"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 21:38:28 +00:00
parent 523431e023
commit 5360620792
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
51 changed files with 4275 additions and 4275 deletions

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060201 Blackboard Authentication Error",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/423654/100/0/threaded"
},
{
"name" : "20060201 Re: Blackboard Authentication Error",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/423686/100/0/threaded"
"name": "16438",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16438"
},
{
"name": "20060202 Re: Blackboard Authentication Error",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/archive/1/423778/100/0/threaded"
},
{
"name" : "16438",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16438"
"name": "20060201 Re: Blackboard Authentication Error",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/423686/100/0/threaded"
},
{
"name": "20060201 Blackboard Authentication Error",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/423654/100/0/threaded"
},
{
"name": "28023",

View File

@ -53,39 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20060224 [eVuln] Guestex XSS Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/426034/100/0/threaded"
},
{
"name" : "http://www.evuln.com/vulns/77/summary.html",
"refsource" : "MISC",
"url" : "http://www.evuln.com/vulns/77/summary.html"
"name": "18927",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18927"
},
{
"name": "16711",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16711"
},
{
"name" : "ADV-2006-0640",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0640"
},
{
"name" : "23182",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23182"
},
{
"name": "1015678",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015678"
},
{
"name" : "18927",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18927"
"name": "http://www.evuln.com/vulns/77/summary.html",
"refsource": "MISC",
"url": "http://www.evuln.com/vulns/77/summary.html"
},
{
"name": "guestex-script-xss(24644)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24644"
},
{
"name": "490",
@ -93,9 +83,19 @@
"url": "http://securityreason.com/securityalert/490"
},
{
"name" : "guestex-script-xss(24644)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24644"
"name": "23182",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23182"
},
{
"name": "ADV-2006-0640",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0640"
},
{
"name": "20060224 [eVuln] Guestex XSS Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/426034/100/0/threaded"
}
]
}

View File

@ -53,19 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20060705 Re: phpSysInfo arbitrary file identification",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0066.html"
"name": "1016440",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016440"
},
{
"name" : "20060705 phpSysInfo arbitrary file identification",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0065.html"
},
{
"name" : "18868",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18868"
"name": "phpsysinfo-lng-information-disclosure(27527)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27527"
},
{
"name": "ADV-2006-2668",
@ -77,20 +72,25 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27015"
},
{
"name" : "1016440",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016440"
},
{
"name": "20939",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20939"
},
{
"name" : "phpsysinfo-lng-information-disclosure(27527)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27527"
"name": "20060705 Re: phpSysInfo arbitrary file identification",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0066.html"
},
{
"name": "18868",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18868"
},
{
"name": "20060705 phpSysInfo arbitrary file identification",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0065.html"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20060704 Re: file include exploits in randshop v1.2",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/439063/100/0/threaded"
"name": "18809",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18809"
},
{
"name": "20060704 file include exploits in randshop v1.2",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/439040/100/0/threaded"
},
{
"name" : "18809",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18809"
},
{
"name": "1016438",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016438"
},
{
"name": "20060704 Re: file include exploits in randshop v1.2",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/439063/100/0/threaded"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://lostmon.blogspot.com/2006/07/multiple-vulnerabilities-in.html",
"refsource" : "MISC",
"url" : "http://lostmon.blogspot.com/2006/07/multiple-vulnerabilities-in.html"
},
{
"name" : "18840",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18840"
},
{
"name" : "ADV-2006-2690",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2690"
},
{
"name": "27016",
"refsource": "OSVDB",
@ -77,10 +62,25 @@
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016439"
},
{
"name": "18840",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18840"
},
{
"name": "http://lostmon.blogspot.com/2006/07/multiple-vulnerabilities-in.html",
"refsource": "MISC",
"url": "http://lostmon.blogspot.com/2006/07/multiple-vulnerabilities-in.html"
},
{
"name": "20959",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20959"
},
{
"name": "ADV-2006-2690",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2690"
}
]
}

