"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:19:19 +00:00
parent 3b6e0023b4
commit 5a9b6d89b3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 3747 additions and 3747 deletions

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20001213 Re: Insecure input validation in simplestmail.cgi",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-12/0168.html"
},
{
"name": "2106",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2106"
},
{
"name": "20001213 Re: Insecure input validation in simplestmail.cgi",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0168.html"
},
{
"name": "http-cgi-simplestguest(5743)",
"refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20001211 [pkc] remote heap buffer overflow in oops",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-12/0127.html"
"name": "2099",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2099"
},
{
"name": "FreeBSD-SA-00:79",
@ -63,9 +63,9 @@
"url": "http://archives.neohapsis.com/archives/freebsd/2000-12/0418.html"
},
{
"name" : "2099",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2099"
"name": "20001211 [pkc] remote heap buffer overflow in oops",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0127.html"
},
{
"name": "oops-ftputils-bo(5725)",

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "20001126 [MSY] S(ecure)Locate heap corruption vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-11/0356.html"
},
{
"name" : "DSA-005-1",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2000/20001217a"
},
{
"name": "MDKSA-2000:085",
"refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/2000/MDKSA-2000-085.php3"
},
{
"name" : "RHSA-2000:128",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2000-128.html"
},
{
"name" : "CLA-2001:369",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000369"
},
{
"name" : "TLSA2001002-1",
"refsource" : "TURBO",
"url" : "http://www.turbolinux.com/pipermail/tl-security-announce/2001-February/000144.html"
},
{
"name": "slocate-heap-execute-code(5594)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5594"
},
{
"name": "TLSA2001002-1",
"refsource": "TURBO",
"url": "http://www.turbolinux.com/pipermail/tl-security-announce/2001-February/000144.html"
},
{
"name": "20001126 [MSY] S(ecure)Locate heap corruption vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0356.html"
},
{
"name": "2004",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2004"
},
{
"name": "RHSA-2000:128",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2000-128.html"
},
{
"name": "DSA-005-1",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2000/20001217a"
},
{
"name": "CLA-2001:369",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000369"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20010117 [pkc] remote heap overflow in tinyproxy",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97975486527750&w=2"
"name": "tinyproxy-remote-bo(5954)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5954"
},
{
"name": "DSA-018",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/2217"
},
{
"name" : "tinyproxy-remote-bo(5954)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5954"
"name": "20010117 [pkc] remote heap overflow in tinyproxy",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97975486527750&w=2"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20001127 Nokia firewalls",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97535202912588&w=2"
},
{
"name" : "20001205 Nokia firewalls - Response from Nokia",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97603879517777&w=2"
},
{
"name" : "nokia-ip440-bo(5640)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5640"
},
{
"name": "2054",
"refsource": "BID",
@ -76,6 +61,21 @@
"name": "6020",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/6020"
},
{
"name": "20001127 Nokia firewalls",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97535202912588&w=2"
},
{
"name": "nokia-ip440-bo(5640)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5640"
},
{
"name": "20001205 Nokia firewalls - Response from Nokia",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97603879517777&w=2"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "speedxess-hase-default-password(7655)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7655.php"
},
{
"name": "20011203 SpeedXess HASE-120 router default password",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "3617",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3617"
},
{
"name" : "speedxess-hase-default-password(7655)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/7655.php"
}
]
}

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "20060420 PHPSurveyor <= 0.995 'save.php/surveyid' remote cmmnds xctn",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/431508/100/0/threaded"
},
{
"name" : "http://retrogod.altervista.org/phpsurveyor_0995_xpl.html",
"refsource" : "MISC",
"url" : "http://retrogod.altervista.org/phpsurveyor_0995_xpl.html"
},
{
"name": "17633",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17633"
},
{
"name" : "ADV-2006-1451",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1451"
},
{
"name" : "24787",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24787"
},
{
"name" : "1015970",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015970"
"name": "20060420 PHPSurveyor <= 0.995 'save.php/surveyid' remote cmmnds xctn",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/431508/100/0/threaded"
},
{
"name": "19761",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19761"
},
{
"name": "1015970",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015970"
},
{
"name": "phpsurveyor-surveyid-shell-execution(25970)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25970"
},
{
"name": "http://retrogod.altervista.org/phpsurveyor_0995_xpl.html",
"refsource": "MISC",
"url": "http://retrogod.altervista.org/phpsurveyor_0995_xpl.html"
},
{
"name": "24787",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24787"
},
{
"name": "ADV-2006-1451",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1451"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "20060507 Limbo CMS (option=weblinks) SQL injection exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/433221/100/0/threaded"
},
{
"name" : "1751",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1751"
},
{
"name" : "http://forum.limboforge.org/index.php?topic=6.0",
"refsource" : "CONFIRM",
"url" : "http://forum.limboforge.org/index.php?topic=6.0"
"name": "limbocms-index-sql-injection(26366)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26366"
},
{
"name": "19891",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19891"
},
{
"name": "1751",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1751"
},
{
"name": "20060507 Limbo CMS (option=weblinks) SQL injection exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/433221/100/0/threaded"
},
{
"name": "893",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/893"
},
{
"name" : "limbocms-index-sql-injection(26366)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26366"
"name": "http://forum.limboforge.org/index.php?topic=6.0",
"refsource": "CONFIRM",
"url": "http://forum.limboforge.org/index.php?topic=6.0"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2006-2388",
"STATE": "PUBLIC"
},
@ -52,26 +52,26 @@
},
"references": {
"reference_data": [
{
"name" : "20060711 ZDI-06-022: Microsoft Office Excel File Rebuilding Code Execution Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/439786/100/0/threaded"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-06-022.html",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-06-022.html"
},
{
"name": "MS06-037",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037"
},
{
"name": "1016472",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016472"
},
{
"name": "18938",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18938"
},
{
"name": "20060711 ZDI-06-022: Microsoft Office Excel File Rebuilding Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/439786/100/0/threaded"
},
{
"name": "ADV-2006-2755",
"refsource": "VUPEN",
@ -83,9 +83,9 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A234"
},
{
"name" : "1016472",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016472"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-022.html",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-022.html"
},
{
"name": "excel-cell-rebuilding-code-execution(27604)",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060523 Assetman <= 2.4a XSS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/435139/100/0/threaded"
},
{
"name": "18131",
"refsource": "BID",
@ -67,6 +62,16 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2023"
},
{
"name": "20060523 Assetman <= 2.4a XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435139/100/0/threaded"
},
{
"name": "assetman-multiple-xss(26702)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26702"
},
{
"name": "20285",
"refsource": "SECUNIA",
@ -76,11 +81,6 @@
"name": "979",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/979"
},
{
"name" : "assetman-multiple-xss(26702)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26702"
}
]
}

View File

@ -57,40 +57,40 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435212/100/0/threaded"
},
{
"name": "18168",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18168"
},
{
"name": "http://www.eazel.es/media/advisory003-D-Link-DSA-3100-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://www.eazel.es/media/advisory003-D-Link-DSA-3100-Cross-Site-Scripting.html"
},
{
"name" : "18168",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18168"
"name": "dlink-airspot-uname-xss(26759)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26759"
},
{
"name": "ADV-2006-2028",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2028"
},
{
"name" : "1016173",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016173"
},
{
"name": "20343",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20343"
},
{
"name": "1016173",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016173"
},
{
"name": "980",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/980"
},
{
"name" : "dlink-airspot-uname-xss(26759)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26759"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.amule.org/wiki/index.php/Changelog_2.1.2",
"refsource" : "CONFIRM",
"url" : "http://www.amule.org/wiki/index.php/Changelog_2.1.2"
},
{
"name": "18145",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "20351",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20351"
},
{
"name": "http://www.amule.org/wiki/index.php/Changelog_2.1.2",
"refsource": "CONFIRM",
"url": "http://www.amule.org/wiki/index.php/Changelog_2.1.2"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-5474",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "7294",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7294"
"name": "4779",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4779"
},
{
"name": "32538",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32538"
},
{
"name" : "ADV-2008-3300",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3300"
},
{
"name": "32910",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32910"
},
{
"name" : "4779",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4779"
},
{
"name": "litolite-cate-sql-injection(46923)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46923"
},
{
"name": "7294",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7294"
},
{
"name": "ADV-2008-3300",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3300"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "7344",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7344"
},
{
"name": "32646",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32646"
},
{
"name": "7344",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7344"
},
{
"name": "32982",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2091",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-14.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-14.html"
"name": "coldfusion-unspec-dos(68028)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68028"
},
{
"name": "73050",
@ -63,9 +63,9 @@
"url": "http://osvdb.org/73050"
