"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:33:24 +00:00
parent 05e2b3227c
commit 67feee35b1
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
63 changed files with 4149 additions and 4149 deletions

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20020502 KPMG-2002017: Snapgear Lite+ Firewall Denial of Service", "name": "4660",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://marc.info/?l=bugtraq&m=102035583114759&w=2" "url": "http://www.securityfocus.com/bid/4660"
},
{
"name" : "20020502 [VulnWatch] KPMG-2002017: Snapgear Lite+ Firewall Denial of Service",
"refsource" : "VULNWATCH",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0050.html"
}, },
{ {
"name": "http://www.snapgear.com/releases.html", "name": "http://www.snapgear.com/releases.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.snapgear.com/releases.html" "url": "http://www.snapgear.com/releases.html"
}, },
{
"name": "20020502 [VulnWatch] KPMG-2002017: Snapgear Lite+ Firewall Denial of Service",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0050.html"
},
{ {
"name": "snapgear-vpn-ipoptions-dos(8988)", "name": "snapgear-vpn-ipoptions-dos(8988)",
"refsource": "XF", "refsource": "XF",
"url": "http://www.iss.net/security_center/static/8988.php" "url": "http://www.iss.net/security_center/static/8988.php"
}, },
{ {
"name" : "4660", "name": "20020502 KPMG-2002017: Snapgear Lite+ Firewall Denial of Service",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/4660" "url": "http://marc.info/?l=bugtraq&m=102035583114759&w=2"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "A071202-1", "name": "pingtel-xpressa-plaintext-passwords(9565)",
"refsource" : "ATSTAKE", "refsource": "XF",
"url" : "http://www.atstake.com/research/advisories/2002/a071202-1.txt" "url": "http://www.iss.net/security_center/static/9565.php"
}, },
{ {
"name": "http://www.pingtel.com/PingtelAtStakeAdvisoryResponse.jsp", "name": "http://www.pingtel.com/PingtelAtStakeAdvisoryResponse.jsp",
@ -63,9 +63,9 @@
"url": "http://www.pingtel.com/PingtelAtStakeAdvisoryResponse.jsp" "url": "http://www.pingtel.com/PingtelAtStakeAdvisoryResponse.jsp"
}, },
{ {
"name" : "pingtel-xpressa-plaintext-passwords(9565)", "name": "A071202-1",
"refsource" : "XF", "refsource": "ATSTAKE",
"url" : "http://www.iss.net/security_center/static/9565.php" "url": "http://www.atstake.com/research/advisories/2002/a071202-1.txt"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "http://online.securityfocus.com/archive/1/273615" "url": "http://online.securityfocus.com/archive/1/273615"
}, },
{ {
"name" : "20020522 [VulnWatch] Multiple vulnerabilities in NewAtlanta ServletExec ISAPI 4.1", "name": "4795",
"refsource" : "VULNWATCH", "refsource": "BID",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0077.html" "url": "http://www.securityfocus.com/bid/4795"
}, },
{ {
"name": "servletexec-dotdot-directory-traversal(9140)", "name": "servletexec-dotdot-directory-traversal(9140)",
@ -68,9 +68,9 @@
"url": "http://www.iss.net/security_center/static/9140.php" "url": "http://www.iss.net/security_center/static/9140.php"
}, },
{ {
"name" : "4795", "name": "20020522 [VulnWatch] Multiple vulnerabilities in NewAtlanta ServletExec ISAPI 4.1",
"refsource" : "BID", "refsource": "VULNWATCH",
"url" : "http://www.securityfocus.com/bid/4795" "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0077.html"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.idefense.com/advisory/10.31.02a.txt",
"refsource" : "MISC",
"url" : "http://www.idefense.com/advisory/10.31.02a.txt"
},
{
"name" : "20021101 iDEFENSE Security Advisory 10.31.02a: Denial of Service Vulnerability in Linksys BEFSR41 EtherFast Cable/DSL Router",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=103616324103171&w=2"
},
{ {
"name": "20021101 iDEFENSE Security Advisory 10.31.02a: Denial of Service Vulnerability in Linksys BEFSR41 EtherFast Cable/DSL Router", "name": "20021101 iDEFENSE Security Advisory 10.31.02a: Denial of Service Vulnerability in Linksys BEFSR41 EtherFast Cable/DSL Router",
"refsource": "VULNWATCH", "refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0049.html" "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0049.html"
}, },
{
"name": "6086",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6086"
},
{
"name": "http://www.idefense.com/advisory/10.31.02a.txt",
"refsource": "MISC",
"url": "http://www.idefense.com/advisory/10.31.02a.txt"
},
{ {
"name": "linksys-etherfast-gozila-dos(10514)", "name": "linksys-etherfast-gozila-dos(10514)",
"refsource": "XF", "refsource": "XF",
"url": "http://www.iss.net/security_center/static/10514.php" "url": "http://www.iss.net/security_center/static/10514.php"
}, },
{ {
"name" : "6086", "name": "20021101 iDEFENSE Security Advisory 10.31.02a: Denial of Service Vulnerability in Linksys BEFSR41 EtherFast Cable/DSL Router",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/6086" "url": "http://marc.info/?l=bugtraq&m=103616324103171&w=2"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20020904 Bypassing the Finjan SurfinGate URL filter",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-09/0032.html"
},
{ {
"name": "20020904 RE: Bypassing the Finjan SurfinGate URL filter", "name": "20020904 RE: Bypassing the Finjan SurfinGate URL filter",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -67,6 +62,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/5634" "url": "http://www.securityfocus.com/bid/5634"
}, },
{
"name": "20020904 Bypassing the Finjan SurfinGate URL filter",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0032.html"
},
{ {
"name": "finjan-surfingate-dot-bypass(10037)", "name": "finjan-surfingate-dot-bypass(10037)",
"refsource": "XF", "refsource": "XF",