View File

@ -53,15 +53,120 @@
"references": {
"reference_data": [
{
"name" : "20060725 TSRT-06-03: eIQnetworks Enterprise Security Analyzer Syslog Server Buffer Overflow Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/441200/100/0/threaded"
"name": "http://www.tippingpoint.com/security/advisories/TSRT-06-07.html",
"refsource": "MISC",
"url": "http://www.tippingpoint.com/security/advisories/TSRT-06-07.html"
},
{
"name": "19167",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19167"
},
{
"name": "http://www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf",
"refsource": "CONFIRM",
"url": "http://www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf"
},
{
"name": "21218",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21218"
},
{
"name": "ADV-2006-3007",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3007"
},
{
"name": "27526",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27526"
},
{
"name": "eiqnetworks-esa-syslog-string-bo(27950)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27950"
},
{
"name": "21217",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21217"
},
{
"name": "27527",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27527"
},
{
"name": "1016580",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016580"
},
{
"name": "http://www.tippingpoint.com/security/advisories/TSRT-06-03.html",
"refsource": "MISC",
"url": "http://www.tippingpoint.com/security/advisories/TSRT-06-03.html"
},
{
"name": "19163",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19163"
},
{
"name": "ADV-2006-2985",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2985"
},
{
"name": "20060725 TSRT-06-04: eIQnetworks Enterprise Security Analyzer Topology Server Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/441198/100/0/threaded"
},
{
"name": "21215",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21215"
},
{
"name": "20060725 ZDI-06-024: eIQNetworks Enterprise Security Analyzer License Manager Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/441195/100/0/threaded"
},
{
"name": "ADV-2006-3008",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3008"
},
{
"name": "eiqnetworks-esa-topology-bo(27953)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27953"
},
{
"name": "27528",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27528"
},
{
"name": "21211",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21211"
},
{
"name": "19164",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19164"
},
{
"name": "VU#513068",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/513068"
},
{
"name": "20060725 TSRT-06-03: eIQnetworks Enterprise Security Analyzer Syslog Server Buffer Overflow Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/441200/100/0/threaded"
},
{
"name": "20060808 TSRT-06-07: eIQnetworks Enterprise Security Analyzer Monitoring Agent Buffer Overflow Vulnerabilities",
"refsource": "BUGTRAQ",
@ -73,9 +178,9 @@
"url": "http://www.securityfocus.com/archive/1/441197/100/0/threaded"
},
{
"name" : "20060725 ZDI-06-024: eIQNetworks Enterprise Security Analyzer License Manager Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/441195/100/0/threaded"
"name": "ADV-2006-3006",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3006"
},
{
"name": "http://www.tippingpoint.com/security/advisories/TSRT-06-04.html",
@ -83,149 +188,24 @@
"url": "http://www.tippingpoint.com/security/advisories/TSRT-06-04.html"
},
{
"name" : "http://www.tippingpoint.com/security/advisories/TSRT-06-07.html",
"refsource" : "MISC",
"url" : "http://www.tippingpoint.com/security/advisories/TSRT-06-07.html"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-06-023.html",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-06-023.html"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-06-024.html",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-06-024.html"
},
{
"name" : "http://www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf"
},
{
"name" : "http://www.tippingpoint.com/security/advisories/TSRT-06-03.html",
"refsource" : "MISC",
"url" : "http://www.tippingpoint.com/security/advisories/TSRT-06-03.html"
},
{
"name" : "VU#513068",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/513068"
},
{
"name" : "19163",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19163"
},
{
"name" : "19164",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19164"
"name": "21214",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21214"
},
{
"name": "19165",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19165"
},
{
"name" : "19167",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19167"
},
{
"name" : "ADV-2006-2985",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2985"
},
{
"name" : "ADV-2006-3007",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3007"
},
{
"name" : "ADV-2006-3010",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3010"
},
{
"name" : "ADV-2006-3006",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3006"
},
{
"name" : "ADV-2006-3008",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3008"
},
{
"name" : "ADV-2006-3009",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3009"
},
{
"name": "27525",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27525"
},
{
"name" : "27526",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27526"
},
{
"name" : "27527",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27527"
},
{
"name" : "27528",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27528"
},
{
"name" : "1016580",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016580"
},
{
"name" : "21211",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21211"
},
{
"name" : "21213",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21213"
},
{
"name" : "21217",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21217"
},
{
"name" : "21214",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21214"
},
{
"name" : "21215",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21215"
},
{
"name" : "21218",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21218"
},
{
"name" : "eiqnetworks-esa-syslog-string-bo(27950)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27950"
},
{
"name" : "eiqnetworks-esa-monitoring-bo(27954)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27954"
"name": "ADV-2006-3010",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3010"
},
{
"name": "eiqnetworks-esa-licensemanager-bo(27952)",
@ -238,9 +218,29 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27951"
},
{
"name" : "eiqnetworks-esa-topology-bo(27953)",
"name": "21213",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21213"
},
{
"name": "ADV-2006-3009",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3009"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-023.html",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-023.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-024.html",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-024.html"
},
{
"name": "eiqnetworks-esa-monitoring-bo(27954)",
"refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27953"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27954"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2006-3888",
"STATE": "PUBLIC"
},
@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20061011 AOL YGPPDownload SetAlbumName ActiveX Control Buffer Overflow Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=420"
},
{
"name" : "http://www.kb.cert.org/vuls/id/MIMG-6MUUJ8",
"refsource" : "CONFIRM",
"url" : "http://www.kb.cert.org/vuls/id/MIMG-6MUUJ8"
},
{
"name" : "VU#661524",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/661524"
},
{
"name" : "20425",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20425"
"name": "ADV-2006-3967",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3967"
},
{
"name": "20472",
@ -78,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/20472"
},
{
"name" : "ADV-2006-3967",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3967"
"name": "http://www.kb.cert.org/vuls/id/MIMG-6MUUJ8",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MIMG-6MUUJ8"
},
{
"name": "1017024",
@ -88,19 +73,34 @@
"url": "http://securitytracker.com/id?1017024"
},
{
"name" : "22304",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22304"
"name": "VU#661524",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/661524"
},
{
"name": "20061011 AOL YGPPDownload SetAlbumName ActiveX Control Buffer Overflow Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=420"
},
{
"name": "aol-ygp-pic-downloader-bo(29410)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29410"
},
{
"name": "20425",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20425"
},
{
"name": "aol-ygp-setalbumname-bo(29494)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29494"
},
{
"name": "22304",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22304"
}
]
}

