/pipermail/mailman-announce/2011-February/000158.html"
},
{
"name": "46464",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46464"
},
{
"name": "1025106",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025106"
},
{
"name": "43829",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43829"
},
{
"name": "43425",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43425"
},
{
"name": "ADV-2011-0542",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0542"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "43389",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43389"
},
{ {
"name": "mailman-fullname-xss(65538)", "name": "mailman-fullname-xss(65538)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65538" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65538"
},
{
"name": "FEDORA-2011-2125",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056363.html"
},
{
"name": "43580",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43580"
},
{
"name": "FEDORA-2011-2030",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056399.html"
},
{
"name": "43549",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43549"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-0718", "ID": "CVE-2011-0718",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=672159",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=672159"
},
{
"name" : "RHSA-2011:0300",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0300.html"
},
{ {
"name": "46528", "name": "46528",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/46528" "url": "http://www.securityfocus.com/bid/46528"
}, },
{
"name" : "1025116",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025116"
},
{
"name" : "43487",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43487"
},
{ {
"name": "ADV-2011-0491", "name": "ADV-2011-0491",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0491" "url": "http://www.vupen.com/english/advisories/2011/0491"
}, },
{
"name": "RHSA-2011:0300",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0300.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=672159",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=672159"
},
{
"name": "1025116",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025116"
},
{ {
"name": "rhnss-weak-security(65657)", "name": "rhnss-weak-security(65657)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65657" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65657"
},
{
"name": "43487",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43487"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "43247",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43247"
},
{ {
"name": "http://zerodayinitiative.com/advisories/ZDI-11-049/", "name": "http://zerodayinitiative.com/advisories/ZDI-11-049/",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21461514", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21461514",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21461514" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21461514"
},
{
"name" : "43247",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43247"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://src.chromium.org/viewvc/chrome?view=rev&revision=120113",
"refsource": "CONFIRM",
"url": "http://src.chromium.org/viewvc/chrome?view=rev&revision=120113"
},
{ {
"name": "http://code.google.com/p/chromium/issues/detail?id=112236", "name": "http://code.google.com/p/chromium/issues/detail?id=112236",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,25 +67,20 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html" "url": "http://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html"
}, },
{
"name": "48016",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48016"
},
{ {
"name": "http://googlechromereleases.blogspot.com/2012/02/dev-channel-update_10.html", "name": "http://googlechromereleases.blogspot.com/2012/02/dev-channel-update_10.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/02/dev-channel-update_10.html" "url": "http://googlechromereleases.blogspot.com/2012/02/dev-channel-update_10.html"
}, },
{
"name" : "http://src.chromium.org/viewvc/chrome?view=rev&revision=120113",
"refsource" : "CONFIRM",
"url" : "http://src.chromium.org/viewvc/chrome?view=rev&revision=120113"
},
{ {
"name": "oval:org.mitre.oval:def:15025", "name": "oval:org.mitre.oval:def:15025",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15025" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15025"
},
{
"name" : "48016",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48016"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3280", "ID": "CVE-2011-3280",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -57,15 +57,15 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6" "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
}, },
{
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource" : "MISC",
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
},
{ {
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/AdaptCMS_2.0.2_Beta", "name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/AdaptCMS_2.0.2_Beta",
"refsource": "MISC", "refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/AdaptCMS_2.0.2_Beta" "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/AdaptCMS_2.0.2_Beta"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2011-3912", "ID": "CVE-2011-3912",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://code.google.com/p/chromium/issues/detail?id=102359", "name": "oval:org.mitre.oval:def:14519",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://code.google.com/p/chromium/issues/detail?id=102359" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14519"
}, },
{ {
"name": "http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html", "name": "http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html",
@ -63,9 +63,9 @@
"url": "http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html" "url": "http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:14519", "name": "http://code.google.com/p/chromium/issues/detail?id=102359",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14519" "url": "http://code.google.com/p/chromium/issues/detail?id=102359"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4356", "ID": "CVE-2011-4356",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "46973",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46973"
},
{
"name": "50825",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50825"
},
{ {
"name": "https://github.com/ask/celery/blob/master/docs/sec/CELERYSA-0001.txt", "name": "https://github.com/ask/celery/blob/master/docs/sec/CELERYSA-0001.txt",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,16 +71,6 @@
"name": "https://github.com/ask/celery/pull/544", "name": "https://github.com/ask/celery/pull/544",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/ask/celery/pull/544" "url": "https://github.com/ask/celery/pull/544"
},
{
"name" : "50825",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/50825"
},
{
"name" : "46973",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46973"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-4980", "ID": "CVE-2011-4980",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1186", "ID": "CVE-2013-1186",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.citrix.com/article/CTX138633",
"refsource" : "CONFIRM",
"url" : "http://support.citrix.com/article/CTX138633"
},
{ {
"name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00035&languageid=en-fr", "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00035&languageid=en-fr",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00035&languageid=en-fr" "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00035&languageid=en-fr"
},
{
"name": "http://support.citrix.com/article/CTX138633",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX138633"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5768", "ID": "CVE-2013-5768",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-2451", "ID": "CVE-2014-2451",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2014-2600", "ID": "CVE-2014-2600",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,12 +53,12 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBGN02986", "name": "SSRT101450",
"refsource": "HP", "refsource": "HP",
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04214298" "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04214298"
}, },
{ {
"name" : "SSRT101450", "name": "HPSBGN02986",
"refsource": "HP", "refsource": "HP",
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04214298" "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04214298"
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-2793", "ID": "CVE-2014-2793",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-6533", "ID": "CVE-2014-6533",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"name" : "70537",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70537"
},
{ {
"name": "1031043", "name": "1031043",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -71,6 +61,16 @@
"name": "61721", "name": "61721",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61721" "url": "http://secunia.com/advisories/61721"
},
{
"name": "70537",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70537"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6651", "ID": "CVE-2014-6651",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#886537",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/886537"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#886537", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/886537" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6869", "ID": "CVE-2014-6869",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#703849",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/703849"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#703849", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/703849" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7314", "ID": "CVE-2014-7314",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#991521",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/991521"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#991521", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/991521" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0065" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0065"
}, },
{
"name" : "96648",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96648"
},
{ {
"name": "1038006", "name": "1038006",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038006" "url": "http://www.securitytracker.com/id/1038006"
},
{
"name": "96648",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96648"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-07-05T00:00:00", "DATE_PUBLIC": "2017-07-05T00:00:00",
"ID": "CVE-2017-0672", "ID": "CVE-2017-0672",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-08-07T00:00:00", "DATE_PUBLIC": "2017-08-07T00:00:00",
"ID": "CVE-2017-0746", "ID": "CVE-2017-0746",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-05-06T20:43:28.278042", "DATE_ASSIGNED": "2017-05-06T20:43:28.278042",
"ID": "CVE-2017-1000028", "ID": "CVE-2017-1000028",
"REQUESTER": "pkarolak@trustwave.com", "REQUESTER": "pkarolak@trustwave.com",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "GlassFish Server Open Source Edition", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "4.1" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Oracle Corporation" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Directory Traversal" "value": "n/a"
} }
] ]
} }
@ -54,16 +54,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "45196",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45196/"
},
{ {
"name": "45198", "name": "45198",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45198/" "url": "https://www.exploit-db.com/exploits/45198/"
}, },
{
"name": "45196",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45196/"
},
{ {
"name": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-016/?fid=6904", "name": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-016/?fid=6904",
"refsource": "MISC", "refsource": "MISC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.463684", "DATE_ASSIGNED": "2017-08-22T17:29:33.463684",
"ID": "CVE-2017-1000235", "ID": "CVE-2017-1000235",
"REQUESTER": "j.singh@sec-consult.com", "REQUESTER": "j.singh@sec-consult.com",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "I, Librarian", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "<=4.6 & 4.7" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "I, Librarian" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "OS Command Injection" "value": "n/a"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20180209 [SECURITY] [DLA 1273-1] simplesamlphp security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/02/msg00008.html"
},
{ {
"name": "https://simplesamlphp.org/security/201709-01", "name": "https://simplesamlphp.org/security/201709-01",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://simplesamlphp.org/security/201709-01" "url": "https://simplesamlphp.org/security/201709-01"
}, },
{
"name": "[debian-lts-announce] 20180209 [SECURITY] [DLA 1273-1] simplesamlphp security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00008.html"
},
{ {
"name": "DSA-4127", "name": "DSA-4127",
"refsource": "DEBIAN", "refsource": "DEBIAN",

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20190131 [SECURITY] [DLA 1653-1] postgis security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00030.html"
},
{ {
"name": "https://trac.osgeo.org/postgis/changeset/15444", "name": "https://trac.osgeo.org/postgis/changeset/15444",
"refsource": "MISC", "refsource": "MISC",
@ -67,6 +62,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://trac.osgeo.org/postgis/changeset/15445" "url": "https://trac.osgeo.org/postgis/changeset/15445"
}, },
{
"name": "[debian-lts-announce] 20190131 [SECURITY] [DLA 1653-1] postgis security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00030.html"
},
{ {
"name": "https://trac.osgeo.org/postgis/ticket/3704", "name": "https://trac.osgeo.org/postgis/ticket/3704",
"refsource": "MISC", "refsource": "MISC",

View File

@ -71,11 +71,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/136152",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/136152"
},
{ {
"name": "http://www.ibm.com/support/docview.wss?uid=swg22012396", "name": "http://www.ibm.com/support/docview.wss?uid=swg22012396",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -86,6 +81,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103679" "url": "http://www.securityfocus.com/bid/103679"
}, },
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/136152",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/136152"
},
{ {
"name": "1040623", "name": "1040623",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1853", "ID": "CVE-2017-1853",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1981", "ID": "CVE-2017-1981",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4547", "ID": "CVE-2017-4547",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4656", "ID": "CVE-2017-4656",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4657", "ID": "CVE-2017-4657",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4759", "ID": "CVE-2017-4759",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4824", "ID": "CVE-2017-4824",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {