"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:19:19 +00:00
parent 3b6e0023b4
commit 5a9b6d89b3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 3747 additions and 3747 deletions

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20001213 Re: Insecure input validation in simplestmail.cgi",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-12/0168.html"
},
{ {
"name": "2106", "name": "2106",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/2106" "url": "http://www.securityfocus.com/bid/2106"
}, },
{
"name": "20001213 Re: Insecure input validation in simplestmail.cgi",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0168.html"
},
{ {
"name": "http-cgi-simplestguest(5743)", "name": "http-cgi-simplestguest(5743)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20001211 [pkc] remote heap buffer overflow in oops", "name": "2099",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-12/0127.html" "url": "http://www.securityfocus.com/bid/2099"
}, },
{ {
"name": "FreeBSD-SA-00:79", "name": "FreeBSD-SA-00:79",
@ -63,9 +63,9 @@
"url": "http://archives.neohapsis.com/archives/freebsd/2000-12/0418.html" "url": "http://archives.neohapsis.com/archives/freebsd/2000-12/0418.html"
}, },
{ {
"name" : "2099", "name": "20001211 [pkc] remote heap buffer overflow in oops",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/2099" "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0127.html"
}, },
{ {
"name": "oops-ftputils-bo(5725)", "name": "oops-ftputils-bo(5725)",

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20001126 [MSY] S(ecure)Locate heap corruption vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-11/0356.html"
},
{
"name" : "DSA-005-1",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2000/20001217a"
},
{ {
"name": "MDKSA-2000:085", "name": "MDKSA-2000:085",
"refsource": "MANDRAKE", "refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/2000/MDKSA-2000-085.php3" "url": "http://www.linux-mandrake.com/en/security/2000/MDKSA-2000-085.php3"
}, },
{
"name" : "RHSA-2000:128",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2000-128.html"
},
{
"name" : "CLA-2001:369",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000369"
},
{
"name" : "TLSA2001002-1",
"refsource" : "TURBO",
"url" : "http://www.turbolinux.com/pipermail/tl-security-announce/2001-February/000144.html"
},
{ {
"name": "slocate-heap-execute-code(5594)", "name": "slocate-heap-execute-code(5594)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5594" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5594"
}, },
{
"name": "TLSA2001002-1",
"refsource": "TURBO",
"url": "http://www.turbolinux.com/pipermail/tl-security-announce/2001-February/000144.html"
},
{
"name": "20001126 [MSY] S(ecure)Locate heap corruption vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0356.html"
},
{ {
"name": "2004", "name": "2004",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/2004" "url": "http://www.securityfocus.com/bid/2004"
},
{
"name": "RHSA-2000:128",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2000-128.html"
},
{
"name": "DSA-005-1",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2000/20001217a"
},
{
"name": "CLA-2001:369",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000369"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20010117 [pkc] remote heap overflow in tinyproxy", "name": "tinyproxy-remote-bo(5954)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=97975486527750&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5954"
}, },
{ {
"name": "DSA-018", "name": "DSA-018",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/2217" "url": "http://www.securityfocus.com/bid/2217"
}, },
{ {
"name" : "tinyproxy-remote-bo(5954)", "name": "20010117 [pkc] remote heap overflow in tinyproxy",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5954" "url": "http://marc.info/?l=bugtraq&m=97975486527750&w=2"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20001127 Nokia firewalls",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97535202912588&w=2"
},
{
"name" : "20001205 Nokia firewalls - Response from Nokia",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97603879517777&w=2"
},
{
"name" : "nokia-ip440-bo(5640)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5640"
},
{ {
"name": "2054", "name": "2054",
"refsource": "BID", "refsource": "BID",
@ -76,6 +61,21 @@
"name": "6020", "name": "6020",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/6020" "url": "http://www.osvdb.org/6020"
},
{
"name": "20001127 Nokia firewalls",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97535202912588&w=2"
},
{
"name": "nokia-ip440-bo(5640)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5640"
},
{
"name": "20001205 Nokia firewalls - Response from Nokia",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97603879517777&w=2"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "speedxess-hase-default-password(7655)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7655.php"
},
{ {
"name": "20011203 SpeedXess HASE-120 router default password", "name": "20011203 SpeedXess HASE-120 router default password",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "3617", "name": "3617",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/3617" "url": "http://www.securityfocus.com/bid/3617"
},
{
"name" : "speedxess-hase-default-password(7655)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/7655.php"
} }
] ]
} }

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060420 PHPSurveyor <= 0.995 'save.php/surveyid' remote cmmnds xctn",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/431508/100/0/threaded"
},
{
"name" : "http://retrogod.altervista.org/phpsurveyor_0995_xpl.html",
"refsource" : "MISC",
"url" : "http://retrogod.altervista.org/phpsurveyor_0995_xpl.html"
},
{ {
"name": "17633", "name": "17633",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/17633" "url": "http://www.securityfocus.com/bid/17633"
}, },
{ {
"name" : "ADV-2006-1451", "name": "20060420 PHPSurveyor <= 0.995 'save.php/surveyid' remote cmmnds xctn",
"refsource" : "VUPEN", "refsource": "BUGTRAQ",
"url" : "http://www.vupen.com/english/advisories/2006/1451" "url": "http://www.securityfocus.com/archive/1/431508/100/0/threaded"
},
{
"name" : "24787",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24787"
},
{
"name" : "1015970",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015970"
}, },
{ {
"name": "19761", "name": "19761",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19761" "url": "http://secunia.com/advisories/19761"
}, },
{
"name": "1015970",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015970"
},
{ {
"name": "phpsurveyor-surveyid-shell-execution(25970)", "name": "phpsurveyor-surveyid-shell-execution(25970)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25970" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25970"
},
{
"name": "http://retrogod.altervista.org/phpsurveyor_0995_xpl.html",
"refsource": "MISC",
"url": "http://retrogod.altervista.org/phpsurveyor_0995_xpl.html"
},
{
"name": "24787",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24787"
},
{
"name": "ADV-2006-1451",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1451"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060507 Limbo CMS (option=weblinks) SQL injection exploit", "name": "limbocms-index-sql-injection(26366)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/433221/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26366"
},
{
"name" : "1751",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1751"
},
{
"name" : "http://forum.limboforge.org/index.php?topic=6.0",
"refsource" : "CONFIRM",
"url" : "http://forum.limboforge.org/index.php?topic=6.0"
}, },
{ {
"name": "19891", "name": "19891",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19891" "url": "http://secunia.com/advisories/19891"
}, },
{
"name": "1751",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1751"
},
{
"name": "20060507 Limbo CMS (option=weblinks) SQL injection exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/433221/100/0/threaded"
},
{ {
"name": "893", "name": "893",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/893" "url": "http://securityreason.com/securityalert/893"
}, },
{ {
"name" : "limbocms-index-sql-injection(26366)", "name": "http://forum.limboforge.org/index.php?topic=6.0",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26366" "url": "http://forum.limboforge.org/index.php?topic=6.0"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2006-2388", "ID": "CVE-2006-2388",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060711 ZDI-06-022: Microsoft Office Excel File Rebuilding Code Execution Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/439786/100/0/threaded"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-06-022.html",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-06-022.html"
},
{ {
"name": "MS06-037", "name": "MS06-037",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037"
}, },
{
"name": "1016472",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016472"
},
{ {
"name": "18938", "name": "18938",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/18938" "url": "http://www.securityfocus.com/bid/18938"
}, },
{
"name": "20060711 ZDI-06-022: Microsoft Office Excel File Rebuilding Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/439786/100/0/threaded"
},
{ {
"name": "ADV-2006-2755", "name": "ADV-2006-2755",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -83,9 +83,9 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A234" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A234"
}, },
{ {
"name" : "1016472", "name": "http://www.zerodayinitiative.com/advisories/ZDI-06-022.html",
"refsource" : "SECTRACK", "refsource": "MISC",
"url" : "http://securitytracker.com/id?1016472" "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-022.html"
}, },
{ {
"name": "excel-cell-rebuilding-code-execution(27604)", "name": "excel-cell-rebuilding-code-execution(27604)",

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060523 Assetman <= 2.4a XSS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/435139/100/0/threaded"
},
{ {
"name": "18131", "name": "18131",
"refsource": "BID", "refsource": "BID",
@ -67,6 +62,16 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2023" "url": "http://www.vupen.com/english/advisories/2006/2023"
}, },
{
"name": "20060523 Assetman <= 2.4a XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435139/100/0/threaded"
},
{
"name": "assetman-multiple-xss(26702)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26702"
},
{ {
"name": "20285", "name": "20285",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -76,11 +81,6 @@
"name": "979", "name": "979",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/979" "url": "http://securityreason.com/securityalert/979"
},
{
"name" : "assetman-multiple-xss(26702)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26702"
} }
] ]
} }

View File

@ -57,40 +57,40 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435212/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/435212/100/0/threaded"
}, },
{
"name": "18168",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18168"
},
{ {
"name": "http://www.eazel.es/media/advisory003-D-Link-DSA-3100-Cross-Site-Scripting.html", "name": "http://www.eazel.es/media/advisory003-D-Link-DSA-3100-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.eazel.es/media/advisory003-D-Link-DSA-3100-Cross-Site-Scripting.html" "url": "http://www.eazel.es/media/advisory003-D-Link-DSA-3100-Cross-Site-Scripting.html"
}, },
{ {
"name" : "18168", "name": "dlink-airspot-uname-xss(26759)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/18168" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26759"
}, },
{ {
"name": "ADV-2006-2028", "name": "ADV-2006-2028",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2028" "url": "http://www.vupen.com/english/advisories/2006/2028"
}, },
{
"name" : "1016173",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016173"
},
{ {
"name": "20343", "name": "20343",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20343" "url": "http://secunia.com/advisories/20343"
}, },
{
"name": "1016173",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016173"
},
{ {
"name": "980", "name": "980",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/980" "url": "http://securityreason.com/securityalert/980"
},
{
"name" : "dlink-airspot-uname-xss(26759)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26759"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.amule.org/wiki/index.php/Changelog_2.1.2",
"refsource" : "CONFIRM",
"url" : "http://www.amule.org/wiki/index.php/Changelog_2.1.2"
},
{ {
"name": "18145", "name": "18145",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "20351", "name": "20351",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20351" "url": "http://secunia.com/advisories/20351"
},
{
"name": "http://www.amule.org/wiki/index.php/Changelog_2.1.2",
"refsource": "CONFIRM",
"url": "http://www.amule.org/wiki/index.php/Changelog_2.1.2"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-5474", "ID": "CVE-2008-5474",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "7294", "name": "4779",
"refsource" : "EXPLOIT-DB", "refsource": "SREASON",
"url" : "https://www.exploit-db.com/exploits/7294" "url": "http://securityreason.com/securityalert/4779"
}, },
{ {
"name": "32538", "name": "32538",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32538" "url": "http://www.securityfocus.com/bid/32538"
}, },
{
"name" : "ADV-2008-3300",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3300"
},
{ {
"name": "32910", "name": "32910",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32910" "url": "http://secunia.com/advisories/32910"
}, },
{
"name" : "4779",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4779"
},
{ {
"name": "litolite-cate-sql-injection(46923)", "name": "litolite-cate-sql-injection(46923)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46923" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46923"
},
{
"name": "7294",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7294"
},
{
"name": "ADV-2008-3300",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3300"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "7344",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7344"
},
{ {
"name": "32646", "name": "32646",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32646" "url": "http://www.securityfocus.com/bid/32646"
}, },
{
"name": "7344",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7344"
},
{ {
"name": "32982", "name": "32982",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2091", "ID": "CVE-2011-2091",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-14.html", "name": "coldfusion-unspec-dos(68028)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-14.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68028"
}, },
{ {
"name": "73050", "name": "73050",
@ -63,9 +63,9 @@
"url": "http://osvdb.org/73050" "url": "http://osvdb.org/73050"
}, },
{ {
"name" : "coldfusion-unspec-dos(68028)", "name": "http://www.adobe.com/support/security/bulletins/apsb11-14.html",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68028" "url": "http://www.adobe.com/support/security/bulletins/apsb11-14.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2099", "ID": "CVE-2011-2099",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-16.html", "name": "reader-acrobat-ce(68013)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-16.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68013"
},
{
"name" : "TA11-166A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
},
{
"name" : "48246",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/48246"
},
{
"name" : "73061",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/73061"
}, },
{ {
"name": "oval:org.mitre.oval:def:13684", "name": "oval:org.mitre.oval:def:13684",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13684" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13684"
}, },
{
"name": "48246",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48246"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-16.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
},
{
"name": "73061",
"refsource": "OSVDB",
"url": "http://osvdb.org/73061"
},
{
"name": "TA11-166A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
},
{ {
"name": "1025658", "name": "1025658",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025658" "url": "http://www.securitytracker.com/id?1025658"
},
{
"name" : "reader-acrobat-ce(68013)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68013"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-2230", "ID": "CVE-2011-2230",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
},
{ {
"name": "TA11-201A", "name": "TA11-201A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2520", "ID": "CVE-2011-2520",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "FEDORA-2011-9652",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063314.html"
},
{
"name": "systemconfigfirewall-priv-escalation(68734)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68734"
},
{ {
"name": "[oss-security] 20110718 CVE-2011-2520: flaw in system-config-firewall's usage of pickle allows privilege escalation", "name": "[oss-security] 20110718 CVE-2011-2520: flaw in system-config-firewall's usage of pickle allows privilege escalation",
"refsource": "MLIST", "refsource": "MLIST",
@ -62,11 +72,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=717985" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717985"
}, },
{
"name" : "FEDORA-2011-9652",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063314.html"
},
{ {
"name": "RHSA-2011:0953", "name": "RHSA-2011:0953",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -86,11 +91,6 @@
"name": "45294", "name": "45294",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45294" "url": "http://secunia.com/advisories/45294"
},
{
"name" : "systemconfigfirewall-priv-escalation(68734)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68734"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2940", "ID": "CVE-2011-2940",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,41 +57,41 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/19/6" "url": "http://www.openwall.com/lists/oss-security/2011/08/19/6"
}, },
{
"name": "1025959",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025959"
},
{ {
"name": "[oss-security] 20110819 Re: CVE request: stunnel 4.4x heap overflow flaw", "name": "[oss-security] 20110819 Re: CVE request: stunnel 4.4x heap overflow flaw",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/19/18" "url": "http://www.openwall.com/lists/oss-security/2011/08/19/18"
}, },
{
"name" : "[stunnel-announce] 20110818 stunnel 4.42 released",
"refsource" : "MLIST",
"url" : "http://www.stunnel.org/pipermail/stunnel-announce/2011-August/000059.html"
},
{
"name" : "http://stunnel.org/?page=sdf_ChangeLog",
"refsource" : "CONFIRM",
"url" : "http://stunnel.org/?page=sdf_ChangeLog"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=732068", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=732068",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732068" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=732068"
}, },
{
"name": "http://stunnel.org/?page=sdf_ChangeLog",
"refsource": "CONFIRM",
"url": "http://stunnel.org/?page=sdf_ChangeLog"
},
{ {
"name": "49254", "name": "49254",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/49254" "url": "http://www.securityfocus.com/bid/49254"
}, },
{
"name": "[stunnel-announce] 20110818 stunnel 4.42 released",
"refsource": "MLIST",
"url": "http://www.stunnel.org/pipermail/stunnel-announce/2011-August/000059.html"
},
{ {
"name": "74600", "name": "74600",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/74600" "url": "http://www.osvdb.org/74600"
}, },
{
"name" : "1025959",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1025959"
},
{ {
"name": "45705", "name": "45705",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3194", "ID": "CVE-2011-3194",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,94 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20120822 CVE request: libqt4: two memory issues", "name": "46371",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://www.openwall.com/lists/oss-security/2011/08/22/6" "url": "http://secunia.com/advisories/46371"
},
{
"name" : "[oss-security] 20120824 Re: CVE request: libqt4: two memory issues",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/08/24/8"
},
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=637275",
"refsource" : "MISC",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=637275"
},
{
"name" : "https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465",
"refsource" : "CONFIRM",
"url" : "https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465"
},
{
"name" : "FEDORA-2011-12145",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html"
},
{
"name" : "GLSA-201206-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201206-02.xml"
},
{
"name" : "RHSA-2011:1323",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2011-1323.html"
},
{
"name" : "RHSA-2011:1328",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2011-1328.html"
},
{
"name" : "SUSE-SU-2011:1113",
"refsource" : "SUSE",
"url" : "https://hermes.opensuse.org/messages/12056605"
},
{
"name" : "openSUSE-SU-2011:1119",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html"
},
{
"name" : "openSUSE-SU-2011:1120",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html"
}, },
{ {
"name": "USN-1504-1", "name": "USN-1504-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1504-1" "url": "http://www.ubuntu.com/usn/USN-1504-1"
}, },
{
"name" : "49724",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/49724"
},
{
"name" : "75653",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/75653"
},
{
"name" : "46128",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46128"
},
{ {
"name": "46140", "name": "46140",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46140" "url": "http://secunia.com/advisories/46140"
}, },
{ {
"name" : "46187", "name": "[oss-security] 20120824 Re: CVE request: libqt4: two memory issues",
"refsource" : "SECUNIA", "refsource": "MLIST",
"url" : "http://secunia.com/advisories/46187" "url": "http://www.openwall.com/lists/oss-security/2011/08/24/8"
}, },
{ {
"name" : "46371", "name": "GLSA-201206-02",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/46371" "url": "http://security.gentoo.org/glsa/glsa-201206-02.xml"
},
{
"name": "openSUSE-SU-2011:1119",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html"
}, },
{ {
"name": "46410", "name": "46410",
@ -148,9 +88,29 @@
"url": "http://secunia.com/advisories/46410" "url": "http://secunia.com/advisories/46410"
}, },
{ {
"name" : "49383", "name": "qt-grayscale-bo(69975)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69975"
},
{
"name": "[oss-security] 20120822 CVE request: libqt4: two memory issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/6"
},
{
"name": "https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465",
"refsource": "CONFIRM",
"url": "https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465"
},
{
"name": "46128",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/49383" "url": "http://secunia.com/advisories/46128"
},
{
"name": "46187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46187"
}, },
{ {
"name": "49895", "name": "49895",
@ -158,9 +118,49 @@
"url": "http://secunia.com/advisories/49895" "url": "http://secunia.com/advisories/49895"
}, },
{ {
"name" : "qt-grayscale-bo(69975)", "name": "https://bugzilla.novell.com/show_bug.cgi?id=637275",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69975" "url": "https://bugzilla.novell.com/show_bug.cgi?id=637275"
},
{
"name": "49383",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49383"
},
{
"name": "49724",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49724"
},
{
"name": "FEDORA-2011-12145",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html"
},
{
"name": "RHSA-2011:1323",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1323.html"
},
{
"name": "SUSE-SU-2011:1113",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/12056605"
},
{
"name": "RHSA-2011:1328",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1328.html"
},
{
"name": "75653",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/75653"
},
{
"name": "openSUSE-SU-2011:1120",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-3539", "ID": "CVE-2011-3539",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,16 +57,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
}, },
{
"name" : "50270",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/50270"
},
{ {
"name": "76473", "name": "76473",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/76473" "url": "http://osvdb.org/76473"
}, },
{
"name": "50270",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50270"
},
{ {
"name": "orasun-sol-zones-unspecified(70812)", "name": "orasun-sol-zones-unspecified(70812)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-3567", "ID": "CVE-2011-3567",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-0080", "ID": "CVE-2013-0080",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-0788", "ID": "CVE-2013-0788",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,110 +52,110 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-30.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-30.html"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=635852", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=635852",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=635852" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=635852"
}, },
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=771942",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=771942"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=784730",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=784730"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=813442",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=813442"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=827870",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=827870"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=834240", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=834240",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=834240" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=834240"
}, },