},
{
"name" : "coldfusion-unspec-dos(68028)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68028"
"name": "http://www.adobe.com/support/security/bulletins/apsb11-14.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-14.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2099",
"STATE": "PUBLIC"
},
@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-16.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
},
{
"name" : "TA11-166A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
},
{
"name" : "48246",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/48246"
},
{
"name" : "73061",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/73061"
"name": "reader-acrobat-ce(68013)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68013"
},
{
"name": "oval:org.mitre.oval:def:13684",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13684"
},
{
"name": "48246",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48246"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-16.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
},
{
"name": "73061",
"refsource": "OSVDB",
"url": "http://osvdb.org/73061"
},
{
"name": "TA11-166A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
},
{
"name": "1025658",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025658"
},
{
"name" : "reader-acrobat-ce(68013)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68013"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-2230",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
},
{
"name": "TA11-201A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2520",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "FEDORA-2011-9652",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063314.html"
},
{
"name": "systemconfigfirewall-priv-escalation(68734)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68734"
},
{
"name": "[oss-security] 20110718 CVE-2011-2520: flaw in system-config-firewall's usage of pickle allows privilege escalation",
"refsource": "MLIST",
@ -62,11 +72,6 @@
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=717985"
},
{
"name" : "FEDORA-2011-9652",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063314.html"
},
{
"name": "RHSA-2011:0953",
"refsource": "REDHAT",
@ -86,11 +91,6 @@
"name": "45294",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45294"
},
{
"name" : "systemconfigfirewall-priv-escalation(68734)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68734"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2940",
"STATE": "PUBLIC"
},
@ -57,41 +57,41 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/19/6"
},
{
"name": "1025959",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025959"
},
{
"name": "[oss-security] 20110819 Re: CVE request: stunnel 4.4x heap overflow flaw",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/19/18"
},
{
"name" : "[stunnel-announce] 20110818 stunnel 4.42 released",
"refsource" : "MLIST",
"url" : "http://www.stunnel.org/pipermail/stunnel-announce/2011-August/000059.html"
},
{
"name" : "http://stunnel.org/?page=sdf_ChangeLog",
"refsource" : "CONFIRM",
"url" : "http://stunnel.org/?page=sdf_ChangeLog"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=732068",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732068"
},
{
"name": "http://stunnel.org/?page=sdf_ChangeLog",
"refsource": "CONFIRM",
"url": "http://stunnel.org/?page=sdf_ChangeLog"
},
{
"name": "49254",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49254"
},
{
"name": "[stunnel-announce] 20110818 stunnel 4.42 released",
"refsource": "MLIST",
"url": "http://www.stunnel.org/pipermail/stunnel-announce/2011-August/000059.html"
},
{
"name": "74600",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/74600"
},
{
"name" : "1025959",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1025959"
},
{
"name": "45705",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3194",
"STATE": "PUBLIC"
},
@ -53,94 +53,34 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20120822 CVE request: libqt4: two memory issues",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/08/22/6"
},
{
"name" : "[oss-security] 20120824 Re: CVE request: libqt4: two memory issues",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/08/24/8"
},
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=637275",
"refsource" : "MISC",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=637275"
},
{
"name" : "https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465",
"refsource" : "CONFIRM",
"url" : "https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465"
},
{
"name" : "FEDORA-2011-12145",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html"
},
{
"name" : "GLSA-201206-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201206-02.xml"
},
{
"name" : "RHSA-2011:1323",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2011-1323.html"
},
{
"name" : "RHSA-2011:1328",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2011-1328.html"
},
{
"name" : "SUSE-SU-2011:1113",
"refsource" : "SUSE",
"url" : "https://hermes.opensuse.org/messages/12056605"
},
{
"name" : "openSUSE-SU-2011:1119",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html"
},
{
"name" : "openSUSE-SU-2011:1120",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html"
"name": "46371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46371"
},
{
"name": "USN-1504-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1504-1"
},
{
"name" : "49724",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/49724"
},
{
"name" : "75653",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/75653"
},
{
"name" : "46128",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46128"
},
{
"name": "46140",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46140"
},
{
"name" : "46187",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46187"
"name": "[oss-security] 20120824 Re: CVE request: libqt4: two memory issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/24/8"
},
{
"name" : "46371",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46371"
"name": "GLSA-201206-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201206-02.xml"
},
{
"name": "openSUSE-SU-2011:1119",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html"
},
{
"name": "46410",
@ -148,9 +88,29 @@
"url": "http://secunia.com/advisories/46410"
},
{
"name" : "49383",
"name": "qt-grayscale-bo(69975)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69975"
},
{
"name": "[oss-security] 20120822 CVE request: libqt4: two memory issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/6"
},
{
"name": "https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465",
"refsource": "CONFIRM",
"url": "https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465"
},
{
"name": "46128",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/49383"
"url": "http://secunia.com/advisories/46128"
},
{
"name": "46187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46187"
},
{
"name": "49895",
@ -158,9 +118,49 @@
"url": "http://secunia.com/advisories/49895"
},
{
"name" : "qt-grayscale-bo(69975)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69975"
"name": "https://bugzilla.novell.com/show_bug.cgi?id=637275",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=637275"
},
{
"name": "49383",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49383"
},
{
"name": "49724",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49724"
},
{
"name": "FEDORA-2011-12145",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html"
},
{
"name": "RHSA-2011:1323",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1323.html"
},
{
"name": "SUSE-SU-2011:1113",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/12056605"
},
{
"name": "RHSA-2011:1328",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1328.html"
},
{
"name": "75653",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/75653"
},
{
"name": "openSUSE-SU-2011:1120",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-3539",
"STATE": "PUBLIC"
},
@ -57,16 +57,16 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
},
{
"name" : "50270",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/50270"
},
{
"name": "76473",
"refsource": "OSVDB",
"url": "http://osvdb.org/76473"
},
{
"name": "50270",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50270"
},
{
"name": "orasun-sol-zones-unspecified(70812)",
"refsource": "XF",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-3567",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-0080",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-0788",
"STATE": "PUBLIC"
},
@ -52,110 +52,110 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-30.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-30.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=635852",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=635852"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=771942",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=771942"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=784730",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=784730"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=813442",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=813442"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=827870",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=827870"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=834240",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=834240"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=839621",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=839621"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=840263",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=840263"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=840353",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=840353"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=852923",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=852923"
},
{
"name" : "DSA-2699",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2699"
},
{
"name" : "RHSA-2013:0696",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0696.html"
},
{
"name" : "RHSA-2013:0697",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0697.html"
},
{
"name" : "openSUSE-SU-2013:0630",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html"
},
{
"name" : "SUSE-SU-2013:0645",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html"
},
{
"name" : "openSUSE-SU-2013:0631",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html"
},
{
"name": "SUSE-SU-2013:0850",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html"
},
{
"name" : "openSUSE-SU-2013:0875",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html"
},
{
"name": "USN-1791-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1791-1"
},
{
"name": "DSA-2699",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2699"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=840353",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=840353"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=784730",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=784730"
},
{
"name": "openSUSE-SU-2013:0630",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=813442",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=813442"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=839621",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=839621"
},
{
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-30.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-30.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=827870",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=827870"
},
{
"name": "RHSA-2013:0696",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0696.html"
},
{
"name": "oval:org.mitre.oval:def:16629",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16629"
},
{
"name": "openSUSE-SU-2013:0631",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=771942",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=771942"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=852923",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=852923"
},
{
"name": "RHSA-2013:0697",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0697.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=840263",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=840263"
},
{
"name": "SUSE-SU-2013:0645",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html"
},
{
"name": "openSUSE-SU-2013:0875",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2013-0905",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_4.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=168982",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=168982"
},
{
"name": "oval:org.mitre.oval:def:16495",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16495"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=168982",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=168982"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-0974",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5642"
},
{
"name" : "APPLE-SA-2013-01-28-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
},
{
"name": "89658",
"refsource": "OSVDB",
"url": "http://osvdb.org/89658"
},
{
"name": "APPLE-SA-2013-01-28-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2013-1067",
"STATE": "PUBLIC"
},

View File

@ -52,55 +52,55 @@
},
"references": {
"reference_data": [
{
"name" : "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600",
"refsource" : "CONFIRM",
"url" : "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600"
},
{
"name" : "https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81",
"refsource" : "CONFIRM",
"url" : "https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81"
},
{
"name" : "FEDORA-2013-5280",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html"
},
{
"name" : "FEDORA-2013-5286",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html"
},
{
"name": "MDVSA-2013:157",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:157"
},
{
"name" : "MDVSA-2013:158",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:158"
},
{
"name" : "RHSA-2013:0748",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0748.html"
},
{
"name" : "openSUSE-SU-2013:0746",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html"
},
{
"name": "openSUSE-SU-2013:0904",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html"
},
{
"name": "MDVSA-2013:158",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:158"
},
{
"name": "FEDORA-2013-5286",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html"
},
{
"name": "openSUSE-SU-2013:0967",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html"
},
{
"name": "openSUSE-SU-2013:0746",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html"
},
{
"name": "FEDORA-2013-5280",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html"
},
{
"name": "https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81",
"refsource": "CONFIRM",
"url": "https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81"
},
{
"name": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600",
"refsource": "CONFIRM",
"url": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600"
},
{
"name": "RHSA-2013:0748",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0748.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html"
},
{
"name": "http://www.digitalsec.net/stuff/explt+advs/DS3.AuthServer.txt",
"refsource": "MISC",
"url": "http://www.digitalsec.net/stuff/explt+advs/DS3.AuthServer.txt"
},
{
"name": "http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4507",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-5427",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-2435",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
},
{
"name" : "GLSA-201409-04",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201409-04.xml"
},
{
"name": "66853",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66853"
},
{
"name": "GLSA-201409-04",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201409-04.xml"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2014-2639",
"STATE": "PUBLIC"
},

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026"
},
{
"name": "96032",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96032"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026"
},
{
"name": "1038017",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-09-05T00:00:00",
"ID": "CVE-2017-0775",
"STATE": "PUBLIC"
@ -77,15 +77,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-09-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-09-01"
},
{
"name": "100649",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100649"
},
{
"name": "https://source.android.com/security/bulletin/2017-09-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-09-01"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://hackerone.com/reports/169680",
"refsource" : "MISC",
"url" : "https://hackerone.com/reports/169680"
},
{
"name": "https://nextcloud.com/security/advisory/?id=nc-sa-2017-002",
"refsource": "CONFIRM",
"url": "https://nextcloud.com/security/advisory/?id=nc-sa-2017-002"
},
{
"name": "https://hackerone.com/reports/169680",
"refsource": "MISC",
"url": "https://hackerone.com/reports/169680"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000484",
"REQUESTER": "security@plone.org",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Plone",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.5-5.1rc1"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Plone Foundation"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Open Redirection"
"value": "n/a"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16425",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -67,15 +67,15 @@
"refsource": "MISC",
"url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/"
},
{
"name" : "USN-3615-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3615-1/"
},
{
"name": "76000",
"refsource": "SECUNIA",
"url": "https://secuniaresearch.flexerasoftware.com/advisories/76000/"
},
{
"name": "USN-3615-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3615-1/"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4035",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4165",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4179",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-5415",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{