"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:19:42 +00:00
parent e6e834e219
commit 5574fcb5dc
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 4449 additions and 4449 deletions

View File

@ -57,25 +57,25 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/420667/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/4/summary.html",
"refsource" : "MISC",
"url" : "http://evuln.com/vulns/4/summary.html"
},
{
"name": "16112",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16112"
},
{
"name": "18270",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18270"
},
{
"name": "19087",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19087"
},
{
"name" : "18270",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18270"
"name": "http://evuln.com/vulns/4/summary.html",
"refsource": "MISC",
"url": "http://evuln.com/vulns/4/summary.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secteam@freebsd.org",
"ID": "CVE-2006-0381",
"STATE": "PUBLIC"
},
@ -52,31 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "FreeBSD-SA-06:07",
"refsource" : "FREEBSD",
"url" : "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:07.pf.asc"
},
{
"name" : "NetBSD-SA2006-004",
"refsource" : "NETBSD",
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-004.txt.asc"
},
{
"name" : "http://www.openbsd.org/cgi-bin/cvsweb/src/sys/net/pf_norm.c.diff?r1=1.103&r2=1.104",
"refsource" : "CONFIRM",
"url" : "http://www.openbsd.org/cgi-bin/cvsweb/src/sys/net/pf_norm.c.diff?r1=1.103&r2=1.104"
},
{
"name": "16375",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16375"
},
{
"name" : "22732",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22732"
},
{
"name": "1015542",
"refsource": "SECTRACK",
@ -91,6 +71,26 @@
"name": "bsd-pf-fragment-dos(24337)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24337"
},
{
"name": "FreeBSD-SA-06:07",
"refsource": "FREEBSD",
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:07.pf.asc"
},
{
"name": "22732",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22732"
},
{
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/sys/net/pf_norm.c.diff?r1=1.103&r2=1.104",
"refsource": "CONFIRM",
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/sys/net/pf_norm.c.diff?r1=1.103&r2=1.104"
},
{
"name": "NetBSD-SA2006-004",
"refsource": "NETBSD",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-004.txt.asc"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://aluigi.altervista.org/adv/csdos.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/csdos.txt"
},
{
"name": "16619",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "halflife-svcheckforduplicatenames-dos(33505)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33505"
},
{
"name": "http://aluigi.altervista.org/adv/csdos.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/csdos.txt"
}
]
}

View File

@ -53,29 +53,34 @@
"references": {
"reference_data": [
{
"name" : "20060408 phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2",
"refsource" : "SREASONRES",
"url" : "http://securityreason.com/achievement_securityalert/34"
"name": "675",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/675"
},
{
"name" : "[php-cvs] 20060330 cvs: php-src /ext/standard info.c",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=php-cvs&m=114374620416389&w=2"
"name": "19775",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19775"
},
{
"name" : "http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c",
"refsource" : "CONFIRM",
"url" : "http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c"
"name": "21252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21252"
},
{
"name" : "http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c?r1=1.260&r2=1.261",
"refsource" : "CONFIRM",
"url" : "http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c?r1=1.260&r2=1.261"
"name": "24484",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24484"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm"
"name": "20222",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20222"
},
{
"name": "20210",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20210"
},
{
"name": "http://www.php.net/ChangeLog-4.php#4.4.3",
@ -88,14 +93,9 @@
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm"
},
{
"name" : "GLSA-200605-08",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200605-08.xml"
},
{
"name" : "MDKSA-2006:074",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:074"
"name": "17362",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17362"
},
{
"name": "RHSA-2006:0276",
@ -103,39 +103,14 @@
"url": "http://rhn.redhat.com/errata/RHSA-2006-0276.html"
},
{
"name" : "RHSA-2006:0501",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0501.html"
"name": "GLSA-200605-08",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200605-08.xml"
},
{
"name" : "RHSA-2006:0549",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2006-0549.html"
},
{
"name" : "20060501-01-U",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc"
},
{
"name" : "SUSE-SA:2006:024",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/05-05-2006.html"
},
{
"name" : "USN-320-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-320-1"
},
{
"name" : "17362",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17362"
},
{
"name" : "oval:org.mitre.oval:def:10997",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10997"
"name": "http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c?r1=1.260&r2=1.261",
"refsource": "CONFIRM",
"url": "http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c?r1=1.260&r2=1.261"
},
{
"name": "ADV-2006-1290",
@ -143,14 +118,14 @@
"url": "http://www.vupen.com/english/advisories/2006/1290"
},
{
"name" : "ADV-2006-2685",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2685"
"name": "USN-320-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-320-1"
},
{
"name" : "24484",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24484"
"name": "RHSA-2006:0501",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0501.html"
},
{
"name": "1015879",
@ -158,39 +133,9 @@
"url": "http://securitytracker.com/id?1015879"
},
{
"name" : "19599",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19599"
},
{
"name" : "19832",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19832"
},
{
"name" : "20222",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20222"
},
{
"name" : "20951",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20951"
},
{
"name" : "21252",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21252"
},
{
"name" : "21564",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21564"
},
{
"name" : "19775",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19775"
"name": "20060408 phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2",
"refsource": "SREASONRES",
"url": "http://securityreason.com/achievement_securityalert/34"
},
{
"name": "19979",
@ -198,14 +143,14 @@
"url": "http://secunia.com/advisories/19979"
},
{
"name" : "20052",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20052"
"name": "RHSA-2006:0549",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0549.html"
},
{
"name" : "20210",
"name": "20951",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/20210"
"url": "http://secunia.com/advisories/20951"
},
{
"name": "21125",
@ -213,14 +158,69 @@
"url": "http://secunia.com/advisories/21125"
},
{
"name" : "675",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/675"
"name": "oval:org.mitre.oval:def:10997",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10997"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm"
},
{
"name": "19599",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19599"
},
{
"name": "MDKSA-2006:074",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:074"
},
{
"name": "19832",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19832"
},
{
"name": "20060501-01-U",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc"
},
{
"name": "http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c",
"refsource": "CONFIRM",
"url": "http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c"
},
{
"name": "20052",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20052"
},
{
"name": "21564",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21564"
},
{
"name": "php-phpinfo-long-array-xss(25702)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25702"
},
{
"name": "ADV-2006-2685",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2685"
},
{
"name": "SUSE-SA:2006:024",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/05-05-2006.html"
},
{
"name": "[php-cvs] 20060330 cvs: php-src /ext/standard info.c",
"refsource": "MLIST",
"url": "http://marc.info/?l=php-cvs&m=114374620416389&w=2"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://www.blogcu.com/Liz0ziM/317250/",
"refsource": "MISC",
"url": "http://www.blogcu.com/Liz0ziM/317250/"
},
{
"name": "20060309 PHP Upload Center Download users password hashes And phpshell Upload",
"refsource": "BUGTRAQ",
@ -63,19 +68,14 @@
"url": "http://biyosecurity.be/bugs/phpuploadcenter2.txt"
},
{
"name" : "http://www.blogcu.com/Liz0ziM/317250/",
"refsource" : "MISC",
"url" : "http://www.blogcu.com/Liz0ziM/317250/"
"name": "23627",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23627"
},
{
"name": "http://www.scripts-by.net/PHP/File-Manipulation/php-upload-center.html",
"refsource": "MISC",
"url": "http://www.scripts-by.net/PHP/File-Manipulation/php-upload-center.html"
},
{
"name" : "23627",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23627"
}
]
}

View File

@ -52,21 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "19353",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19353"
},
{
"name": "24058",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24058"
},
{
"name": "http://xhp.targetit.ro/index.php?page=3&box_id=34&action=show_single_entry&post_id=10",
"refsource": "CONFIRM",
"url": "http://xhp.targetit.ro/index.php?page=3&box_id=34&action=show_single_entry&post_id=10"
},
{
"name" : "20060324 XHP vendor ack/fix",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2006-March/000649.html"
},
{
"name" : "1605",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1605"
},
{
"name": "17209",
"refsource": "BID",
@ -78,24 +78,24 @@
"url": "http://www.vupen.com/english/advisories/2006/1052"
},
{
"name" : "24058",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24058"
"name": "xhpcms-filemanager-file-upload(25399)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25399"
},
{
"name": "20060324 XHP vendor ack/fix",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2006-March/000649.html"
},
{
"name": "1605",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1605"
},
{
"name": "24059",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24059"
},
{
"name" : "19353",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19353"
},
{
"name" : "xhpcms-filemanager-file-upload(25399)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25399"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/428970/100/0/threaded"
},
{
"name" : "20060327 Re: Microsoft Windows XP SP2 Firewall issue",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/429111/100/0/threaded"
},
{
"name": "winxp-firewall-ads-bypass(25597)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25597"
},
{
"name": "20060327 Re: Microsoft Windows XP SP2 Firewall issue",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/429111/100/0/threaded"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "21604",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21604"
},
{
"name": "http://drupal.org/node/80084",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/80084"
},
{
"name" : "19675",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19675"
},
{
"name": "ADV-2006-3364",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3364"
},
{
"name" : "21604",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21604"
"name": "19675",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19675"
},
{
"name": "ecommerce-unspecified-xss(28528)",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20060817 Joomla RFİ ( ERNE )",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443674/100/100/threaded"
},
{
"name": "20060823 Re: Joomla RFİ ( ERNE )",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/444216/100/100/threaded"
},
{
"name": "20060817 Joomla RFİ ( ERNE )",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443674/100/100/threaded"
},
{
"name": "28097",
"refsource": "OSVDB",

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "2368",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2368"
},
{
"name" : "20030",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20030"
},
{
"name" : "20036",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20036"
"name": "teamcal-pro-footer-file-include(28956)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28956"
},
{
"name": "ADV-2006-3630",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3630"
},
{
"name": "20036",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20036"
},
{
"name": "2368",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2368"
},
{
"name": "21933",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21933"
},
{
"name" : "teamcal-pro-footer-file-include(28956)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28956"
"name": "20030",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20030"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2006-5470",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://elegerov.blogspot.com/2006/10/here-is-lame-proof-of-concept-code-for.html",
"refsource" : "MISC",
"url" : "http://elegerov.blogspot.com/2006/10/here-is-lame-proof-of-concept-code-for.html"
},
{
"name": "20713",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20713"
},
{
"name": "http://elegerov.blogspot.com/2006/10/here-is-lame-proof-of-concept-code-for.html",
"refsource": "MISC",
"url": "http://elegerov.blogspot.com/2006/10/here-is-lame-proof-of-concept-code-for.html"
},
{
"name": "22543",
"refsource": "SECUNIA",

View File

@ -52,40 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20061213 ZDI-06-050: Symantec Veritas NetBackup CONNECT_OPTIONS Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/454314/100/0/threaded"
},
{
"name" : "http://www.symantec.com/avcenter/security/Content/2006.12.13a.html",
"refsource" : "CONFIRM",
"url" : "http://www.symantec.com/avcenter/security/Content/2006.12.13a.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-050.html",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-050.html"
},
{
"name" : "VU#650432",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/650432"
},
{
"name" : "21565",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21565"
},
{
"name" : "ADV-2006-4999",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4999"
},
{
"name" : "1017379",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017379"
"name": "20061213 ZDI-06-050: Symantec Veritas NetBackup CONNECT_OPTIONS Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/454314/100/0/threaded"
},
{
"name": "23368",
@ -96,6 +71,31 @@
"name": "netbackup-connect-options-bo(30883)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30883"
},
{
"name": "1017379",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017379"
},
{
"name": "http://www.symantec.com/avcenter/security/Content/2006.12.13a.html",
"refsource": "CONFIRM",
"url": "http://www.symantec.com/avcenter/security/Content/2006.12.13a.html"
},
{
"name": "21565",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21565"
},
{
"name": "VU#650432",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/650432"
},
{
"name": "ADV-2006-4999",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4999"
}
]
}

View File

@ -58,35 +58,35 @@
"url": "http://www.securityfocus.com/archive/1/451374/100/0/threaded"
},
{
"name" : "http://aria-security.net/advisory/cpanel.txt",
"refsource" : "MISC",
"url" : "http://aria-security.net/advisory/cpanel.txt"
},
{
"name" : "21027",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21027"
"name": "30387",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/30387"
},
{
"name": "ADV-2006-4500",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4500"
},
{
"name": "http://aria-security.net/advisory/cpanel.txt",
"refsource": "MISC",
"url": "http://aria-security.net/advisory/cpanel.txt"
},
{
"name": "30386",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/30386"
},
{
"name" : "30387",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/30387"
},
{
"name": "22825",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22825"
},
{
"name": "21027",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21027"
},
{
"name": "1847",
"refsource": "SREASON",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-0237",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:7130",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7130"
},
{
"name": "MS10-021",
"refsource": "MS",
@ -63,19 +68,14 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA10-103A.html"
},
{
"name" : "oval:org.mitre.oval:def:7130",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7130"
"name": "39373",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39373"
},
{
"name": "1023850",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023850"
},
{
"name" : "39373",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39373"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20100225 Hacktics Advisory Feb10: XSS in IBM WebSphere Portal & Lotus WCM",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/509744/100/0/threaded"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21421469",
"refsource" : "MISC",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21421469"
},
{
"name": "http://www.hacktics.com/content/advisories/AdvIBM20100224.html",
"refsource": "MISC",
@ -71,6 +61,16 @@
"name": "ibm-login-phishing(56602)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56602"
},
{
"name": "20100225 Hacktics Advisory Feb10: XSS in IBM WebSphere Portal & Lotus WCM",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/509744/100/0/threaded"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21421469",
"refsource": "MISC",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21421469"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2239",
"STATE": "PUBLIC"
},
@ -53,34 +53,39 @@
"references": {
"reference_data": [
{
"name" : "http://libvirt.org/news.html",
"refsource" : "MISC",
"url" : "http://libvirt.org/news.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=607812",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=607812"
"name": "ADV-2010-2062",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2062"
},
{
"name": "FEDORA-2010-10960",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html"
},
{
"name": "USN-1008-2",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1008-2"
},
{
"name": "FEDORA-2010-11021",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=607812",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=607812"
},
{
"name": "RHSA-2010:0615",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0615.html"
},
{
"name" : "SUSE-SR:2010:017",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
"name": "http://libvirt.org/news.html",
"refsource": "MISC",
"url": "http://libvirt.org/news.html"
},
{
"name": "USN-1008-1",
@ -88,20 +93,15 @@
"url": "http://ubuntu.com/usn/usn-1008-1"
},
{
"name" : "USN-1008-2",
"refsource" : "UBUNTU",
"url" : "http://ubuntu.com/usn/usn-1008-2"
"name": "SUSE-SR:2010:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name": "USN-1008-3",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1008-3"
},
{
"name" : "ADV-2010-2062",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2062"
},
{
"name": "ADV-2010-2763",
"refsource": "VUPEN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-2566",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS10-049",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049"
},
{
"name": "TA10-222A",
"refsource": "CERT",
@ -66,6 +61,11 @@
"name": "oval:org.mitre.oval:def:11787",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11787"
},
{
"name": "MS10-049",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2010-3040",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-232/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-232/"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-233/",
"refsource": "MISC",
@ -68,9 +63,9 @@
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-234/"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-235/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-235/"
"name": "1024693",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024693"
},
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21726",
@ -78,14 +73,14 @@
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21726"
},
{
"name" : "44699",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/44699"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-232/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-232/"
},
{
"name" : "1024693",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1024693"
"name": "ADV-2010-2914",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2914"
},
{
"name": "42146",
@ -93,9 +88,14 @@
"url": "http://secunia.com/advisories/42146"
},
{
"name" : "ADV-2010-2914",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2914"
"name": "44699",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44699"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-235/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-235/"
}
]
}