View File

@ -58,9 +58,9 @@
"url": "http://online.securityfocus.com/archive/1/291058" "url": "http://online.securityfocus.com/archive/1/291058"
}, },
{ {
"name" : "20020909 Small correction...", "name": "5682",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-09/0082.html" "url": "http://www.securityfocus.com/bid/5682"
}, },
{ {
"name": "outlook-express-href-dos(10067)", "name": "outlook-express-href-dos(10067)",
@ -68,9 +68,9 @@
"url": "http://www.iss.net/security_center/static/10067.php" "url": "http://www.iss.net/security_center/static/10067.php"
}, },
{ {
"name" : "5682", "name": "20020909 Small correction...",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/5682" "url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0082.html"
} }
] ]
} }

View File

@ -52,31 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS03-024",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-024"
},
{ {
"name": "VU#337764", "name": "VU#337764",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/337764" "url": "http://www.kb.cert.org/vuls/id/337764"
}, },
{
"name": "9225",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/9225"
},
{ {
"name": "oval:org.mitre.oval:def:146", "name": "oval:org.mitre.oval:def:146",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A146" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A146"
}, },
{
"name" : "win-smb-bo(12544)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/12544"
},
{
"name" : "8152",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/8152"
},
{ {
"name": "oval:org.mitre.oval:def:118", "name": "oval:org.mitre.oval:def:118",
"refsource": "OVAL", "refsource": "OVAL",
@ -87,15 +77,25 @@
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3391" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3391"
}, },
{
"name": "win-smb-bo(12544)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12544"
},
{
"name": "MS03-024",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-024"
},
{
"name": "8152",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/8152"
},
{ {
"name": "1007154", "name": "1007154",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1007154" "url": "http://securitytracker.com/id?1007154"
},
{
"name" : "9225",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/9225"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.punbb.org/",
"refsource" : "CONFIRM",
"url" : "http://www.punbb.org/"
},
{ {
"name": "14882", "name": "14882",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14882" "url": "http://secunia.com/advisories/14882"
},
{
"name": "http://www.punbb.org/",
"refsource": "CONFIRM",
"url": "http://www.punbb.org/"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-May/033705.html" "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-May/033705.html"
}, },
{
"name" : "http://www.digitalmunition.com/DMA[2005-0501a].txt",
"refsource" : "MISC",
"url" : "http://www.digitalmunition.com/DMA[2005-0501a].txt"
},
{ {
"name": "1013855", "name": "1013855",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -71,6 +66,11 @@
"name": "15197", "name": "15197",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15197" "url": "http://secunia.com/advisories/15197"
},
{
"name": "http://www.digitalmunition.com/DMA[2005-0501a].txt",
"refsource": "MISC",
"url": "http://www.digitalmunition.com/DMA[2005-0501a].txt"
} }
] ]
} }

View File

@ -57,26 +57,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971588.htm" "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971588.htm"
}, },
{
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm"
},
{
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm"
},
{
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm"
},
{
"name" : "13926",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/13926"
},
{ {
"name": "ADV-2005-0727", "name": "ADV-2005-0727",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -87,10 +67,30 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/17240" "url": "http://www.osvdb.org/17240"
}, },
{
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm",
"refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm"
},
{ {
"name": "15644", "name": "15644",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15644" "url": "http://secunia.com/advisories/15644"
},
{
"name": "13926",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/13926"
},
{
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm",
"refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm"
},
{
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm",
"refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm"
} }
] ]
} }

View File

@ -57,20 +57,20 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971588.htm" "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971588.htm"
}, },
{
"name": "ADV-2005-0727",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/0727"
},
{ {
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm", "name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm" "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm"
}, },
{ {
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm", "name": "15644",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm" "url": "http://secunia.com/advisories/15644"
},
{
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm"
}, },
{ {
"name": "13926", "name": "13926",
@ -78,9 +78,9 @@
"url": "http://www.securityfocus.com/bid/13926" "url": "http://www.securityfocus.com/bid/13926"
}, },
{ {
"name" : "ADV-2005-0727", "name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2005/0727" "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm"
}, },
{ {
"name": "17241", "name": "17241",
@ -88,9 +88,9 @@
"url": "http://www.osvdb.org/17241" "url": "http://www.osvdb.org/17241"
}, },
{ {
"name" : "15644", "name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/15644" "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.princeofnigeria.org/blogs/index.php/2009/05/17/netdecision-tftp-server-4-2-tftp-directo?blog=1" "url": "http://www.princeofnigeria.org/blogs/index.php/2009/05/17/netdecision-tftp-server-4-2-tftp-directo?blog=1"
}, },
{
"name" : "35002",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35002"
},
{ {
"name": "35131", "name": "35131",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -71,6 +66,11 @@
"name": "netdecision-tftp-dir-traversal(50574)", "name": "netdecision-tftp-dir-traversal(50574)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50574" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50574"
},
{
"name": "35002",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35002"
} }
] ]
} }

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[dev] 20090424 Buffer overflow in apr_brigade_vprintf() ?", "name": "35487",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://www.mail-archive.com/dev@apr.apache.org/msg21591.html" "url": "http://secunia.com/advisories/35487"
},
{
"name" : "[dev] 20090424 Re: Buffer overflow in apr_brigade_vprintf() ?",
"refsource" : "MLIST",
"url" : "http://www.mail-archive.com/dev@apr.apache.org/msg21592.html"
},
{
"name" : "[oss-security] 20090605 CVE Request (apr-util)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2009/06/06/1"
},
{
"name" : "http://svn.apache.org/viewvc?view=rev&revision=768417",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=rev&revision=768417"
}, },
{ {
"name": "http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3", "name": "http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3",
@ -78,44 +63,9 @@
"url": "http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3" "url": "http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=504390", "name": "ADV-2009-1907",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=504390" "url": "http://www.vupen.com/english/advisories/2009/1907"
},
{
"name" : "http://support.apple.com/kb/HT3937",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3937"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014463"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
},
{
"name" : "PK88341",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK88341"
},
{
"name" : "PK91241",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241"
},
{
"name" : "PK99478",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478"
},
{
"name" : "APPLE-SA-2009-11-09-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
}, },
{ {
"name": "FEDORA-2009-5969", "name": "FEDORA-2009-5969",
@ -123,129 +73,179 @@
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html"
}, },
{ {
"name" : "FEDORA-2009-6014", "name": "PK88341",
"refsource" : "FEDORA", "refsource": "AIXAPAR",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK88341"
},
{
"name" : "FEDORA-2009-6261",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html"
},
{
"name" : "GLSA-200907-03",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200907-03.xml"
},
{
"name" : "HPSBUX02612",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=129190899612998&w=2"
},
{
"name" : "SSRT100345",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=129190899612998&w=2"
}, },
{ {
"name": "MDVSA-2009:131", "name": "MDVSA-2009:131",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:131" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:131"
}, },
{
"name" : "MDVSA-2013:150",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name" : "RHSA-2009:1107",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1107.html"
},
{
"name" : "RHSA-2009:1108",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1108.html"
},
{
"name" : "USN-786-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-786-1"
},
{
"name" : "USN-787-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-787-1"
},
{
"name" : "35251",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35251"
},
{
"name" : "oval:org.mitre.oval:def:11567",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11567"
},
{
"name" : "oval:org.mitre.oval:def:12237",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12237"
},
{
"name" : "34724",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34724"
},
{
"name" : "35487",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35487"
},
{ {
"name": "35395", "name": "35395",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35395" "url": "http://secunia.com/advisories/35395"
}, },
{ {
"name" : "35565", "name": "PK99478",
"refsource" : "SECUNIA", "refsource": "AIXAPAR",
"url" : "http://secunia.com/advisories/35565" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478"
},
{
"name" : "35710",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35710"
}, },
{ {
"name": "35284", "name": "35284",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35284" "url": "http://secunia.com/advisories/35284"
}, },
{
"name": "PK91241",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241"
},
{
"name": "[oss-security] 20090605 CVE Request (apr-util)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/06/06/1"
},
{
"name": "35251",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35251"
},
{ {
"name": "35843", "name": "35843",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35843" "url": "http://secunia.com/advisories/35843"
}, },
{
"name": "FEDORA-2009-6014",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html"
},
{
"name": "RHSA-2009:1108",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1108.html"
},
{
"name": "HPSBUX02612",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=129190899612998&w=2"
},
{ {
"name": "35797", "name": "35797",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35797" "url": "http://secunia.com/advisories/35797"
}, },
{
"name": "http://svn.apache.org/viewvc?view=rev&revision=768417",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=rev&revision=768417"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
},
{
"name": "GLSA-200907-03",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200907-03.xml"
},
{
"name": "[dev] 20090424 Re: Buffer overflow in apr_brigade_vprintf() ?",
"refsource": "MLIST",
"url": "http://www.mail-archive.com/dev@apr.apache.org/msg21592.html"
},
{
"name": "oval:org.mitre.oval:def:11567",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11567"
},
{
"name": "FEDORA-2009-6261",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html"
},
{
"name": "[dev] 20090424 Buffer overflow in apr_brigade_vprintf() ?",
"refsource": "MLIST",
"url": "http://www.mail-archive.com/dev@apr.apache.org/msg21591.html"
},
{
"name": "USN-786-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-786-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=504390",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504390"
},
{
"name": "34724",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34724"
},
{ {
"name": "37221", "name": "37221",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37221" "url": "http://secunia.com/advisories/37221"
}, },
{ {
"name" : "ADV-2009-1907", "name": "35565",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2009/1907" "url": "http://secunia.com/advisories/35565"
}, },
{ {
"name": "ADV-2009-3184", "name": "ADV-2009-3184",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3184" "url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "SSRT100345",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=129190899612998&w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463"
},
{
"name": "APPLE-SA-2009-11-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "35710",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35710"
},
{
"name": "RHSA-2009:1107",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1107.html"
},
{
"name": "http://support.apple.com/kb/HT3937",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3937"
},
{
"name": "oval:org.mitre.oval:def:12237",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12237"
},
{
"name": "USN-787-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-787-1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2009-1977", "ID": "CVE-2009-1977",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,41 +52,41 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-09-058/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-09-058/"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
},
{ {
"name": "35672", "name": "35672",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/35672" "url": "http://www.securityfocus.com/bid/35672"
}, },
{
"name" : "55903",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/55903"
},
{
"name" : "1022565",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1022565"
},
{ {
"name": "35776", "name": "35776",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35776" "url": "http://secunia.com/advisories/35776"
}, },
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-09-058/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-058/"
},
{ {
"name": "ADV-2009-1900", "name": "ADV-2009-1900",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1900" "url": "http://www.vupen.com/english/advisories/2009/1900"
}, },
{
"name": "55903",
"refsource": "OSVDB",
"url": "http://osvdb.org/55903"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
},
{
"name": "1022565",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022565"
},
{ {
"name": "oracle-securebackup-sbc-unspecified(51761)", "name": "oracle-securebackup-sbc-unspecified(51761)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-0098", "ID": "CVE-2012-0098",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "name": "sun-solarisunknown-dos(72510)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72510"
},
{
"name" : "78427",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/78427"
}, },
{ {
"name": "48308", "name": "48308",
@ -68,9 +63,14 @@
"url": "http://secunia.com/advisories/48308" "url": "http://secunia.com/advisories/48308"
}, },
{ {
"name" : "sun-solarisunknown-dos(72510)", "name": "78427",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72510" "url": "http://osvdb.org/78427"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-0222", "ID": "CVE-2012-0222",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-0230", "ID": "CVE-2012-0230",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "52434",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52434"
},
{
"name": "proficy-plant-prrds-code-exec(73956)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73956"
},
{
"name": "48415",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48415"
},
{ {
"name": "http://support.ge-ip.com/support/index?page=kbchannel&id=S:KB14766", "name": "http://support.ge-ip.com/support/index?page=kbchannel&id=S:KB14766",
"refsource": "MISC", "refsource": "MISC",
@ -61,21 +76,6 @@
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-032-02.pdf", "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-032-02.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-032-02.pdf" "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-032-02.pdf"
},
{
"name" : "52434",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/52434"
},
{
"name" : "48415",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48415"
},
{
"name" : "proficy-plant-prrds-code-exec(73956)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73956"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-0538", "ID": "CVE-2012-0538",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "48882",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48882"
},
{
"name": "1026954",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026954"
},
{
"name": "53065",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53065"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,21 +76,6 @@
"name": "MDVSA-2013:150", "name": "MDVSA-2013:150",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name" : "53065",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/53065"
},
{
"name" : "1026954",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1026954"
},
{
"name" : "48882",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48882"
} }
] ]
} }

View File

@ -67,15 +67,15 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47723" "url": "http://secunia.com/advisories/47723"
}, },
{
"name" : "schneider-modicon-ftp-dos(72589)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72589"
},
{ {
"name": "schneider-modicon-http-dos(72588)", "name": "schneider-modicon-http-dos(72588)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72588" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72588"
},
{
"name": "schneider-modicon-ftp-dos(72589)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72589"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2012-0966", "ID": "CVE-2012-0966",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2012-3281", "ID": "CVE-2012-3281",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2012-3308", "ID": "CVE-2012-3308",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21599114",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21599114"
},
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21607903",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21607903"
},
{ {
"name": "1027402", "name": "1027402",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -71,6 +61,16 @@
"name": "ibm-sametime-xss(77567)", "name": "ibm-sametime-xss(77567)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77567" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77567"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21607903",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21607903"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21599114",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21599114"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2012-3322", "ID": "CVE-2012-3322",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21625624",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21625624"
},
{ {
"name": "IV23838", "name": "IV23838",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV23838" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV23838"
}, },
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21625624",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21625624"
},
{ {
"name": "mam-displayname-xss(77918)", "name": "mam-displayname-xss(77918)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-3915", "ID": "CVE-2012-3915",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "81684",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/81684"
},
{ {
"name": "49029", "name": "49029",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -66,6 +61,11 @@
"name": "mycare2xcms-multiple-sql-injection-(75390)", "name": "mycare2xcms-multiple-sql-injection-(75390)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75390" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75390"
},
{
"name": "81684",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/81684"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2012-4696", "ID": "CVE-2012-4696",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.us-cert.gov/control_systems/pdf/ICSA-13-024-01.pdf",
"refsource" : "MISC",
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-13-024-01.pdf"
},
{ {
"name": "57546", "name": "57546",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/57546" "url": "http://www.securityfocus.com/bid/57546"
},
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-024-01.pdf",
"refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-024-01.pdf"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@suse.com",
"ID": "CVE-2012-6703", "ID": "CVE-2012-6703",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -62,16 +62,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b35cc8225845112a616e3a2266d2fde5ab13d3ab" "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b35cc8225845112a616e3a2266d2fde5ab13d3ab"
}, },
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1351076",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1351076"
},
{ {
"name": "https://github.com/torvalds/linux/commit/b35cc8225845112a616e3a2266d2fde5ab13d3ab", "name": "https://github.com/torvalds/linux/commit/b35cc8225845112a616e3a2266d2fde5ab13d3ab",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/b35cc8225845112a616e3a2266d2fde5ab13d3ab" "url": "https://github.com/torvalds/linux/commit/b35cc8225845112a616e3a2266d2fde5ab13d3ab"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1351076",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351076"
},
{ {
"name": "https://www.kernel.org/pub/linux/kernel/next/patch-v3.6-rc6-next-20120917.xz", "name": "https://www.kernel.org/pub/linux/kernel/next/patch-v3.6-rc6-next-20120917.xz",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "larry0@me.com",
"DATE_ASSIGNED": "2017-03-01", "DATE_ASSIGNED": "2017-03-01",
"ID": "CVE-2017-1002002", "ID": "CVE-2017-1002002",
"REQUESTER": "kurt@seifried.org", "REQUESTER": "kurt@seifried.org",
@ -57,14 +57,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "41540", "name": "96906",
"refsource" : "EXPLOIT-DB", "refsource": "BID",
"url" : "https://www.exploit-db.com/exploits/41540/" "url": "http://www.securityfocus.com/bid/96906"
},
{
"name" : "http://www.vapidlabs.com/advisory.php?v=181",
"refsource" : "MISC",
"url" : "http://www.vapidlabs.com/advisory.php?v=181"
}, },
{ {
"name": "https://wordpress.org/plugins-wp/webapp-builder/", "name": "https://wordpress.org/plugins-wp/webapp-builder/",
@ -72,9 +67,14 @@
"url": "https://wordpress.org/plugins-wp/webapp-builder/" "url": "https://wordpress.org/plugins-wp/webapp-builder/"
}, },
{ {
"name" : "96906", "name": "http://www.vapidlabs.com/advisory.php?v=181",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/96906" "url": "http://www.vapidlabs.com/advisory.php?v=181"
},
{
"name": "41540",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41540/"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "97113",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97113"
},
{ {
"name": "http://www.securebrain.co.jp/about/news/2017/03/170316.html", "name": "http://www.securebrain.co.jp/about/news/2017/03/170316.html",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "JVN#93699304", "name": "JVN#93699304",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN93699304/index.html" "url": "http://jvn.jp/en/jp/JVN93699304/index.html"
},
{
"name" : "97113",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97113"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT207617", "name": "1038139",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT207617" "url": "http://www.securitytracker.com/id/1038139"
}, },
{ {
"name": "97138", "name": "97138",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/97138" "url": "http://www.securityfocus.com/bid/97138"
}, },
{ {
"name" : "1038139", "name": "https://support.apple.com/HT207617",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1038139" "url": "https://support.apple.com/HT207617"
} }
] ]
} }

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20170216 Linux: CVE-2017-6001: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", "name": "96264",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2017/02/16/1" "url": "http://www.securityfocus.com/bid/96264"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825",
@ -77,40 +67,50 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/321027c1fe77f892f4ea07846aeae08cefbbb290" "url": "https://github.com/torvalds/linux/commit/321027c1fe77f892f4ea07846aeae08cefbbb290"
}, },
{
"name" : "https://source.android.com/security/bulletin/pixel/2017-11-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/pixel/2017-11-01"
},
{
"name" : "DSA-3791",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3791"
},
{ {
"name": "RHSA-2017:2669", "name": "RHSA-2017:2669",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2669" "url": "https://access.redhat.com/errata/RHSA-2017:2669"
}, },
{
"name" : "RHSA-2017:1842",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1842"
},
{
"name" : "RHSA-2017:2077",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2077"
},
{ {
"name": "RHSA-2018:1854", "name": "RHSA-2018:1854",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1854" "url": "https://access.redhat.com/errata/RHSA-2018:1854"
}, },
{ {
"name" : "96264", "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/96264" "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7"
},
{
"name": "https://source.android.com/security/bulletin/pixel/2017-11-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/pixel/2017-11-01"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290"
},
{
"name": "RHSA-2017:2077",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2077"
},
{
"name": "RHSA-2017:1842",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1842"
},
{
"name": "DSA-3791",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3791"
},
{
"name": "[oss-security] 20170216 Linux: CVE-2017-6001: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/02/16/1"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-ios1" "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-ios1"
}, },
{
"name" : "99226",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99226"
},
{ {
"name": "1038741", "name": "1038741",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038741" "url": "http://www.securitytracker.com/id/1038741"
},
{
"name": "99226",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99226"
} }
] ]
} }

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-asa2" "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-asa2"
}, },
{
"name" : "100113",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/100113"
},
{ {
"name": "1039057", "name": "1039057",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039057" "url": "http://www.securitytracker.com/id/1039057"
},
{
"name": "100113",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100113"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "sfowler@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-7497", "ID": "CVE-2017-7497",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,20 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/hercules-team/augeas/pull/480",
"refsource" : "MISC",
"url" : "https://github.com/hercules-team/augeas/pull/480"
},
{ {
"name": "https://puppet.com/security/cve/cve-2017-7555", "name": "https://puppet.com/security/cve/cve-2017-7555",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://puppet.com/security/cve/cve-2017-7555" "url": "https://puppet.com/security/cve/cve-2017-7555"
}, },
{ {
"name" : "DSA-3949", "name": "100378",
"refsource" : "DEBIAN", "refsource": "BID",
"url" : "http://www.debian.org/security/2017/dsa-3949" "url": "http://www.securityfocus.com/bid/100378"
}, },
{ {
"name": "RHSA-2017:2788", "name": "RHSA-2017:2788",
@ -74,9 +69,14 @@
"url": "https://access.redhat.com/errata/RHSA-2017:2788" "url": "https://access.redhat.com/errata/RHSA-2017:2788"
}, },
{ {
"name" : "100378", "name": "https://github.com/hercules-team/augeas/pull/480",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/100378" "url": "https://github.com/hercules-team/augeas/pull/480"
},
{
"name": "DSA-3949",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3949"
} }
] ]
} }

View File

@ -53,25 +53,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20180825 [SECURITY] [DLA 1477-1] libgit2 security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/08/msg00024.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1598024",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1598024"
},
{ {
"name": "https://github.com/libgit2/libgit2/commit/9844d38bed10e9ff17174434b3421b227ae710f3", "name": "https://github.com/libgit2/libgit2/commit/9844d38bed10e9ff17174434b3421b227ae710f3",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/libgit2/libgit2/commit/9844d38bed10e9ff17174434b3421b227ae710f3" "url": "https://github.com/libgit2/libgit2/commit/9844d38bed10e9ff17174434b3421b227ae710f3"
}, },
{
"name": "[debian-lts-announce] 20180825 [SECURITY] [DLA 1477-1] libgit2 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00024.html"
},
{ {
"name": "https://github.com/libgit2/libgit2/releases/tag/v0.27.3", "name": "https://github.com/libgit2/libgit2/releases/tag/v0.27.3",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/libgit2/libgit2/releases/tag/v0.27.3" "url": "https://github.com/libgit2/libgit2/releases/tag/v0.27.3"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1598024",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1598024"
} }
] ]
} }

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[trafficserver-announce] 20190212 [ANNOUNCE] Apache Traffic Server vulnerability with sslheader plugin",
"refsource" : "MLIST",
"url" : "https://lists.apache.org/thread.html/4f102f943935476732fb1fb653d687c7b69d29d9792f0d6cf72c505e@%3Cannounce.trafficserver.apache.org%3E"
},
{ {
"name": "107032", "name": "107032",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/107032" "url": "http://www.securityfocus.com/bid/107032"
},
{
"name": "[trafficserver-announce] 20190212 [ANNOUNCE] Apache Traffic Server vulnerability with sslheader plugin",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/4f102f943935476732fb1fb653d687c7b69d29d9792f0d6cf72c505e@%3Cannounce.trafficserver.apache.org%3E"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-15619", "ID": "CVE-2018-15619",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-15622", "ID": "CVE-2018-15622",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[debian-lts-announce] 20190211 [SECURITY] [DLA 1673-1] wordpress security update", "name": "106220",
"refsource" : "MLIST", "refsource": "BID",
"url" : "https://lists.debian.org/debian-lts-announce/2019/02/msg00019.html" "url": "http://www.securityfocus.com/bid/106220"
},
{
"name" : "https://codex.wordpress.org/Version_4.9.9",
"refsource" : "MISC",
"url" : "https://codex.wordpress.org/Version_4.9.9"
},
{
"name" : "https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/",
"refsource" : "MISC",
"url" : "https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/"
}, },
{ {
"name": "https://wordpress.org/support/wordpress-version/version-5-0-1/", "name": "https://wordpress.org/support/wordpress-version/version-5-0-1/",
@ -73,9 +63,9 @@
"url": "https://wordpress.org/support/wordpress-version/version-5-0-1/" "url": "https://wordpress.org/support/wordpress-version/version-5-0-1/"
}, },
{ {
"name" : "https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/", "name": "https://codex.wordpress.org/Version_4.9.9",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/" "url": "https://codex.wordpress.org/Version_4.9.9"
}, },
{ {
"name": "https://wpvulndb.com/vulnerabilities/9170", "name": "https://wpvulndb.com/vulnerabilities/9170",
@ -88,9 +78,19 @@
"url": "https://www.debian.org/security/2019/dsa-4401" "url": "https://www.debian.org/security/2019/dsa-4401"
}, },
{ {
"name" : "106220", "name": "https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/106220" "url": "https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/"
},
{
"name": "[debian-lts-announce] 20190211 [SECURITY] [DLA 1673-1] wordpress security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00019.html"
},
{
"name": "https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/",
"refsource": "MISC",
"url": "https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2018-9553", "ID": "CVE-2018-9553",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2018-12-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2018-12-01"
},
{ {
"name": "106137", "name": "106137",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106137" "url": "http://www.securityfocus.com/bid/106137"
},
{
"name": "https://source.android.com/security/bulletin/2018-12-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2018-12-01"
} }
] ]
} }