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=839621",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=839621"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=840263",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=840263"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=840353",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=840353"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=852923",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=852923"
},
{
"name" : "DSA-2699",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2699"
},
{
"name" : "RHSA-2013:0696",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0696.html"
},
{
"name" : "RHSA-2013:0697",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0697.html"
},
{
"name" : "openSUSE-SU-2013:0630",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html"
},
{
"name" : "SUSE-SU-2013:0645",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html"
},
{
"name" : "openSUSE-SU-2013:0631",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html"
},
{ {
"name": "SUSE-SU-2013:0850", "name": "SUSE-SU-2013:0850",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html"
}, },
{
"name" : "openSUSE-SU-2013:0875",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html"
},
{ {
"name": "USN-1791-1", "name": "USN-1791-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1791-1" "url": "http://www.ubuntu.com/usn/USN-1791-1"
}, },
{
"name": "DSA-2699",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2699"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=840353",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=840353"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=784730",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=784730"
},
{
"name": "openSUSE-SU-2013:0630",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=813442",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=813442"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=839621",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=839621"
},
{
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-30.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-30.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=827870",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=827870"
},
{
"name": "RHSA-2013:0696",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0696.html"
},
{ {
"name": "oval:org.mitre.oval:def:16629", "name": "oval:org.mitre.oval:def:16629",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16629" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16629"
},
{
"name": "openSUSE-SU-2013:0631",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=771942",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=771942"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=852923",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=852923"
},
{
"name": "RHSA-2013:0697",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0697.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=840263",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=840263"
},
{
"name": "SUSE-SU-2013:0645",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html"
},
{
"name": "openSUSE-SU-2013:0875",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2013-0905", "ID": "CVE-2013-0905",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_4.html" "url": "http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_4.html"
}, },
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=168982",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=168982"
},
{ {
"name": "oval:org.mitre.oval:def:16495", "name": "oval:org.mitre.oval:def:16495",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16495" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16495"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=168982",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=168982"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-0974", "ID": "CVE-2013-0974",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5642" "url": "http://support.apple.com/kb/HT5642"
}, },
{
"name" : "APPLE-SA-2013-01-28-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
},
{ {
"name": "89658", "name": "89658",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/89658" "url": "http://osvdb.org/89658"
},
{
"name": "APPLE-SA-2013-01-28-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2013-1067", "ID": "CVE-2013-1067",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,55 +52,55 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600",
"refsource" : "CONFIRM",
"url" : "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600"
},
{
"name" : "https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81",
"refsource" : "CONFIRM",
"url" : "https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81"
},
{
"name" : "FEDORA-2013-5280",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html"
},
{
"name" : "FEDORA-2013-5286",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html"
},
{ {
"name": "MDVSA-2013:157", "name": "MDVSA-2013:157",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:157" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:157"
}, },
{
"name" : "MDVSA-2013:158",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:158"
},
{
"name" : "RHSA-2013:0748",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0748.html"
},
{