View File

@ -57,25 +57,25 @@
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14741"
},
{
"name" : "http://blog.zoller.lu/2010/08/cve-2010-xn-loadlibrarygetprocaddress.html",
"refsource" : "MISC",
"url" : "http://blog.zoller.lu/2010/08/cve-2010-xn-loadlibrarygetprocaddress.html"
},
{
"name" : "oval:org.mitre.oval:def:6778",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6778"
},
{
"name": "41060",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41060"
},
{
"name": "http://blog.zoller.lu/2010/08/cve-2010-xn-loadlibrarygetprocaddress.html",
"refsource": "MISC",
"url": "http://blog.zoller.lu/2010/08/cve-2010-xn-loadlibrarygetprocaddress.html"
},
{
"name": "ADV-2010-2170",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2170"
},
{
"name": "oval:org.mitre.oval:def:6778",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6778"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598289",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598289"
"name": "FEDORA-2010-15628",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049184.html"
},
{
"name": "http://git.gnome.org/browse/gnome-subtitles/commit/?id=44370dc2a87f7fa0d6c9730979514bd407a37c65",
@ -63,14 +63,9 @@
"url": "http://git.gnome.org/browse/gnome-subtitles/commit/?id=44370dc2a87f7fa0d6c9730979514bd407a37c65"
},
{
"name" : "FEDORA-2010-15628",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049184.html"
},
{
"name" : "FEDORA-2010-15711",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049288.html"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598289",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598289"
},
{
"name": "FEDORA-2010-15717",
@ -81,6 +76,11 @@
"name": "41807",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41807"
},
{
"name": "FEDORA-2010-15711",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049288.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3712",
"STATE": "PUBLIC"
},
@ -52,15 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "http://joomlacode.org/gf/project/joomla/tracker/?action=TrackerItemEdit&tracker_id=32&tracker_item_id=22767",
"refsource": "CONFIRM",
"url": "http://joomlacode.org/gf/project/joomla/tracker/?action=TrackerItemEdit&tracker_id=32&tracker_item_id=22767"
},
{
"name": "[oss-security] 20110318 CVE Request: Joomla! 1.5.20 <= Cross Site Scripting (XSS) Vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/18/5"
},
{
"name": "[oss-security] 20101011 CVE request: joomla before 1.5.21 XSS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/10/08/4"
},
{
"name" : "[oss-security] 20101011 Re: CVE request: joomla before 1.5.21 XSS",
"name": "http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.5.20%5D_cross_site_scripting(XSS)",
"refsource": "MISC",
"url": "http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.5.20%5D_cross_site_scripting(XSS)"
},
{
"name": "[oss-security] 20110318 Re: CVE Request: Joomla! 1.6.0 | Cross Site Scripting (XSS) Vulnerability",
"refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/10/11/4"
"url": "http://www.openwall.com/lists/oss-security/2011/03/18/3"
},
{
"name": "http://developer.joomla.org/security/news/9-security/10-core-security/322-20101001-core-xss-vulnerabilities",
"refsource": "CONFIRM",
"url": "http://developer.joomla.org/security/news/9-security/10-core-security/322-20101001-core-xss-vulnerabilities"
},
{
"name": "[oss-security] 20110314 CVE Request: Joomla! 1.6.0 | Cross Site Scripting (XSS) Vulnerability",
@ -73,29 +93,9 @@
"url": "http://www.openwall.com/lists/oss-security/2011/03/14/22"
},
{
"name" : "[oss-security] 20110318 CVE Request: Joomla! 1.5.20 <= Cross Site Scripting (XSS) Vulnerability",
"name": "[oss-security] 20101011 Re: CVE request: joomla before 1.5.21 XSS",
"refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/03/18/5"
},
{
"name" : "[oss-security] 20110318 Re: CVE Request: Joomla! 1.6.0 | Cross Site Scripting (XSS) Vulnerability",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/03/18/3"
},
{
"name" : "http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.5.20%5D_cross_site_scripting(XSS)",
"refsource" : "MISC",
"url" : "http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.5.20%5D_cross_site_scripting(XSS)"
},
{
"name" : "http://developer.joomla.org/security/news/9-security/10-core-security/322-20101001-core-xss-vulnerabilities",
"refsource" : "CONFIRM",
"url" : "http://developer.joomla.org/security/news/9-security/10-core-security/322-20101001-core-xss-vulnerabilities"
},
{
"name" : "http://joomlacode.org/gf/project/joomla/tracker/?action=TrackerItemEdit&tracker_id=32&tracker_item_id=22767",
"refsource" : "CONFIRM",
"url" : "http://joomlacode.org/gf/project/joomla/tracker/?action=TrackerItemEdit&tracker_id=32&tracker_item_id=22767"
"url": "http://www.openwall.com/lists/oss-security/2010/10/11/4"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3870",
"STATE": "PUBLIC"
},
@ -52,51 +52,156 @@
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20101102 Re: utf-8 security issue in php",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/02/11"
},
{
"name": "ADV-2011-0077",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0077"
},
{
"name": "FEDORA-2010-19011",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html"
},
{
"name": "42812",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42812"
},
{
"name": "HPSBOV02763",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name": "[oss-security] 20101102 Re: utf-8 security issue in php",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/02/2"
},
{
"name": "RHSA-2011:0195",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0195.html"
},
{
"name": "[oss-security] 20101102 Re: utf-8 security issue in php",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/02/4"
},
{
"name": "1024797",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024797"
},
{
"name": "SUSE-SR:2010:023",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"
},
{
"name": "http://bugs.php.net/bug.php?id=49687",
"refsource": "CONFIRM",
"url": "http://bugs.php.net/bug.php?id=49687"
},
{
"name": "http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf",
"refsource": "MISC",
"url": "http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "USN-1042-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1042-1"
},
{
"name": "[oss-security] 20101102 Re: utf-8 security issue in php",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/02/6"
},
{
"name" : "[oss-security] 20101102 Re: utf-8 security issue in php",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/11/02/8"
},
{
"name" : "[oss-security] 20101102 Re: utf-8 security issue in php",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/11/02/11"
},
{
"name" : "[oss-security] 20101102 utf-8 security issue in php",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/11/02/1"
},
{
"name" : "[oss-security] 20101103 Re: utf-8 security issue in php",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/11/03/1"
"name": "RHSA-2010:0919",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0919.html"
},
{
"name": "http://bugs.php.net/bug.php?id=48230",
"refsource": "MISC",
"url": "http://bugs.php.net/bug.php?id=48230"
},
{
"name": "ADV-2011-0021",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0021"
},
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html",
"refsource": "MISC",
"url": "http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html"
},
{
"name": "SSRT100826",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name": "[oss-security] 20101102 utf-8 security issue in php",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/02/1"
},
{
"name": "42410",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42410"
},
{
"name": "MDVSA-2010:224",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2010:224"
},
{
"name": "FEDORA-2010-18976",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html"
},
{
"name": "[oss-security] 20101103 Re: utf-8 security issue in php",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/03/1"
},
{
"name": "http://svn.php.net/viewvc?view=revision&revision=304959",
"refsource": "CONFIRM",
"url": "http://svn.php.net/viewvc?view=revision&revision=304959"
},
{
"name": "ADV-2011-0020",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0020"
},
{
"name": "[oss-security] 20101102 Re: utf-8 security issue in php",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/02/8"
},
{
"name": "44605",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44605"
},
{
"name": "http://us2.php.net/manual/en/function.utf8-decode.php#83935",
"refsource": "MISC",
@ -107,120 +212,15 @@
"refsource": "MISC",
"url": "http://www.acunetix.com/blog/web-security-articles/security-risks-associated-with-utf8_decode/"
},
{
"name" : "http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf",
"refsource" : "MISC",
"url" : "http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf"
},
{
"name" : "http://bugs.php.net/bug.php?id=49687",
"refsource" : "CONFIRM",
"url" : "http://bugs.php.net/bug.php?id=49687"
},
{
"name" : "http://svn.php.net/viewvc?view=revision&revision=304959",
"refsource" : "CONFIRM",
"url" : "http://svn.php.net/viewvc?view=revision&revision=304959"
},
{
"name" : "http://www.php.net/ChangeLog-5.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php"
},
{
"name" : "http://support.apple.com/kb/HT4581",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4581"
},
{
"name" : "APPLE-SA-2011-03-21-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name" : "FEDORA-2010-18976",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html"
},
{
"name" : "FEDORA-2010-19011",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html"
},
{
"name" : "HPSBOV02763",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name" : "SSRT100826",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name" : "MDVSA-2010:224",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/en/security/advisories?name=MDVSA-2010:224"
},
{
"name" : "RHSA-2010:0919",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0919.html"
},
{
"name" : "RHSA-2011:0195",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0195.html"
},
{
"name" : "SUSE-SR:2010:023",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"
},
{
"name" : "USN-1042-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1042-1"
},
{
"name" : "44605",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/44605"
},
{
"name" : "1024797",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024797"
},
{
"name" : "42410",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42410"
},
{
"name" : "42812",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42812"
},
{
"name": "ADV-2010-3081",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3081"
},
{
"name" : "ADV-2011-0020",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0020"
},
{
"name" : "ADV-2011-0021",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0021"
},
{
"name" : "ADV-2011-0077",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0077"
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2010-4131",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20101117 Cisco Unified Videoconferencing multiple vulnerabilities - CVE-2010-3037 CVE-2010-3038",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2010/Nov/167"
},
{
"name": "http://www.trustmatta.com/advisories/MATTA-2010-001.txt",
"refsource": "MISC",
@ -66,6 +61,11 @@
"name": "20101117 Multiple Vulnerabilities in Cisco Unified Videoconferencing Products",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_response09186a0080b56d0d.html"
},
{
"name": "20101117 Cisco Unified Videoconferencing multiple vulnerabilities - CVE-2010-3037 CVE-2010-3038",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2010/Nov/167"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4656",
"STATE": "PUBLIC"
},
@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110124 CVE request: linux kernel heap issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/01/24/9"
},
{
"name" : "[oss-security] 20110124 Re: CVE request: linux kernel heap issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/01/25/3"
},
{
"name" : "[oss-security] 20110125 Re: CVE request: linux kernel heap issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/01/25/4"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3ed780117dbe5acb64280d218f0347f238dafed0",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3ed780117dbe5acb64280d218f0347f238dafed0"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
"name": "USN-1146-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1146-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=672420",
@ -83,9 +63,29 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=672420"
},
{
"name" : "USN-1146-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1146-1"
"name": "[oss-security] 20110124 CVE request: linux kernel heap issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/24/9"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3ed780117dbe5acb64280d218f0347f238dafed0",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3ed780117dbe5acb64280d218f0347f238dafed0"
},
{
"name": "[oss-security] 20110125 Re: CVE request: linux kernel heap issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/25/4"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
},
{
"name": "[oss-security] 20110124 Re: CVE request: linux kernel heap issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/25/3"
},
{
"name": "46069",

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14196"
},
{
"name" : "41354",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/41354"
},
{
"name": "socialadsforjomsocial-index-xss(60067)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60067"
},
{
"name": "41354",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41354"
}
]
}

View File

@ -52,40 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "11975",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/11975"
},
{
"name" : "11976",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/11976"
},
{
"name" : "17727",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/17727"
},
{
"name" : "18142",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/18142"
},
{
"name" : "36826",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/36826/"
},
{
"name": "36465",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/36465/"
},
{
"name" : "36827",
"name": "39193",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39193"
},
{
"name": "17727",
"refsource": "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/36827/"
"url": "http://www.exploit-db.com/exploits/17727"
},
{
"name": "39672",
@ -98,9 +78,29 @@
"url": "http://www.osvdb.org/63349"
},
{
"name" : "39193",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39193"
"name": "18142",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18142"
},
{
"name": "11976",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11976"
},
{
"name": "11975",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11975"
},
{
"name": "36826",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/36826/"
},
{
"name": "36827",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/36827/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3372",
"STATE": "PUBLIC"
},
@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=36292",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=36292"
},
{
"name": "20141030 Cisco Unified Communications Manager Reports Interface Reflected Cross-Site Scripting Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3372"
},
{
"name" : "70846",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70846"
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36292",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36292"
},
{
"name": "1031159",
@ -81,6 +76,11 @@
"name": "cisco-ucm-cve20143372-xss(98404)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98404"
},
{
"name": "70846",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70846"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8843",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8932",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20141212 Docker 1.3.3 - Security Advisory [11 Dec 2014]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/534215/100/0/threaded"
},
{
"name": "https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ"
},
{
"name": "20141212 Docker 1.3.3 - Security Advisory [11 Dec 2014]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534215/100/0/threaded"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2014-9649",
"STATE": "PUBLIC"
},
@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150121 CVE Request: XSS and response-splitting bugs in rabbitmq management plugin",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/01/21/13"
},
{
"name" : "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
"refsource" : "CONFIRM",
"url" : "http://www.rabbitmq.com/release-notes/README-3.4.1.txt"
},
{
"name" : "https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs",
"refsource" : "CONFIRM",
"url" : "https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs"
},
{
"name": "RHSA-2016:0308",
"refsource": "REDHAT",
@ -76,6 +61,21 @@
"name": "76084",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76084"
},
{
"name": "https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs"
},
{
"name": "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
"refsource": "CONFIRM",
"url": "http://www.rabbitmq.com/release-notes/README-3.4.1.txt"
},
{
"name": "[oss-security] 20150121 CVE Request: XSS and response-splitting bugs in rabbitmq management plugin",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/01/21/13"
}
]
}

View File

@ -57,11 +57,36 @@
"refsource": "MISC",
"url": "http://code.google.com/p/google-security-research/issues/detail?id=158"
},
{
"name": "DSA-3188",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3188"
},
{
"name": "GLSA-201503-05",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201503-05"
},
{
"name": "72986",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72986"
},
{
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=ef1eba75187adfac750f326b563fe543dd5ff4e6",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=ef1eba75187adfac750f326b563fe543dd5ff4e6"
},
{
"name": "USN-2739-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2739-1"
},
{
"name": "openSUSE-SU-2015:0627",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html"
},
{
"name": "http://advisories.mageia.org/MGASA-2015-0083.html",
"refsource": "CONFIRM",
@ -73,54 +98,29 @@
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name" : "DSA-3188",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3188"
"name": "RHSA-2015:0696",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html"
},
{
"name": "FEDORA-2015-2216",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html"
},
{
"name" : "FEDORA-2015-2237",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html"
},
{
"name" : "GLSA-201503-05",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201503-05"
},
{
"name": "MDVSA-2015:055",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055"
},
{
"name" : "RHSA-2015:0696",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0696.html"
},
{
"name" : "openSUSE-SU-2015:0627",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html"
},
{
"name": "USN-2510-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2510-1"
},
{
"name" : "USN-2739-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2739-1"
},
{
"name" : "72986",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/72986"
"name": "FEDORA-2015-2237",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2014-9783",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-07-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-07-01.html"
},
{
"name" : "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=a7502f4f801bb95bff73617309835bb7a016cde5",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=a7502f4f801bb95bff73617309835bb7a016cde5"
},
{
"name": "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=2b1050b49a9a5f7bb57006648d145e001a3eaa8b",
"refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "91628",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91628"
},
{
"name": "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=a7502f4f801bb95bff73617309835bb7a016cde5",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=a7502f4f801bb95bff73617309835bb7a016cde5"
},
{
"name": "http://source.android.com/security/bulletin/2016-07-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-07-01.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2014-9784",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-07-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-07-01.html"
},
{
"name": "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=36503d639cedcc73880974ed92132247576e72ba",
"refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "91628",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91628"
},
{
"name": "http://source.android.com/security/bulletin/2016-07-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-07-01.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2014-9882",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2131",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-2499",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-06-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-06-01.html"
},
{
"name": "https://android.googlesource.com/platform/frameworks/av/+/dd3546765710ce8dd49eb23901d90345dec8282f",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/dd3546765710ce8dd49eb23901d90345dec8282f"
},
{
"name": "http://source.android.com/security/bulletin/2016-06-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-06-01.html"
}
]
}

View File

@ -65,11 +65,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/113848",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/113848"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006441",
"refsource": "CONFIRM",
@ -79,6 +74,11 @@
"name": "100572",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100572"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/113848",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/113848"
}
]
}

View File

@ -65,25 +65,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/113850",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/113850"
},
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22006439",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22006439"
},
{
"name": "100599",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100599"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/113850",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/113850"
},
{
"name": "1039231",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039231"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006439",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22006439"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160713 CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/07/13/2"
},
{
"name": "[oss-security] 20160714 Re: CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/14/3"
},
{
"name" : "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882",
"refsource" : "CONFIRM",
"url" : "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882"
},
{
"name" : "https://bugs.launchpad.net/ecryptfs/+bug/1597154",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/ecryptfs/+bug/1597154"
"name": "[oss-security] 20160713 CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/13/2"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282"
},
{
"name": "USN-3032-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3032-1"
},
{
"name": "https://bugs.launchpad.net/ecryptfs/+bug/1597154",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ecryptfs/+bug/1597154"
},
{
"name": "FEDORA-2016-41301e2187",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5WWCVHDLRLZTYMXEIONYFHLYAXXLJW3/"
},
{
"name" : "USN-3032-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3032-1"
"name": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882",
"refsource": "CONFIRM",
"url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882"
}
]
}

View File

@ -62,25 +62,15 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/28/15"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name" : "https://github.com/ImageMagick/ImageMagick/blob/6.9.5-4/ChangeLog",
"refsource" : "CONFIRM",
"url" : "https://github.com/ImageMagick/ImageMagick/blob/6.9.5-4/ChangeLog"
},
{
"name": "https://github.com/ImageMagick/ImageMagick/commit/dd84447b63a71fa8c3f47071b09454efc667767b",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/commit/dd84447b63a71fa8c3f47071b09454efc667767b"
},
{
"name" : "GLSA-201611-21",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201611-21"
"name": "1036501",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036501"
},
{
"name": "92186",
@ -88,9 +78,19 @@
"url": "http://www.securityfocus.com/bid/92186"
},
{
"name" : "1036501",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036501"
"name": "https://github.com/ImageMagick/ImageMagick/blob/6.9.5-4/ChangeLog",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/blob/6.9.5-4/ChangeLog"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "GLSA-201611-21",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201611-21"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160802 CVE request: XSS vulns in Dotclear v2.9.1",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/08/02/3"
},
{
"name": "[oss-security] 20160802 Re: CVE request: XSS vulns in Dotclear v2.9.1",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/08/02/13"
},
{
"name": "[oss-security] 20160802 CVE request: XSS vulns in Dotclear v2.9.1",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/08/02/3"
},
{
"name": "https://hg.dotclear.org/dotclear/file/18dc878c1178/CHANGELOG",
"refsource": "CONFIRM",

View File

@ -53,54 +53,54 @@
"references": {
"reference_data": [
{
"name" : "https://nodesecurity.io/advisories/127",
"refsource" : "MISC",
"url" : "https://nodesecurity.io/advisories/127"
},
{
"name" : "https://github.com/jquery/api.jqueryui.com/issues/281",
"refsource" : "CONFIRM",
"url" : "https://github.com/jquery/api.jqueryui.com/issues/281"
"name": "RHSA-2017:0161",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0161.html"
},
{
"name": "https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6",
"refsource": "CONFIRM",
"url": "https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6"
},
{
"name" : "https://jqueryui.com/changelog/1.12.0/",
"refsource" : "CONFIRM",
"url" : "https://jqueryui.com/changelog/1.12.0/"
},
{
"name" : "https://www.tenable.com/security/tns-2016-19",
"refsource" : "CONFIRM",
"url" : "https://www.tenable.com/security/tns-2016-19"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name" : "RHSA-2017:0161",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0161.html"
},
{
"name" : "RHSA-2016:2932",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2932.html"
},
{
"name": "RHSA-2016:2933",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2933.html"
},
{
"name": "https://github.com/jquery/api.jqueryui.com/issues/281",
"refsource": "CONFIRM",
"url": "https://github.com/jquery/api.jqueryui.com/issues/281"
},
{
"name": "RHSA-2016:2932",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2932.html"
},
{
"name": "https://nodesecurity.io/advisories/127",
"refsource": "MISC",
"url": "https://nodesecurity.io/advisories/127"
},
{
"name": "https://www.tenable.com/security/tns-2016-19",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-19"
},
{
"name": "104823",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104823"
},
{
"name": "https://jqueryui.com/changelog/1.12.0/",
"refsource": "CONFIRM",
"url": "https://jqueryui.com/changelog/1.12.0/"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160912 CVE Request: XSS vulns in b2evolution v6.7.5",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/09/12/1"
},
{
"name": "[oss-security] 20160915 Re: CVE Request: XSS vulns in b2evolution v6.7.5",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/09/15/4"
},
{
"name": "92967",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92967"
},
{
"name": "https://github.com/b2evolution/b2evolution/commit/dd975fff7fce81bf12f9c59edb1a99475747c83c",
"refsource": "CONFIRM",
"url": "https://github.com/b2evolution/b2evolution/commit/dd975fff7fce81bf12f9c59edb1a99475747c83c"
},
{
"name" : "92967",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92967"
"name": "[oss-security] 20160912 CVE Request: XSS vulns in b2evolution v6.7.5",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/09/12/1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2016-7535",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2016/09/22/2"
},
{
"name" : "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1545180",
"name": "https://github.com/ImageMagick/ImageMagick/issues/128",
"refsource": "CONFIRM",
"url" : "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1545180"
"url": "https://github.com/ImageMagick/ImageMagick/issues/128"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1378768",
@ -68,9 +68,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378768"
},
{
"name" : "https://github.com/ImageMagick/ImageMagick/issues/128",
"name": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1545180",
"refsource": "CONFIRM",
"url" : "https://github.com/ImageMagick/ImageMagick/issues/128"
"url": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1545180"
},
{
"name": "93131",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-7910",
"STATE": "PUBLIC"
},
@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77da160530dd1dc94f6ae15a981f24e5f0021e84",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77da160530dd1dc94f6ae15a981f24e5f0021e84"
},
{
"name" : "http://source.android.com/security/bulletin/2016-11-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-11-01.html"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.1",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.1"
},
{
"name": "https://github.com/torvalds/linux/commit/77da160530dd1dc94f6ae15a981f24e5f0021e84",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/77da160530dd1dc94f6ae15a981f24e5f0021e84"
},
{
"name" : "RHSA-2017:0892",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:0892"
},
{
"name" : "RHSA-2017:1297",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1297"
},
{
"name" : "RHSA-2017:1298",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1298"
},
{
"name": "RHSA-2017:1308",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1308"
},
{
"name": "http://source.android.com/security/bulletin/2016-11-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-11-01.html"
},
{
"name": "RHSA-2017:0892",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:0892"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.1",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.1"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77da160530dd1dc94f6ae15a981f24e5f0021e84",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77da160530dd1dc94f6ae15a981f24e5f0021e84"
},
{
"name": "RHSA-2017:1298",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1298"
},
{
"name": "94135",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94135"
},
{
"name": "RHSA-2017:1297",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1297"
}
]
}