View File

@ -53,19 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20060821 Diesel Paid Mail getad.php Cross-Site Scripting Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443929/100/0/threaded"
"name": "paidmail-getad-xss(28495)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28495"
},
{
"name" : "19646",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19646"
},
{
"name" : "ADV-2006-3352",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3352"
"name": "1452",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1452"
},
{
"name": "28072",
@ -78,14 +73,19 @@
"url": "http://secunia.com/advisories/21568"
},
{
"name" : "1452",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1452"
"name": "ADV-2006-3352",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3352"
},
{
"name" : "paidmail-getad-xss(28495)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28495"
"name": "20060821 Diesel Paid Mail getad.php Cross-Site Scripting Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443929/100/0/threaded"
},
{
"name": "19646",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19646"
}
]
}

View File

@ -53,19 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20061005 rPSA-2006-0182-1 php php-mysql php-pgsql",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/447866/100/0/threaded"
"name": "oval:org.mitre.oval:def:10121",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10121"
},
{
"name" : "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11",
"refsource" : "MISC",
"url" : "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11"
},
{
"name" : "http://www.php.net/ChangeLog-5.php#5.1.5",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php#5.1.5"
"name": "1016984",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016984"
},
{
"name": "http://www.php.net/release_5_1_5.php",
@ -78,24 +73,9 @@
"url": "https://issues.rpath.com/browse/RPL-683"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm"
},
{
"name" : "DSA-1206",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1206"
"name": "21768",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21768"
},
{
"name": "RHSA-2006:0669",
@ -103,15 +83,115 @@
"url": "http://www.redhat.com/support/errata/RHSA-2006-0669.html"
},
{
"name" : "RHSA-2006:0682",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0682.html"
"name": "22487",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22487"
},
{
"name": "USN-342-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-342-1"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm"
},
{
"name": "22039",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22039"
},
{
"name": "TLSA-2006-38",
"refsource": "TURBO",
"url": "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt"
},
{
"name": "RHSA-2006:0688",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0688.html"
},
{
"name": "DSA-1206",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1206"
},
{
"name": "19582",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19582"
},
{
"name": "22004",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22004"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm"
},
{
"name": "22538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22538"
},
{
"name": "22713",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22713"
},
{
"name": "RHSA-2006:0682",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0682.html"
},
{
"name": "21546",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21546"
},
{
"name": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11",
"refsource": "MISC",
"url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11"
},
{
"name": "22440",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22440"
},
{
"name": "20061005 rPSA-2006-0182-1 php php-mysql php-pgsql",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/447866/100/0/threaded"
},
{
"name": "22069",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22069"
},
{
"name": "ADV-2006-3318",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3318"
},
{
"name": "22225",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22225"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm"
},
{
"name": "http://www.php.net/ChangeLog-5.php#5.1.5",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php#5.1.5"
},
{
"name": "20061001-01-P",
"refsource": "SGI",
@ -121,86 +201,6 @@
"name": "SUSE-SA:2006:052",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_52_php.html"
},
{
"name" : "TLSA-2006-38",
"refsource" : "TURBO",
"url" : "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt"
},
{
"name" : "USN-342-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-342-1"
},
{
"name" : "19582",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19582"
},
{
"name" : "oval:org.mitre.oval:def:10121",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10121"
},
{
"name" : "ADV-2006-3318",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3318"
},
{
"name" : "1016984",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016984"
},
{
"name" : "21546",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21546"
},
{
"name" : "21768",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21768"
},
{
"name" : "22004",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22004"
},
{
"name" : "22069",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22069"
},
{
"name" : "22225",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22225"
},
{
"name" : "22440",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22440"
},
{
"name" : "22538",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22538"
},
{
"name" : "22487",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22487"
},
{
"name" : "22713",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22713"
},
{
"name" : "22039",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22039"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://cybozu.co.jp/products/dl/notice_060825/",
"refsource" : "CONFIRM",
"url" : "http://cybozu.co.jp/products/dl/notice_060825/"
},
{
"name": "JVN#90420168",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2390420168/index.html"
},
{
"name": "http://cybozu.co.jp/products/dl/notice_060825/",
"refsource": "CONFIRM",
"url": "http://cybozu.co.jp/products/dl/notice_060825/"
},
{
"name": "28262",
"refsource": "OSVDB",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "21269",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21269"
},
{
"name": "ADV-2006-4685",
"refsource": "VUPEN",
@ -66,6 +61,11 @@
"name": "23082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23082"
},
{
"name": "21269",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21269"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20061118 [MajorSecurity Advisory #36]dev4u CMS - Multiple SQL Injection and Cross Site Scripting Issues",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/452008/100/200/threaded"
},
{
"name": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls36",
"refsource": "MISC",
"url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls36"
},
{
"name" : "21170",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21170"
},
{
"name": "dev4ucms-index-sql-injection(30395)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30395"
},
{
"name": "20061118 [MajorSecurity Advisory #36]dev4u CMS - Multiple SQL Injection and Cross Site Scripting Issues",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/452008/100/200/threaded"
},
{
"name": "21170",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21170"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2208",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2010-1636",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1636"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-15.html",
"refsource": "CONFIRM",
@ -62,20 +67,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41244"
},
{
"name" : "oval:org.mitre.oval:def:7188",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7188"
},
{
"name": "1024159",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024159"
},
{
"name" : "ADV-2010-1636",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1636"
"name": "oval:org.mitre.oval:def:7188",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7188"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "14260",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/14260"
},
{
"name": "66155",
"refsource": "OSVDB",
"url": "http://osvdb.org/66155"
},
{
"name" : "ADV-2010-1766",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1766"
"name": "14260",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14260"
},
{
"name": "sijio-parent-sql-injection(60177)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60177"
},
{
"name": "ADV-2010-1766",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1766"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2861",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2010-3905",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://open.eucalyptus.com/wiki/esa-01",
"refsource" : "CONFIRM",
"url" : "http://open.eucalyptus.com/wiki/esa-01"
"name": "45462",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45462"
},
{
"name": "USN-1033-1",
@ -63,34 +63,34 @@
"url": "http://www.ubuntu.com/usn/USN-1033-1"
},
{
"name" : "45462",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/45462"
},
{
"name" : "42632",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42632"
"name": "eucalyptus-adminui-security-bypass(64167)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64167"
},
{
"name": "42666",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42666"
},
{
"name" : "ADV-2010-3259",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/3259"
},
{
"name": "ADV-2010-3260",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3260"
},
{
"name" : "eucalyptus-adminui-security-bypass(64167)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64167"
"name": "42632",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42632"
},
{
"name": "http://open.eucalyptus.com/wiki/esa-01",
"refsource": "CONFIRM",
"url": "http://open.eucalyptus.com/wiki/esa-01"
},
{
"name": "ADV-2010-3259",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3259"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0256",
"STATE": "PUBLIC"
},

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20110118 AST-2011-001: Stack buffer overflow in SIP channel driver",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/515781/100/0/threaded"
},
{
"name" : "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff",
"refsource" : "MISC",
"url" : "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff"
},
{
"name" : "http://downloads.asterisk.org/pub/security/AST-2011-001.html",
"refsource" : "CONFIRM",
"url" : "http://downloads.asterisk.org/pub/security/AST-2011-001.html"
},
{
"name" : "DSA-2171",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2171"
"name": "ADV-2011-0159",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0159"
},
{
"name": "FEDORA-2011-0794",
@ -78,29 +63,9 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html"
},
{
"name" : "FEDORA-2011-0774",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html"
},
{
"name" : "45839",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/45839"
},
{
"name" : "70518",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/70518"
},
{
"name" : "43119",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43119"
},
{
"name" : "42935",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42935"
"name": "http://downloads.asterisk.org/pub/security/AST-2011-001.html",
"refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2011-001.html"
},
{
"name": "43373",
@ -108,9 +73,19 @@
"url": "http://secunia.com/advisories/43373"
},
{
"name" : "ADV-2011-0159",
"name": "ADV-2011-0449",
"refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0159"
"url": "http://www.vupen.com/english/advisories/2011/0449"
},
{
"name": "70518",
"refsource": "OSVDB",
"url": "http://osvdb.org/70518"
},
{
"name": "45839",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45839"
},
{
"name": "ADV-2011-0281",
@ -118,14 +93,39 @@
"url": "http://www.vupen.com/english/advisories/2011/0281"
},
{
"name" : "ADV-2011-0449",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0449"
"name": "FEDORA-2011-0774",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html"
},
{
"name": "DSA-2171",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2171"
},
{
"name": "43119",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43119"
},
{
"name": "asterisk-asturiencode-bo(64831)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64831"
},
{
"name": "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff",
"refsource": "MISC",
"url": "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff"
},
{
"name": "20110118 AST-2011-001: Stack buffer overflow in SIP channel driver",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/515781/100/0/threaded"
},
{
"name": "42935",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42935"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1166",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-1_Host_crash_due_to_failure_to_correctly_validate_PV_kernel_execution_state."
},
{
"name" : "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource" : "CONFIRM",
"url" : "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"name": "RHSA-2011:0833",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"name": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "CONFIRM",
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1591",
"STATE": "PUBLIC"
},
@ -57,6 +57,31 @@
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/17185"
},
{
"name": "wireshark-dect-bo(66834)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66834"
},
{
"name": "MDVSA-2011:083",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:083"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836"
},
{
"name": "FEDORA-2011-5621",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058900.html"
},
{
"name": "FEDORA-2011-5529",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058993.html"
},
{
"name": "17195",
"refsource": "EXPLOIT-DB",
@ -68,29 +93,9 @@
"url": "http://openwall.com/lists/oss-security/2011/04/18/8"
},
{
"name" : "[oss-security] 20110418 Wireshark 1.2.16 / 1.4.5",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/04/18/2"
},
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2011-06.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2011-06.html"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838"
},
{
"name" : "FEDORA-2011-5529",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058993.html"
"name": "oval:org.mitre.oval:def:15000",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15000"
},
{
"name": "FEDORA-2011-5569",
@ -98,19 +103,9 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058983.html"
},
{
"name" : "FEDORA-2011-5621",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058900.html"
},
{
"name" : "MDVSA-2011:083",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:083"
},
{
"name" : "VU#243670",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/243670"
"name": "44374",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44374"
},
{
"name": "71848",
@ -118,14 +113,14 @@
"url": "http://www.osvdb.org/71848"
},
{
"name" : "oval:org.mitre.oval:def:15000",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15000"
"name": "http://www.wireshark.org/security/wnpa-sec-2011-06.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2011-06.html"
},
{
"name" : "1025389",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1025389"
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838"
},
{
"name": "44172",
@ -133,24 +128,29 @@
"url": "http://secunia.com/advisories/44172"
},
{
"name" : "44374",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44374"
"name": "1025389",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025389"
},
{
"name": "ADV-2011-1022",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1022"
},
{
"name": "VU#243670",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/243670"
},
{
"name": "[oss-security] 20110418 Wireshark 1.2.16 / 1.4.5",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/04/18/2"
},
{
"name": "ADV-2011-1106",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1106"
},
{
"name" : "wireshark-dect-bo(66834)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66834"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-1969",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "MS11-079",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-079"
},
{
"name": "49983",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49983"
},
{
"name": "MS11-079",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-079"
},
{
"name": "oval:org.mitre.oval:def:13032",
"refsource": "OVAL",

View File

@ -62,15 +62,15 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/78009"
},
{
"name" : "47139",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/47139"
},
{
"name": "obm-test-information-disclosure(71924)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71924"
},
{
"name": "47139",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47139"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-2965",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "68143",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68143"
},
{
"name": "VU#849500",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/849500"
},
{
"name": "20140623 SpamTitan contains a reflected cross-site scripting (XSS) vulnerability CVE-2014-2965",
"refsource": "FULLDISC",
@ -61,16 +71,6 @@
"name": "http://packetstormsecurity.com/files/127184/SpamTitan-6.01-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127184/SpamTitan-6.01-Cross-Site-Scripting.html"
},
{
"name" : "VU#849500",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/849500"
},
{
"name" : "68143",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68143"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3293",
"STATE": "PUBLIC"
},
@ -57,25 +57,25 @@
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36195"
},
{
"name" : "20141027 Cisco ASR901 Crafted IPv4 Packet Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3293"
},
{
"name": "70744",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70744"
},
{
"name": "61830",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61830"
},
{
"name": "1031122",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031122"
},
{
"name" : "61830",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/61830"
"name": "20141027 Cisco ASR901 Crafted IPv4 Packet Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3293"
},
{
"name": "cisco-asr901-cve20143293-dos(97769)",

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/",
"refsource" : "MISC",
"url" : "http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/"
},
{
"name" : "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=360448",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=360448"
},
{
"name": "https://src.chromium.org/viewvc/blink?revision=171373&view=revision",
"refsource": "CONFIRM",
@ -77,10 +62,25 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67582"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=360448",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=360448"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
},
{
"name": "60372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60372"
},
{
"name": "http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/",
"refsource": "MISC",
"url": "http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name": "70204",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70204"
},
{
"name": "20141001 Cross-Site Scripting (XSS) in Photo Gallery WordPress plugin",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533595/100/0/threaded"
},
{
"name" : "http://packetstormsecurity.com/files/128518/WordPress-Photo-Gallery-1.1.30-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/128518/WordPress-Photo-Gallery-1.1.30-Cross-Site-Scripting.html"
"name": "wp-photogallery-cve20146315-xss(96799)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96799"
},
{
"name": "https://www.htbridge.com/advisory/HTB23232",
"refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23232"
},
{
"name": "http://packetstormsecurity.com/files/128518/WordPress-Photo-Gallery-1.1.30-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128518/WordPress-Photo-Gallery-1.1.30-Cross-Site-Scripting.html"
},
{
"name": "https://plugins.trac.wordpress.org/changeset?new=986500",
"refsource": "CONFIRM",
"url": "https://plugins.trac.wordpress.org/changeset?new=986500"
},
{
"name" : "70204",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70204"
},
{
"name": "61649",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61649"
},
{
"name" : "wp-photogallery-cve20146315-xss(96799)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/96799"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-6360",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6754",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#159481",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6763",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#590065",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/590065"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#590065",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/590065"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6865",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#518257",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7070",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#301249",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7456",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#415737",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7475",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#975417",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/975417"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#975417",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/975417"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7721",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#949633",
"refsource": "CERT-VN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-8638",
"STATE": "PUBLIC"
},
@ -52,90 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2015-03.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2015-03.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1080987",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1080987"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name" : "http://linux.oracle.com/errata/ELSA-2015-0046.html",
"refsource" : "CONFIRM",
"url" : "http://linux.oracle.com/errata/ELSA-2015-0046.html"
},
{
"name" : "http://linux.oracle.com/errata/ELSA-2015-0047.html",
"refsource" : "CONFIRM",
"url" : "http://linux.oracle.com/errata/ELSA-2015-0047.html"
},
{
"name" : "DSA-3127",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3127"
},
{
"name" : "DSA-3132",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3132"
},
{
"name" : "GLSA-201504-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "RHSA-2015:0046",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0046.html"
},
{
"name" : "RHSA-2015:0047",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0047.html"
"name": "62242",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62242"
},
{
"name" : "openSUSE-SU-2015:0133",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html"
},
{
"name" : "openSUSE-SU-2015:0077",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html"
},
{
"name" : "openSUSE-SU-2015:0192",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html"
},
{
"name" : "SUSE-SU-2015:0171",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html"
},
{
"name" : "SUSE-SU-2015:0173",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html"
},
{
"name" : "SUSE-SU-2015:0180",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html"
},
{
"name" : "openSUSE-SU-2015:1266",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
"name": "1031533",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031533"
},
{
"name": "USN-2460-1",
@ -148,64 +78,9 @@
"url": "http://www.securityfocus.com/bid/72047"
},
{
"name" : "1031533",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031533"
},
{
"name" : "1031534",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031534"
},
{
"name" : "62237",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62237"
},
{
"name" : "62242",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62242"
},
{
"name" : "62250",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62250"
},
{
"name" : "62446",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62446"
},
{
"name" : "62657",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62657"
},
{
"name" : "62790",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62790"
},
{
"name" : "62253",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62253"
},
{
"name" : "62273",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62273"
},
{
"name" : "62274",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62274"
},
{
"name" : "62293",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62293"
"name": "openSUSE-SU-2015:0192",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html"
},
{
"name": "62304",
@ -213,19 +88,9 @@
"url": "http://secunia.com/advisories/62304"
},
{
"name" : "62313",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62313"
},
{
"name" : "62315",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62315"
},
{
"name" : "62316",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62316"
"name": "http://linux.oracle.com/errata/ELSA-2015-0047.html",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2015-0047.html"
},
{
"name": "62259",
@ -233,19 +98,154 @@
"url": "http://secunia.com/advisories/62259"
},
{
"name" : "62283",
"name": "62250",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/62283"
"url": "http://secunia.com/advisories/62250"
},
{
"name": "SUSE-SU-2015:0173",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html"
},
{
"name": "62237",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62237"
},
{
"name": "openSUSE-SU-2015:0077",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html"
},
{
"name": "62418",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62418"
},
{
"name": "SUSE-SU-2015:0171",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1080987",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1080987"
},
{
"name": "62316",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62316"
},
{
"name": "DSA-3132",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3132"
},
{
"name": "62274",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62274"
},
{
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "62313",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62313"
},
{
"name": "RHSA-2015:0047",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0047.html"
},
{
"name": "http://www.mozilla.org/security/announce/2014/mfsa2015-03.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2015-03.html"
},
{
"name": "62790",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62790"
},
{
"name": "62293",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62293"
},
{
"name": "62283",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62283"
},
{
"name": "firefox-cve20148638-csrf(99958)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99958"
},
{
"name": "62446",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62446"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name": "62657",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62657"
},
{
"name": "62273",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62273"
},
{
"name": "openSUSE-SU-2015:0133",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html"
},
{
"name": "openSUSE-SU-2015:1266",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
},
{
"name": "DSA-3127",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3127"
},
{
"name": "SUSE-SU-2015:0180",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html"
},
{
"name": "62315",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62315"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2015-0046.html",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2015-0046.html"
},
{
"name": "62253",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62253"
},
{
"name": "1031534",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031534"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-2812",
"STATE": "PUBLIC"
},
@ -53,9 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-42.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-42.html"
"name": "openSUSE-SU-2016:1211",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html"
},
{
"name": "1035692",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035692"
},
{
"name": "openSUSE-SU-2016:1251",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html"
},
{
"name": "USN-2936-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2936-2"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1261776",
@ -68,34 +83,19 @@
"url": "https://security.gentoo.org/glsa/201701-15"
},
{
"name" : "openSUSE-SU-2016:1211",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html"
},
{
"name" : "openSUSE-SU-2016:1251",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html"
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-42.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-42.html"
},
{
"name": "USN-2936-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2936-1"
},
{
"name" : "USN-2936-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2936-2"
},
{
"name": "USN-2936-3",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2936-3"
},
{
"name" : "1035692",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035692"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-2814",
"STATE": "PUBLIC"
},
@ -53,54 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-44.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-44.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1254721",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1254721"
"name": "openSUSE-SU-2016:1211",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name" : "DSA-3559",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3559"
},
{
"name" : "GLSA-201701-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-15"
},
{
"name": "RHSA-2016:0695",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0695.html"
},
{
"name" : "openSUSE-SU-2016:1211",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html"
},
{
"name" : "SUSE-SU-2016:1258",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html"
},
{
"name" : "openSUSE-SU-2016:1251",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html"
},
{
"name" : "SUSE-SU-2016:1352",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html"
"name": "1035692",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035692"
},
{
"name": "SUSE-SU-2016:1374",
@ -108,24 +78,54 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html"
},
{
"name" : "USN-2936-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2936-1"
"name": "openSUSE-SU-2016:1251",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html"
},
{
"name": "USN-2936-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2936-2"
},
{
"name": "SUSE-SU-2016:1352",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html"
},
{
"name": "GLSA-201701-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-15"
},
{
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-44.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-44.html"
},
{
"name": "DSA-3559",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3559"
},
{
"name": "USN-2936-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2936-1"
},
{
"name": "USN-2936-3",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2936-3"
},
{
"name" : "1035692",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035692"
"name": "SUSE-SU-2016:1258",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1254721",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1254721"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2016-2914",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988263",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988263"
},
{
"name": "92334",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92334"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988263",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988263"
}
]
}

View File

@ -56,6 +56,11 @@
},
"references": {
"reference_data": [
{
"name": "100214",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100214"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/126684",
"refsource": "MISC",
@ -65,11 +70,6 @@
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006647",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22006647"
},
{
"name" : "100214",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/100214"
}
]
}