"name" : "openSUSE-SU-2013:0746",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html"
},
{ {
"name": "openSUSE-SU-2013:0904", "name": "openSUSE-SU-2013:0904",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html"
}, },
{
"name": "MDVSA-2013:158",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:158"
},
{
"name": "FEDORA-2013-5286",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html"
},
{ {
"name": "openSUSE-SU-2013:0967", "name": "openSUSE-SU-2013:0967",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html"
},
{
"name": "openSUSE-SU-2013:0746",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html"
},
{
"name": "FEDORA-2013-5280",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html"
},
{
"name": "https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81",
"refsource": "CONFIRM",
"url": "https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81"
},
{
"name": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600",
"refsource": "CONFIRM",
"url": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600"
},
{
"name": "RHSA-2013:0748",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0748.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html"
},
{ {
"name": "http://www.digitalsec.net/stuff/explt+advs/DS3.AuthServer.txt", "name": "http://www.digitalsec.net/stuff/explt+advs/DS3.AuthServer.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.digitalsec.net/stuff/explt+advs/DS3.AuthServer.txt" "url": "http://www.digitalsec.net/stuff/explt+advs/DS3.AuthServer.txt"
},
{
"name": "http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4507", "ID": "CVE-2013-4507",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-5427", "ID": "CVE-2013-5427",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-2435", "ID": "CVE-2014-2435",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
}, },
{
"name" : "GLSA-201409-04",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201409-04.xml"
},
{ {
"name": "66853", "name": "66853",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/66853" "url": "http://www.securityfocus.com/bid/66853"
},
{
"name": "GLSA-201409-04",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201409-04.xml"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2014-2639", "ID": "CVE-2014-2639",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026"
},
{ {
"name": "96032", "name": "96032",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/96032" "url": "http://www.securityfocus.com/bid/96032"
}, },
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026"
},
{ {
"name": "1038017", "name": "1038017",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-09-05T00:00:00", "DATE_PUBLIC": "2017-09-05T00:00:00",
"ID": "CVE-2017-0775", "ID": "CVE-2017-0775",
"STATE": "PUBLIC" "STATE": "PUBLIC"
@ -77,15 +77,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-09-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-09-01"
},
{ {
"name": "100649", "name": "100649",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/100649" "url": "http://www.securityfocus.com/bid/100649"
},
{
"name": "https://source.android.com/security/bulletin/2017-09-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-09-01"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://hackerone.com/reports/169680",
"refsource" : "MISC",
"url" : "https://hackerone.com/reports/169680"
},
{ {
"name": "https://nextcloud.com/security/advisory/?id=nc-sa-2017-002", "name": "https://nextcloud.com/security/advisory/?id=nc-sa-2017-002",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://nextcloud.com/security/advisory/?id=nc-sa-2017-002" "url": "https://nextcloud.com/security/advisory/?id=nc-sa-2017-002"
},
{
"name": "https://hackerone.com/reports/169680",
"refsource": "MISC",
"url": "https://hackerone.com/reports/169680"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29", "DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000484", "ID": "CVE-2017-1000484",
"REQUESTER": "security@plone.org", "REQUESTER": "security@plone.org",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Plone", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "2.5-5.1rc1" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Plone Foundation" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Open Redirection" "value": "n/a"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16425", "ID": "CVE-2017-16425",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -67,15 +67,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/" "url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/"
}, },
{
"name" : "USN-3615-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3615-1/"
},
{ {
"name": "76000", "name": "76000",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "https://secuniaresearch.flexerasoftware.com/advisories/76000/" "url": "https://secuniaresearch.flexerasoftware.com/advisories/76000/"
},
{
"name": "USN-3615-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3615-1/"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4035", "ID": "CVE-2017-4035",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4165", "ID": "CVE-2017-4165",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4179", "ID": "CVE-2017-4179",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-5415", "ID": "CVE-2018-5415",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {