"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 06:09:57 +00:00
parent dcf14a4400
commit 6ad43aa598
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 4665 additions and 4665 deletions

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060110 SUID root overflows in UNICOS and partial shellcode",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0343.html"
},
{ {
"name": "16205", "name": "16205",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "unicos-command-line-bo(24276)", "name": "unicos-command-line-bo(24276)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24276" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24276"
},
{
"name": "20060110 SUID root overflows in UNICOS and partial shellcode",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0343.html"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "16444",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16444"
},
{ {
"name": "20060131 MyCO multiple vulnerabilities", "name": "20060131 MyCO multiple vulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -62,11 +67,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/423696/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/423696/100/0/threaded"
}, },
{
"name" : "16444",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16444"
},
{ {
"name": "myco-name-xss(24439)", "name": "myco-name-xss(24439)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-0744", "ID": "CVE-2006-0744",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,40 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5",
"refsource" : "CONFIRM",
"url" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5"
},
{ {
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm", "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm" "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm"
}, },
{ {
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm", "name": "linux-uncanonical-addr-dos(25869)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25869"
},
{
"name" : "DSA-1103",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1103"
},
{
"name" : "FEDORA-2006-423",
"refsource" : "FEDORA",
"url" : "http://lwn.net/Alerts/180820/"
},
{
"name" : "MDKSA-2006:086",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:086"
},
{
"name" : "MDKSA-2006:150",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:150"
}, },
{ {
"name": "RHSA-2006:0493", "name": "RHSA-2006:0493",
@ -97,35 +72,70 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0437.html" "url": "http://www.redhat.com/support/errata/RHSA-2006-0437.html"
}, },
{
"name" : "SUSE-SA:2006:028",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006-05-31.html"
},
{ {
"name": "SUSE-SA:2006:042", "name": "SUSE-SA:2006:042",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_42_kernel.html" "url": "http://www.novell.com/linux/security/advisories/2006_42_kernel.html"
}, },
{
"name": "19735",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19735"
},
{
"name": "ADV-2006-2554",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2554"
},
{
"name": "20716",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20716"
},
{
"name": "FEDORA-2006-423",
"refsource": "FEDORA",
"url": "http://lwn.net/Alerts/180820/"
},
{
"name": "21745",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21745"
},
{ {
"name": "SUSE-SA:2006:047", "name": "SUSE-SA:2006:047",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_47_kernel.html" "url": "http://www.novell.com/linux/security/advisories/2006_47_kernel.html"
}, },
{
"name": "21136",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21136"
},
{
"name": "MDKSA-2006:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:150"
},
{
"name": "19639",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19639"
},
{ {
"name": "USN-302-1", "name": "USN-302-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-302-1" "url": "http://www.ubuntu.com/usn/usn-302-1"
}, },
{ {
"name" : "17541", "name": "21983",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/17541" "url": "http://secunia.com/advisories/21983"
}, },
{ {
"name" : "oval:org.mitre.oval:def:9732", "name": "SUSE-SA:2006:028",
"refsource" : "OVAL", "refsource": "SUSE",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9732" "url": "http://www.novell.com/linux/security/advisories/2006-05-31.html"
}, },
{ {
"name": "ADV-2006-1390", "name": "ADV-2006-1390",
@ -133,9 +143,24 @@
"url": "http://www.vupen.com/english/advisories/2006/1390" "url": "http://www.vupen.com/english/advisories/2006/1390"
}, },
{ {
"name" : "ADV-2006-2554", "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2006/2554" "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm"
},
{
"name": "DSA-1103",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1103"
},
{
"name": "17541",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17541"
},
{
"name": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5",
"refsource": "CONFIRM",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5"
}, },
{ {
"name": "ADV-2006-1475", "name": "ADV-2006-1475",
@ -148,19 +173,9 @@
"url": "http://www.osvdb.org/24639" "url": "http://www.osvdb.org/24639"
}, },
{ {
"name" : "19639", "name": "21498",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19639" "url": "http://secunia.com/advisories/21498"
},
{
"name" : "19735",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19735"
},
{
"name" : "20157",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20157"
}, },
{ {
"name": "20237", "name": "20237",
@ -168,19 +183,24 @@
"url": "http://secunia.com/advisories/20237" "url": "http://secunia.com/advisories/20237"
}, },
{ {
"name" : "20716", "name": "20398",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/20716" "url": "http://secunia.com/advisories/20398"
}, },
{ {
"name" : "20914", "name": "oval:org.mitre.oval:def:9732",
"refsource" : "SECUNIA", "refsource": "OVAL",
"url" : "http://secunia.com/advisories/20914" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9732"
}, },
{ {
"name" : "21136", "name": "MDKSA-2006:086",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:086"
},
{
"name": "20157",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/21136" "url": "http://secunia.com/advisories/20157"
}, },
{ {
"name": "21179", "name": "21179",
@ -188,29 +208,9 @@
"url": "http://secunia.com/advisories/21179" "url": "http://secunia.com/advisories/21179"
}, },
{ {
"name" : "21745", "name": "20914",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/21745" "url": "http://secunia.com/advisories/20914"
},
{
"name" : "20398",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20398"
},
{
"name" : "21983",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21983"
},
{
"name" : "21498",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21498"
},
{
"name" : "linux-uncanonical-addr-dos(25869)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25869"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "invisionpowerboard-multiple-info-disclosure(24840)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24840"
},
{ {
"name": "20060221 Invision Power Board 2.1.4 Multiple Vulnerabilities", "name": "20060221 Invision Power Board 2.1.4 Multiple Vulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/425713/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/425713/100/0/threaded"
}, },
{
"name" : "http://neosecurityteam.net/advisories/Advisory-16.txt",
"refsource" : "MISC",
"url" : "http://neosecurityteam.net/advisories/Advisory-16.txt"
},
{ {
"name": "http://neosecurityteam.net/index.php?action=advisories&id=16", "name": "http://neosecurityteam.net/index.php?action=advisories&id=16",
"refsource": "MISC", "refsource": "MISC",
"url": "http://neosecurityteam.net/index.php?action=advisories&id=16" "url": "http://neosecurityteam.net/index.php?action=advisories&id=16"
}, },
{ {
"name" : "invisionpowerboard-multiple-info-disclosure(24840)", "name": "http://neosecurityteam.net/advisories/Advisory-16.txt",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24840" "url": "http://neosecurityteam.net/advisories/Advisory-16.txt"
} }
] ]
} }

View File

@ -52,15 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "20060814 Virtual War v1.5.0 SQL injection and XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443171/100/0/threaded"
},
{ {
"name": "20080213 Re: Vwar New Bug", "name": "20080213 Re: Vwar New Bug",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488118/100/200/threaded" "url": "http://www.securityfocus.com/archive/1/488118/100/200/threaded"
}, },
{ {
"name" : "20080213 Vwar New Bug", "name": "virtualwar-war-sql-injection(27153)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2008-02/0186.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27153"
}, },
{ {
"name": "http://pridels0.blogspot.com/2006/06/virtual-war-multiple-sql-inj-vuln.html", "name": "http://pridels0.blogspot.com/2006/06/virtual-war-multiple-sql-inj-vuln.html",
@ -68,34 +73,29 @@
"url": "http://pridels0.blogspot.com/2006/06/virtual-war-multiple-sql-inj-vuln.html" "url": "http://pridels0.blogspot.com/2006/06/virtual-war-multiple-sql-inj-vuln.html"
}, },
{ {
"name" : "20060814 Virtual War v1.5.0 SQL injection and XSS", "name": "20696",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/443171/100/0/threaded" "url": "http://secunia.com/advisories/20696"
},
{
"name" : "27772",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27772"
}, },
{ {
"name": "ADV-2006-2383", "name": "ADV-2006-2383",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2383" "url": "http://www.vupen.com/english/advisories/2006/2383"
}, },
{
"name": "20080213 Vwar New Bug",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2008-02/0186.html"
},
{ {
"name": "26533", "name": "26533",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/26533" "url": "http://www.osvdb.org/26533"
}, },
{ {
"name" : "20696", "name": "27772",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/20696" "url": "http://www.securityfocus.com/bid/27772"
},
{
"name" : "virtualwar-war-sql-injection(27153)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27153"
}, },
{ {
"name": "virtualwar-warphp-sql-injection(40481)", "name": "virtualwar-warphp-sql-injection(40481)",

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060620 ULtimate PHP Board <= 1.96 GOLD Code Execution (exploit code)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/437875/100/0/threaded"
},
{ {
"name": "http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt", "name": "http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt",
"refsource": "MISC", "refsource": "MISC",
@ -66,6 +61,11 @@
"name": "1138", "name": "1138",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1138" "url": "http://securityreason.com/securityalert/1138"
},
{
"name": "20060620 ULtimate PHP Board <= 1.96 GOLD Code Execution (exploit code)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/437875/100/0/threaded"
} }
] ]
} }

View File

@ -52,36 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060629 NewsPHP 2006 PRO XSS SQL injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/438858/100/0/threaded"
},
{
"name" : "18726",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18726"
},
{
"name" : "ADV-2006-2640",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2640"
},
{ {
"name": "26976", "name": "26976",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/26976" "url": "http://www.osvdb.org/26976"
}, },
{
"name" : "26977",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26977"
},
{ {
"name": "20943", "name": "20943",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20943" "url": "http://secunia.com/advisories/20943"
}, },
{
"name": "18726",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18726"
},
{ {
"name": "1188", "name": "1188",
"refsource": "SREASON", "refsource": "SREASON",
@ -91,6 +76,21 @@
"name": "newsphp-multiple-parameters-xss(27508)", "name": "newsphp-multiple-parameters-xss(27508)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27508" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27508"
},
{
"name": "26977",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26977"
},
{
"name": "20060629 NewsPHP 2006 PRO XSS SQL injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/438858/100/0/threaded"
},
{
"name": "ADV-2006-2640",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2640"
} }
] ]
} }

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.joomla.org/content/view/1510/74/", "name": "joomla-multiple-xss(27521)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.joomla.org/content/view/1510/74/" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27521"
},
{
"name" : "http://www.joomla.org/content/view/1511/78/",
"refsource" : "CONFIRM",
"url" : "http://www.joomla.org/content/view/1511/78/"
},
{
"name" : "18742",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18742"
}, },
{ {
"name": "ADV-2006-2608", "name": "ADV-2006-2608",
@ -73,29 +63,39 @@
"url": "http://www.vupen.com/english/advisories/2006/2608" "url": "http://www.vupen.com/english/advisories/2006/2608"
}, },
{ {
"name" : "26913", "name": "18742",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://www.osvdb.org/26913" "url": "http://www.securityfocus.com/bid/18742"
}, },
{ {
"name": "26917", "name": "26917",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/26917" "url": "http://www.osvdb.org/26917"
}, },
{
"name": "http://www.joomla.org/content/view/1510/74/",
"refsource": "CONFIRM",
"url": "http://www.joomla.org/content/view/1510/74/"
},
{ {
"name": "26918", "name": "26918",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/26918" "url": "http://www.osvdb.org/26918"
}, },
{
"name": "26913",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26913"
},
{ {
"name": "20874", "name": "20874",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20874" "url": "http://secunia.com/advisories/20874"
}, },
{ {
"name" : "joomla-multiple-xss(27521)", "name": "http://www.joomla.org/content/view/1511/78/",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27521" "url": "http://www.joomla.org/content/view/1511/78/"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://downloads.securityfocus.com/vulnerabilities/exploits/LifeType105SQLInjJuly052006.pl",
"refsource" : "MISC",
"url" : "http://downloads.securityfocus.com/vulnerabilities/exploits/LifeType105SQLInjJuly052006.pl"
},
{ {
"name": "18835", "name": "18835",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/18835" "url": "http://www.securityfocus.com/bid/18835"
},
{
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/LifeType105SQLInjJuly052006.pl",
"refsource": "MISC",
"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/LifeType105SQLInjJuly052006.pl"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060714 SubberZ[Lite] - Remote File Include", "name": "subberzlite-userfunc-file-include(27748)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/440139/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27748"
}, },
{ {
"name": "20060717 Re: SubberZ[Lite] - Remote File Include", "name": "20060717 Re: SubberZ[Lite] - Remote File Include",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/archive/1/440864/100/100/threaded" "url": "http://www.securityfocus.com/archive/1/440864/100/100/threaded"
}, },
{ {
"name" : "18990", "name": "20060714 SubberZ[Lite] - Remote File Include",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/18990" "url": "http://www.securityfocus.com/archive/1/440139/100/0/threaded"
}, },
{ {
"name": "28592", "name": "28592",
@ -78,9 +78,9 @@
"url": "http://securityreason.com/securityalert/1246" "url": "http://securityreason.com/securityalert/1246"
}, },
{ {
"name" : "subberzlite-userfunc-file-include(27748)", "name": "18990",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27748" "url": "http://www.securityfocus.com/bid/18990"
} }
] ]
} }

View File

@ -52,120 +52,120 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)",
"refsource" : "MLIST",
"url" : "http://lists.mysql.com/commits/5927"
},
{
"name" : "http://bugs.mysql.com/bug.php?id=17647",
"refsource" : "MISC",
"url" : "http://bugs.mysql.com/bug.php?id=17647"
},
{
"name" : "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html",
"refsource" : "CONFIRM",
"url" : "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=305214",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=305214"
},
{
"name" : "APPLE-SA-2007-03-13",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"name" : "DSA-1169",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1169"
},
{
"name" : "MDKSA-2006:149",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
},
{
"name" : "RHSA-2007:0083",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
},
{
"name" : "RHSA-2007:0152",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
},
{
"name" : "SUSE-SR:2006:023",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"name" : "TA07-072A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"name" : "19559",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19559"
},
{ {
"name": "oval:org.mitre.oval:def:10729", "name": "oval:org.mitre.oval:def:10729",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
}, },
{
"name" : "ADV-2006-3306",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3306"
},
{
"name" : "ADV-2007-0930",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0930"
},
{
"name" : "1016710",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016710"
},
{
"name" : "21506",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21506"
},
{
"name" : "21762",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21762"
},
{ {
"name": "21627", "name": "21627",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21627" "url": "http://secunia.com/advisories/21627"
}, },
{ {
"name" : "22080", "name": "1016710",
"refsource" : "SECUNIA", "refsource": "SECTRACK",
"url" : "http://secunia.com/advisories/22080" "url": "http://securitytracker.com/id?1016710"
}, },
{ {
"name" : "24479", "name": "RHSA-2007:0152",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
},
{
"name": "TA07-072A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"name": "21762",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/24479" "url": "http://secunia.com/advisories/21762"
},
{
"name": "ADV-2006-3306",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3306"
},
{
"name": "SUSE-SR:2006:023",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"name": "APPLE-SA-2007-03-13",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"name": "21506",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21506"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305214",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305214"
}, },
{ {
"name": "24744", "name": "24744",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24744" "url": "http://secunia.com/advisories/24744"
}, },
{
"name": "19559",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19559"
},
{ {
"name": "mysql-case-privilege-escalation(28448)", "name": "mysql-case-privilege-escalation(28448)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
},
{
"name": "MDKSA-2006:149",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
},
{
"name": "22080",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22080"
},
{
"name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
},
{
"name": "http://bugs.mysql.com/bug.php?id=17647",
"refsource": "MISC",
"url": "http://bugs.mysql.com/bug.php?id=17647"
},
{
"name": "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)",
"refsource": "MLIST",
"url": "http://lists.mysql.com/commits/5927"
},
{
"name": "DSA-1169",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1169"
},
{
"name": "ADV-2007-0930",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0930"
},
{
"name": "RHSA-2007:0083",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
},
{
"name": "24479",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24479"
} }
] ]
} }

View File

@ -53,20 +53,30 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070319 CCleaguePro_V1.0.1RC1 Directory Traversal Vulnerability", "name": "21843",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/463191/100/0/threaded" "url": "http://secunia.com/advisories/21843"
}, },
{ {
"name": "20070319 Re: CCleaguePro_V1.0.1RC1 Directory Traversal Vulnerability", "name": "20070319 Re: CCleaguePro_V1.0.1RC1 Directory Traversal Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/463217/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/463217/100/0/threaded"
}, },
{
"name": "ADV-2006-3549",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3549"
},
{ {
"name": "2333", "name": "2333",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2333" "url": "https://www.exploit-db.com/exploits/2333"
}, },
{
"name": "20070319 CCleaguePro_V1.0.1RC1 Directory Traversal Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/463191/100/0/threaded"
},
{ {
"name": "http://sn4k3.persiangig.com/Expl0it/CCleaguePro_V1.0.1RC1%20Directory%20Traversal%20Vulnerability.txt", "name": "http://sn4k3.persiangig.com/Expl0it/CCleaguePro_V1.0.1RC1%20Directory%20Traversal%20Vulnerability.txt",
"refsource": "MISC", "refsource": "MISC",
@ -76,16 +86,6 @@
"name": "http://unkn0wn.awardspace.com/Blog/?p=46", "name": "http://unkn0wn.awardspace.com/Blog/?p=46",
"refsource": "MISC", "refsource": "MISC",
"url": "http://unkn0wn.awardspace.com/Blog/?p=46" "url": "http://unkn0wn.awardspace.com/Blog/?p=46"
},
{
"name" : "ADV-2006-3549",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3549"
},
{
"name" : "21843",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21843"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2221", "ID": "CVE-2010-2221",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,105 +52,105 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20100702 TELUS Security Labs VR - iSCSI target Multiple Implementations iSNS Stack Buffer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2010-07/0022.html"
},
{
"name" : "20100702 TELUS Security Labs VR - iSCSI target Multiple Implementations iSNS Stack Buffer Overflow",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-07/0058.html"
},
{
"name" : "[iscsitarget-devel] 20100701 [patch] fix iSNS bounds checking",
"refsource" : "MLIST",
"url" : "http://sourceforge.net/mailarchive/forum.php?thread_name=E2BB8074E5500C42984D980D4BD78EF904075006%40MFG-NYC-EXCH2.mfg.prv&forum_name=iscsitarget-devel"
},
{
"name" : "[stgt] 20100701 1.0.6 released",
"refsource" : "MLIST",
"url" : "http://lists.wpkg.org/pipermail/stgt/2010-July/003858.html"
},
{
"name" : "http://scst.svn.sourceforge.net/viewvc/scst/trunk/iscsi-scst/usr/isns.c?r1=1793&r2=1792&pathrev=1793",
"refsource" : "CONFIRM",
"url" : "http://scst.svn.sourceforge.net/viewvc/scst/trunk/iscsi-scst/usr/isns.c?r1=1793&r2=1792&pathrev=1793"
},
{ {
"name": "http://scst.svn.sourceforge.net/viewvc/scst?view=revision&revision=1793", "name": "http://scst.svn.sourceforge.net/viewvc/scst?view=revision&revision=1793",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://scst.svn.sourceforge.net/viewvc/scst?view=revision&revision=1793" "url": "http://scst.svn.sourceforge.net/viewvc/scst?view=revision&revision=1793"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=593877", "name": "20100702 TELUS Security Labs VR - iSCSI target Multiple Implementations iSNS Stack Buffer Overflow",
"refsource" : "CONFIRM", "refsource": "BUGTRAQ",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=593877" "url": "http://archives.neohapsis.com/archives/bugtraq/2010-07/0022.html"
},
{
"name" : "MDVSA-2010:131",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:131"
},
{
"name" : "RHSA-2010:0518",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0518.html"
},
{
"name" : "SUSE-SR:2010:017",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name" : "41327",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/41327"
},
{
"name" : "65990",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/65990"
},
{
"name" : "65991",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/65991"
},
{
"name" : "65992",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/65992"
},
{
"name" : "1024175",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024175"
},
{
"name" : "40485",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40485"
},
{
"name" : "40494",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40494"
},
{
"name" : "40495",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40495"
}, },
{ {
"name": "ADV-2010-1760", "name": "ADV-2010-1760",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1760" "url": "http://www.vupen.com/english/advisories/2010/1760"
}, },
{
"name": "20100702 TELUS Security Labs VR - iSCSI target Multiple Implementations iSNS Stack Buffer Overflow",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-07/0058.html"
},
{
"name": "65992",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/65992"
},
{
"name": "MDVSA-2010:131",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:131"
},
{
"name": "65990",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/65990"
},
{
"name": "41327",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41327"
},
{
"name": "RHSA-2010:0518",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0518.html"
},
{
"name": "65991",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/65991"
},
{
"name": "[iscsitarget-devel] 20100701 [patch] fix iSNS bounds checking",
"refsource": "MLIST",
"url": "http://sourceforge.net/mailarchive/forum.php?thread_name=E2BB8074E5500C42984D980D4BD78EF904075006%40MFG-NYC-EXCH2.mfg.prv&forum_name=iscsitarget-devel"
},
{
"name": "40485",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40485"
},
{
"name": "[stgt] 20100701 1.0.6 released",
"refsource": "MLIST",
"url": "http://lists.wpkg.org/pipermail/stgt/2010-July/003858.html"
},
{
"name": "SUSE-SR:2010:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=593877",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=593877"
},
{
"name": "40494",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40494"
},
{
"name": "http://scst.svn.sourceforge.net/viewvc/scst/trunk/iscsi-scst/usr/isns.c?r1=1793&r2=1792&pathrev=1793",
"refsource": "CONFIRM",
"url": "http://scst.svn.sourceforge.net/viewvc/scst/trunk/iscsi-scst/usr/isns.c?r1=1793&r2=1792&pathrev=1793"
},
{ {
"name": "ADV-2010-1786", "name": "ADV-2010-1786",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1786" "url": "http://www.vupen.com/english/advisories/2010/1786"
},
{
"name": "1024175",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024175"
},
{
"name": "40495",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40495"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "13906",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/13906"
},
{ {
"name": "http://www.stratsec.net/Research/Advisories/SS-2010-006-Netware-SMB-Remote-Stack-Overflow", "name": "http://www.stratsec.net/Research/Advisories/SS-2010-006-Netware-SMB-Remote-Stack-Overflow",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.stratsec.net/Research/Advisories/SS-2010-006-Netware-SMB-Remote-Stack-Overflow" "url": "http://www.stratsec.net/Research/Advisories/SS-2010-006-Netware-SMB-Remote-Stack-Overflow"
}, },
{ {
"name" : "http://download.novell.com/Download?buildid=tMWCI1cdI7s~", "name": "netware-cifsnlm-bo(59501)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://download.novell.com/Download?buildid=tMWCI1cdI7s~" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59501"
},
{
"name" : "40908",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40908"
}, },
{ {
"name": "40199", "name": "40199",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40199" "url": "http://secunia.com/advisories/40199"
}, },
{
"name": "40908",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40908"
},
{ {
"name": "ADV-2010-1514", "name": "ADV-2010-1514",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1514" "url": "http://www.vupen.com/english/advisories/2010/1514"
}, },
{ {
"name" : "netware-cifsnlm-bo(59501)", "name": "http://download.novell.com/Download?buildid=tMWCI1cdI7s~",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/59501" "url": "http://download.novell.com/Download?buildid=tMWCI1cdI7s~"
},
{
"name": "13906",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/13906"
} }
] ]
} }

View File

@ -58,29 +58,9 @@
"url": "http://znc.svn.sourceforge.net/viewvc/znc/trunk/znc.cpp?r1=2025&r2=2026&pathrev=2026" "url": "http://znc.svn.sourceforge.net/viewvc/znc/trunk/znc.cpp?r1=2025&r2=2026&pathrev=2026"
}, },
{ {
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584929", "name": "ADV-2010-1775",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584929" "url": "http://www.vupen.com/english/advisories/2010/1775"
},
{
"name" : "http://sourceforge.net/projects/znc/files/znc/0.092/znc-0.092-changelog.txt/view",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/projects/znc/files/znc/0.092/znc-0.092-changelog.txt/view"
},
{
"name" : "http://znc.svn.sourceforge.net/viewvc/znc?revision=2026&view=revision",
"refsource" : "CONFIRM",
"url" : "http://znc.svn.sourceforge.net/viewvc/znc?revision=2026&view=revision"
},
{
"name" : "DSA-2069",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2069"
},
{
"name" : "FEDORA-2010-10042",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043000.html"
}, },
{ {
"name": "FEDORA-2010-10078", "name": "FEDORA-2010-10078",
@ -88,9 +68,14 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043043.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043043.html"
}, },
{ {
"name" : "FEDORA-2010-10082", "name": "40523",
"refsource" : "FEDORA", "refsource": "SECUNIA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043044.html" "url": "http://secunia.com/advisories/40523"
},
{
"name": "http://sourceforge.net/projects/znc/files/znc/0.092/znc-0.092-changelog.txt/view",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/projects/znc/files/znc/0.092/znc-0.092-changelog.txt/view"
}, },
{ {
"name": "40982", "name": "40982",
@ -98,14 +83,29 @@
"url": "http://www.securityfocus.com/bid/40982" "url": "http://www.securityfocus.com/bid/40982"
}, },
{ {
"name" : "40523", "name": "http://znc.svn.sourceforge.net/viewvc/znc?revision=2026&view=revision",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/40523" "url": "http://znc.svn.sourceforge.net/viewvc/znc?revision=2026&view=revision"
}, },
{ {
"name" : "ADV-2010-1775", "name": "FEDORA-2010-10042",
"refsource" : "VUPEN", "refsource": "FEDORA",
"url" : "http://www.vupen.com/english/advisories/2010/1775" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043000.html"
},
{
"name": "FEDORA-2010-10082",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043044.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584929",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584929"
},
{
"name": "DSA-2069",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2069"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "14203",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/14203"
},
{ {
"name": "41382", "name": "41382",
"refsource": "BID", "refsource": "BID",
@ -67,6 +62,11 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1696" "url": "http://www.vupen.com/english/advisories/2010/1696"
}, },
{
"name": "14203",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14203"
},
{ {
"name": "tcwphpalbum-index-xss(60078)", "name": "tcwphpalbum-index-xss(60078)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-3345", "ID": "CVE-2010-3345",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS10-090", "name": "oval:org.mitre.oval:def:11849",
"refsource" : "MS", "refsource": "OVAL",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11849"
}, },
{ {
"name": "TA10-348A", "name": "TA10-348A",
@ -63,9 +63,9 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA10-348A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA10-348A.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:11849", "name": "MS10-090",
"refsource" : "OVAL", "refsource": "MS",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11849" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090"
}, },
{ {
"name": "1024872", "name": "1024872",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-3801", "ID": "CVE-2010-3801",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://zerodayinitiative.com/advisories/ZDI-10-259/", "name": "69755",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://zerodayinitiative.com/advisories/ZDI-10-259/" "url": "http://osvdb.org/69755"
},
{
"name" : "http://support.apple.com/kb/HT4447",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4447"
},
{
"name" : "http://support.apple.com/kb/HT4581",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4581"
}, },
{ {
"name": "APPLE-SA-2010-12-07-1", "name": "APPLE-SA-2010-12-07-1",
@ -78,9 +68,14 @@
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
}, },
{ {
"name" : "69755", "name": "http://zerodayinitiative.com/advisories/ZDI-10-259/",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://osvdb.org/69755" "url": "http://zerodayinitiative.com/advisories/ZDI-10-259/"
},
{
"name": "http://support.apple.com/kb/HT4447",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4447"
}, },
{ {
"name": "oval:org.mitre.oval:def:15642", "name": "oval:org.mitre.oval:def:15642",
@ -91,6 +86,11 @@
"name": "1024830", "name": "1024830",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024830" "url": "http://www.securitytracker.com/id?1024830"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0257", "ID": "CVE-2011-0257",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "17777",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/17777"
},
{
"name" : "http://zerodayinitiative.com/advisories/ZDI-11-252/",
"refsource" : "MISC",
"url" : "http://zerodayinitiative.com/advisories/ZDI-11-252/"
},
{ {
"name": "http://support.apple.com/kb/HT4826", "name": "http://support.apple.com/kb/HT4826",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4826" "url": "http://support.apple.com/kb/HT4826"
}, },
{
"name": "8365",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8365"
},
{
"name": "17777",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/17777"
},
{ {
"name": "oval:org.mitre.oval:def:16059", "name": "oval:org.mitre.oval:def:16059",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16059" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16059"
}, },
{ {
"name" : "8365", "name": "http://zerodayinitiative.com/advisories/ZDI-11-252/",
"refsource" : "SREASON", "refsource": "MISC",
"url" : "http://securityreason.com/securityalert/8365" "url": "http://zerodayinitiative.com/advisories/ZDI-11-252/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-0565", "ID": "CVE-2011-0565",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html", "name": "ADV-2011-0492",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html" "url": "http://www.vupen.com/english/advisories/2011/0492"
},
{
"name": "43470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43470"
}, },
{ {
"name": "RHSA-2011:0301", "name": "RHSA-2011:0301",
@ -68,9 +73,9 @@
"url": "http://www.securityfocus.com/bid/46204" "url": "http://www.securityfocus.com/bid/46204"
}, },
{ {
"name" : "oval:org.mitre.oval:def:12606", "name": "ADV-2011-0337",
"refsource" : "OVAL", "refsource": "VUPEN",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12606" "url": "http://www.vupen.com/english/advisories/2011/0337"
}, },
{ {
"name": "1025033", "name": "1025033",
@ -78,19 +83,14 @@
"url": "http://www.securitytracker.com/id?1025033" "url": "http://www.securitytracker.com/id?1025033"
}, },
{ {
"name" : "43470", "name": "oval:org.mitre.oval:def:12606",
"refsource" : "SECUNIA", "refsource": "OVAL",
"url" : "http://secunia.com/advisories/43470" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12606"
}, },
{ {
"name" : "ADV-2011-0337", "name": "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2011/0337" "url": "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
},
{
"name" : "ADV-2011-0492",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0492"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-0822", "ID": "CVE-2011-0822",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
},
{ {
"name": "GLSA-201406-32", "name": "GLSA-201406-32",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -66,6 +61,11 @@
"name": "TA11-201A", "name": "TA11-201A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1147", "ID": "CVE-2011-1147",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,56 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "43702",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43702"
},
{
"name": "46474",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46474"
},
{
"name": "DSA-2225",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2225"
},
{
"name": "43429",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43429"
},
{
"name": "FEDORA-2011-2438",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.html"
},
{
"name": "ADV-2011-0635",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0635"
},
{ {
"name": "[oss-security] 20110311 CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code", "name": "[oss-security] 20110311 CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/11/2" "url": "http://www.openwall.com/lists/oss-security/2011/03/11/2"
}, },
{
"name": "FEDORA-2011-2360",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.html"
},
{
"name": "FEDORA-2011-2558",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.html"
},
{
"name": "1025101",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025101"
},
{ {
"name": "[oss-security] 20110311 Re: CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code", "name": "[oss-security] 20110311 Re: CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code",
"refsource": "MLIST", "refsource": "MLIST",
@ -66,51 +111,6 @@
"name": "http://downloads.asterisk.org/pub/security/AST-2011-002.html", "name": "http://downloads.asterisk.org/pub/security/AST-2011-002.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2011-002.html" "url": "http://downloads.asterisk.org/pub/security/AST-2011-002.html"
},
{
"name" : "DSA-2225",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2225"
},
{
"name" : "FEDORA-2011-2360",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.html"
},
{
"name" : "FEDORA-2011-2438",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.html"
},
{
"name" : "FEDORA-2011-2558",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.html"
},
{
"name" : "46474",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46474"
},
{
"name" : "1025101",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025101"
},
{
"name" : "43429",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43429"
},
{
"name" : "43702",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43702"
},
{
"name" : "ADV-2011-0635",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0635"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1156", "ID": "CVE-2011-1156",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,60 +52,60 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[opensuse-updates] 20110408 openSUSE-SU-2011:0314-1 (moderate): python-feedparser security update",
"refsource" : "MLIST",
"url" : "http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html"
},
{ {
"name": "[oss-security] 20110314 CVE request for python-feedparser", "name": "[oss-security] 20110314 CVE request for python-feedparser",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/14/18" "url": "http://openwall.com/lists/oss-security/2011/03/14/18"
}, },
{
"name" : "[oss-security] 20110315 Re: CVE request for python-feedparser",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/15/11"
},
{ {
"name": "http://support.novell.com/security/cve/CVE-2011-1156.html", "name": "http://support.novell.com/security/cve/CVE-2011-1156.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.novell.com/security/cve/CVE-2011-1156.html" "url": "http://support.novell.com/security/cve/CVE-2011-1156.html"
}, },
{ {
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=680074", "name": "43730",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=680074" "url": "http://secunia.com/advisories/43730"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=684877",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=684877"
}, },
{ {
"name": "https://code.google.com/p/feedparser/issues/detail?id=91", "name": "https://code.google.com/p/feedparser/issues/detail?id=91",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://code.google.com/p/feedparser/issues/detail?id=91" "url": "https://code.google.com/p/feedparser/issues/detail?id=91"
}, },
{
"name" : "MDVSA-2011:082",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:082"
},
{ {
"name": "46867", "name": "46867",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/46867" "url": "http://www.securityfocus.com/bid/46867"
}, },
{ {
"name" : "43730", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=684877",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/43730" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=684877"
}, },
{ {
"name": "44074", "name": "44074",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44074" "url": "http://secunia.com/advisories/44074"
},
{
"name": "[oss-security] 20110315 Re: CVE request for python-feedparser",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/15/11"
},
{
"name": "[opensuse-updates] 20110408 openSUSE-SU-2011:0314-1 (moderate): python-feedparser security update",
"refsource": "MLIST",
"url": "http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=680074",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=680074"
},
{
"name": "MDVSA-2011:082",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:082"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1607", "ID": "CVE-2011-1607",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20110502 Re: ZDI-11-143: Cisco Unified CallManager xmldirectorylist.jsp SQL Injection Vulnerability", "name": "cisco-ucm-dir-traversal(67127)",
"refsource" : "FULLDISC", "refsource": "XF",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67127"
},
{
"name" : "20110427 Multiple Vulnerabilities in Cisco Unified Communications Manager",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b79904.shtml"
},
{
"name" : "47608",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/47608"
},
{
"name" : "1025449",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025449"
}, },
{ {
"name": "44331", "name": "44331",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44331" "url": "http://secunia.com/advisories/44331"
}, },
{
"name": "20110502 Re: ZDI-11-143: Cisco Unified CallManager xmldirectorylist.jsp SQL Injection Vulnerability",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html"
},
{
"name": "1025449",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025449"
},
{ {
"name": "ADV-2011-1122", "name": "ADV-2011-1122",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1122" "url": "http://www.vupen.com/english/advisories/2011/1122"
}, },
{ {
"name" : "cisco-ucm-dir-traversal(67127)", "name": "47608",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67127" "url": "http://www.securityfocus.com/bid/47608"
},
{
"name": "20110427 Multiple Vulnerabilities in Cisco Unified Communications Manager",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b79904.shtml"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20110412 HTB22927: CSRF (Cross-Site Request Forgery) in Webjaxe",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/517434/100/0/threaded"
},
{ {
"name": "http://www.htbridge.ch/advisory/csrf_cross_site_request_forgery_in_webjaxe.html", "name": "http://www.htbridge.ch/advisory/csrf_cross_site_request_forgery_in_webjaxe.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.htbridge.ch/advisory/csrf_cross_site_request_forgery_in_webjaxe.html" "url": "http://www.htbridge.ch/advisory/csrf_cross_site_request_forgery_in_webjaxe.html"
}, },
{
"name": "20110412 HTB22927: CSRF (Cross-Site Request Forgery) in Webjaxe",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/517434/100/0/threaded"
},
{ {
"name": "71844", "name": "71844",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -72,15 +72,15 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44118" "url": "http://secunia.com/advisories/44118"
}, },
{
"name" : "8212",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/8212"
},
{ {
"name": "webjaxe-administration-csrf(66757)", "name": "webjaxe-administration-csrf(66757)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66757" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66757"
},
{
"name": "8212",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8212"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2011-1725", "ID": "CVE-2011-1725",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,12 +53,17 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBMA02666", "name": "44319",
"refsource" : "HP", "refsource": "SECUNIA",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02789514" "url": "http://secunia.com/advisories/44319"
}, },
{ {
"name" : "SSRT100434", "name": "hp-network-unspec-info-disclosure(67021)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67021"
},
{
"name": "HPSBMA02666",
"refsource": "HP", "refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02789514" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02789514"
}, },
@ -68,9 +73,9 @@
"url": "http://www.securityfocus.com/bid/47550" "url": "http://www.securityfocus.com/bid/47550"
}, },
{ {
"name" : "72049", "name": "44304",
"refsource" : "OSVDB", "refsource": "SECUNIA",
"url" : "http://osvdb.org/72049" "url": "http://secunia.com/advisories/44304"
}, },
{ {
"name": "1025435", "name": "1025435",
@ -78,14 +83,9 @@
"url": "http://www.securitytracker.com/id?1025435" "url": "http://www.securitytracker.com/id?1025435"
}, },
{ {
"name" : "44304", "name": "72049",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/44304" "url": "http://osvdb.org/72049"
},
{
"name" : "44319",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44319"
}, },
{ {
"name": "ADV-2011-1090", "name": "ADV-2011-1090",
@ -93,9 +93,9 @@
"url": "http://www.vupen.com/english/advisories/2011/1090" "url": "http://www.vupen.com/english/advisories/2011/1090"
}, },
{ {
"name" : "hp-network-unspec-info-disclosure(67021)", "name": "SSRT100434",
"refsource" : "XF", "refsource": "HP",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67021" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02789514"
} }
] ]
} }

View File

@ -53,29 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://androidcommunity.com/gingerbreak-root-for-gingerbread-app-20110421/", "name": "http://android.git.kernel.org/?p=platform/system/netd.git;a=commit;h=79b579c92afc08ab12c0a5788d61f2dd2934836f",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "http://androidcommunity.com/gingerbreak-root-for-gingerbread-app-20110421/" "url": "http://android.git.kernel.org/?p=platform/system/netd.git;a=commit;h=79b579c92afc08ab12c0a5788d61f2dd2934836f"
},
{
"name" : "http://c-skills.blogspot.com/2011/04/yummy-yummy-gingerbreak.html",
"refsource" : "MISC",
"url" : "http://c-skills.blogspot.com/2011/04/yummy-yummy-gingerbreak.html"
},
{
"name" : "http://forum.xda-developers.com/showthread.php?t=1044765",
"refsource" : "MISC",
"url" : "http://forum.xda-developers.com/showthread.php?t=1044765"
},
{
"name" : "http://www.androidpolice.com/2011/05/03/google-patches-gingerbreak-exploit-but-dont-worry-we-still-have-root-for-now/",
"refsource" : "MISC",
"url" : "http://www.androidpolice.com/2011/05/03/google-patches-gingerbreak-exploit-but-dont-worry-we-still-have-root-for-now/"
},
{
"name" : "http://xorl.wordpress.com/2011/04/28/android-vold-mpartminors-signedness-issue/",
"refsource" : "MISC",
"url" : "http://xorl.wordpress.com/2011/04/28/android-vold-mpartminors-signedness-issue/"
}, },
{ {
"name": "http://android.git.kernel.org/?p=platform/system/core.git;a=commit;h=b620a0b1c7ae486e979826200e8e441605b0a5d6", "name": "http://android.git.kernel.org/?p=platform/system/core.git;a=commit;h=b620a0b1c7ae486e979826200e8e441605b0a5d6",
@ -83,19 +63,39 @@
"url": "http://android.git.kernel.org/?p=platform/system/core.git;a=commit;h=b620a0b1c7ae486e979826200e8e441605b0a5d6" "url": "http://android.git.kernel.org/?p=platform/system/core.git;a=commit;h=b620a0b1c7ae486e979826200e8e441605b0a5d6"
}, },
{ {
"name" : "http://android.git.kernel.org/?p=platform/system/netd.git;a=commit;h=79b579c92afc08ab12c0a5788d61f2dd2934836f", "name": "http://c-skills.blogspot.com/2011/04/yummy-yummy-gingerbreak.html",
"refsource" : "CONFIRM", "refsource": "MISC",
"url" : "http://android.git.kernel.org/?p=platform/system/netd.git;a=commit;h=79b579c92afc08ab12c0a5788d61f2dd2934836f" "url": "http://c-skills.blogspot.com/2011/04/yummy-yummy-gingerbreak.html"
},
{
"name": "http://androidcommunity.com/gingerbreak-root-for-gingerbread-app-20110421/",
"refsource": "MISC",
"url": "http://androidcommunity.com/gingerbreak-root-for-gingerbread-app-20110421/"
}, },
{ {
"name": "http://android.git.kernel.org/?p=platform/system/vold.git;a=commit;h=c51920c82463b240e2be0430849837d6fdc5352e", "name": "http://android.git.kernel.org/?p=platform/system/vold.git;a=commit;h=c51920c82463b240e2be0430849837d6fdc5352e",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://android.git.kernel.org/?p=platform/system/vold.git;a=commit;h=c51920c82463b240e2be0430849837d6fdc5352e" "url": "http://android.git.kernel.org/?p=platform/system/vold.git;a=commit;h=c51920c82463b240e2be0430849837d6fdc5352e"
}, },
{
"name": "http://xorl.wordpress.com/2011/04/28/android-vold-mpartminors-signedness-issue/",
"refsource": "MISC",
"url": "http://xorl.wordpress.com/2011/04/28/android-vold-mpartminors-signedness-issue/"
},
{ {
"name": "android-vold-priv-escalation(67977)", "name": "android-vold-priv-escalation(67977)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67977" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67977"
},
{
"name": "http://www.androidpolice.com/2011/05/03/google-patches-gingerbreak-exploit-but-dont-worry-we-still-have-root-for-now/",
"refsource": "MISC",
"url": "http://www.androidpolice.com/2011/05/03/google-patches-gingerbreak-exploit-but-dont-worry-we-still-have-root-for-now/"
},
{
"name": "http://forum.xda-developers.com/showthread.php?t=1044765",
"refsource": "MISC",
"url": "http://forum.xda-developers.com/showthread.php?t=1044765"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "18091",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/18091"
},
{ {
"name": "http://www.bioinformatics.org/phplabware/labwiki/index.php?page=release_notes", "name": "http://www.bioinformatics.org/phplabware/labwiki/index.php?page=release_notes",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.bioinformatics.org/phplabware/labwiki/index.php?page=release_notes" "url": "http://www.bioinformatics.org/phplabware/labwiki/index.php?page=release_notes"
},
{
"name": "18091",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18091"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-3025", "ID": "CVE-2014-3025",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,16 +57,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678754" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678754"
}, },
{
"name" : "IV57241",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV57241"
},
{
"name" : "59570",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59570"
},
{ {
"name": "59640", "name": "59640",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -76,6 +66,16 @@
"name": "ibm-maximo-cve20143025-xss(93064)", "name": "ibm-maximo-cve20143025-xss(93064)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93064" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93064"
},
{
"name": "59570",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59570"
},
{
"name": "IV57241",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV57241"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-3096", "ID": "CVE-2014-3096",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "33076", "name": "58094",
"refsource" : "EXPLOIT-DB", "refsource": "SECUNIA",
"url" : "http://www.exploit-db.com/exploits/33076" "url": "http://secunia.com/advisories/58094"
},
{
"name" : "20140424 Multiple Vulnerabilities in iMember360 (Wordpress plugin)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Apr/265"
}, },
{ {
"name": "http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html", "name": "http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html" "url": "http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html"
}, },
{
"name": "33076",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/33076"
},
{ {
"name": "106299", "name": "106299",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/106299" "url": "http://osvdb.org/show/osvdb/106299"
}, },
{ {
"name" : "58094", "name": "20140424 Multiple Vulnerabilities in iMember360 (Wordpress plugin)",
"refsource" : "SECUNIA", "refsource": "FULLDISC",
"url" : "http://secunia.com/advisories/58094" "url": "http://seclists.org/fulldisclosure/2014/Apr/265"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20140603 Re: CVE ID request: typo3", "name": "DSA-2942",
"refsource" : "MLIST", "refsource": "DEBIAN",
"url" : "http://www.openwall.com/lists/oss-security/2014/06/03/2" "url": "http://www.debian.org/security/2014/dsa-2942"
}, },
{ {
"name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/", "name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/",
@ -63,9 +63,9 @@
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/" "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/"
}, },
{ {
"name" : "DSA-2942", "name": "[oss-security] 20140603 Re: CVE ID request: typo3",
"refsource" : "DEBIAN", "refsource": "MLIST",
"url" : "http://www.debian.org/security/2014/dsa-2942" "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-6322", "ID": "CVE-2014-6322",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS14-071",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-071"
},
{ {
"name": "70978", "name": "70978",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/70978" "url": "http://www.securityfocus.com/bid/70978"
}, },
{
"name" : "1031191",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031191"
},
{ {
"name": "59968", "name": "59968",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59968" "url": "http://secunia.com/advisories/59968"
},
{
"name": "MS14-071",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-071"
},
{
"name": "1031191",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031191"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-6345", "ID": "CVE-2014-6345",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS14-065", "name": "1031185",
"refsource" : "MS", "refsource": "SECTRACK",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065" "url": "http://www.securitytracker.com/id/1031185"
}, },
{ {
"name": "70942", "name": "70942",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/70942" "url": "http://www.securityfocus.com/bid/70942"
}, },
{ {
"name" : "1031185", "name": "MS14-065",
"refsource" : "SECTRACK", "refsource": "MS",
"url" : "http://www.securitytracker.com/id/1031185" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6726", "ID": "CVE-2014-6726",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#832505", "name": "VU#832505",
"refsource": "CERT-VN", "refsource": "CERT-VN",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-7511", "ID": "CVE-2014-7511",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-7801", "ID": "CVE-2014-7801",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8208", "ID": "CVE-2014-8208",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564"
},
{ {
"name": "1035767", "name": "1035767",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035767" "url": "http://www.securitytracker.com/id/1035767"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2016-2350", "ID": "CVE-2016-2350",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-2417", "ID": "CVE-2016-2417",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-2807", "ID": "CVE-2016-2807",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,60 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-39.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-39.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1187420",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1187420"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1252707", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1252707",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1252707" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1252707"
}, },
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1254164",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1254164"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1254622",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1254622"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1254876",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1254876"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name" : "DSA-3559",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3559"
},
{ {
"name": "DSA-3576", "name": "DSA-3576",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3576" "url": "http://www.debian.org/security/2016/dsa-3576"
}, },
{ {
"name" : "GLSA-201701-15", "name": "http://www.mozilla.org/security/announce/2016/mfsa2016-39.html",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201701-15" "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-39.html"
}, },
{ {
"name" : "RHSA-2016:1041", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1254622",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1041.html" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1254622"
},
{
"name": "openSUSE-SU-2016:1211",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
}, },
{ {
"name": "RHSA-2016:0695", "name": "RHSA-2016:0695",
@ -118,34 +93,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1769", "name": "1035692",
"refsource" : "SUSE", "refsource": "SECTRACK",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" "url": "http://www.securitytracker.com/id/1035692"
},
{
"name" : "openSUSE-SU-2016:1778",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html"
},
{
"name" : "openSUSE-SU-2016:1211",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html"
},
{
"name" : "SUSE-SU-2016:1258",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html"
},
{
"name" : "openSUSE-SU-2016:1251",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html"
},
{
"name" : "SUSE-SU-2016:1352",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html"
}, },
{ {
"name": "SUSE-SU-2016:1374", "name": "SUSE-SU-2016:1374",
@ -153,9 +103,19 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html"
}, },
{ {
"name" : "USN-2936-1", "name": "openSUSE-SU-2016:1778",
"refsource" : "UBUNTU", "refsource": "SUSE",
"url" : "http://www.ubuntu.com/usn/USN-2936-1" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1254876",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1254876"
},
{
"name": "openSUSE-SU-2016:1251",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html"
}, },
{ {
"name": "USN-2936-2", "name": "USN-2936-2",
@ -163,9 +123,9 @@
"url": "http://www.ubuntu.com/usn/USN-2936-2" "url": "http://www.ubuntu.com/usn/USN-2936-2"
}, },
{ {
"name" : "USN-2936-3", "name": "SUSE-SU-2016:1352",
"refsource" : "UBUNTU", "refsource": "SUSE",
"url" : "http://www.ubuntu.com/usn/USN-2936-3" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html"
}, },
{ {
"name": "USN-2973-1", "name": "USN-2973-1",
@ -173,9 +133,49 @@
"url": "http://www.ubuntu.com/usn/USN-2973-1" "url": "http://www.ubuntu.com/usn/USN-2973-1"
}, },
{ {
"name" : "1035692", "name": "openSUSE-SU-2016:1769",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1035692" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html"
},
{
"name": "GLSA-201701-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-15"
},
{
"name": "DSA-3559",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3559"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1187420",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1187420"
},
{
"name": "USN-2936-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2936-1"
},
{
"name": "USN-2936-3",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2936-3"
},
{
"name": "SUSE-SU-2016:1258",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html"
},
{
"name": "RHSA-2016:1041",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1041.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1254164",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1254164"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[aufs] 20160219 aufs3 and aufs4 GIT release", "name": "96839",
"refsource" : "MLIST", "refsource": "BID",
"url" : "https://sourceforge.net/p/aufs/mailman/message/34864744/" "url": "http://www.securityfocus.com/bid/96839"
},
{
"name" : "[oss-security] 20160224 Aufs Union Filesystem Privilege Escalation In User Namespaces",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/02/24/9"
}, },
{ {
"name": "http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/", "name": "http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/",
@ -68,9 +63,14 @@
"url": "http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/" "url": "http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/"
}, },
{ {
"name" : "96839", "name": "[oss-security] 20160224 Aufs Union Filesystem Privilege Escalation In User Namespaces",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/96839" "url": "http://www.openwall.com/lists/oss-security/2016/02/24/9"
},
{
"name": "[aufs] 20160219 aufs3 and aufs4 GIT release",
"refsource": "MLIST",
"url": "https://sourceforge.net/p/aufs/mailman/message/34864744/"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/IJHack/QtPass/issues/338",
"refsource" : "MISC",
"url" : "https://github.com/IJHack/QtPass/issues/338"
},
{ {
"name": "https://github.com/IJHack/QtPass/releases/tag/v1.2.1", "name": "https://github.com/IJHack/QtPass/releases/tag/v1.2.1",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/IJHack/QtPass/releases/tag/v1.2.1" "url": "https://github.com/IJHack/QtPass/releases/tag/v1.2.1"
}, },
{
"name" : "https://lists.zx2c4.com/pipermail/password-store/2018-January/003165.html",
"refsource" : "MISC",
"url" : "https://lists.zx2c4.com/pipermail/password-store/2018-January/003165.html"
},
{ {
"name": "https://qtpass.org/", "name": "https://qtpass.org/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://qtpass.org/" "url": "https://qtpass.org/"
},
{
"name": "https://github.com/IJHack/QtPass/issues/338",
"refsource": "MISC",
"url": "https://github.com/IJHack/QtPass/issues/338"
},
{
"name": "https://lists.zx2c4.com/pipermail/password-store/2018-January/003165.html",
"refsource": "MISC",
"url": "https://lists.zx2c4.com/pipermail/password-store/2018-January/003165.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6aeb75e6adfaed16e58780309613a578fe1ee90b", "name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3",
"refsource": "MISC", "refsource": "MISC",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6aeb75e6adfaed16e58780309613a578fe1ee90b" "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3"
}, },
{ {
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1123706", "name": "https://bugzilla.suse.com/show_bug.cgi?id=1123706",
@ -63,19 +63,19 @@
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1123706" "url": "https://bugzilla.suse.com/show_bug.cgi?id=1123706"
}, },
{ {
"name" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3", "name": "106802",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106802"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6aeb75e6adfaed16e58780309613a578fe1ee90b",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3" "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6aeb75e6adfaed16e58780309613a578fe1ee90b"
}, },
{ {
"name": "https://github.com/torvalds/linux/commit/6aeb75e6adfaed16e58780309613a578fe1ee90b", "name": "https://github.com/torvalds/linux/commit/6aeb75e6adfaed16e58780309613a578fe1ee90b",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/6aeb75e6adfaed16e58780309613a578fe1ee90b" "url": "https://github.com/torvalds/linux/commit/6aeb75e6adfaed16e58780309613a578fe1ee90b"
},
{
"name" : "106802",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/106802"
} }
] ]
} }

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop_29.html", "name": "97220",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop_29.html" "url": "http://www.securityfocus.com/bid/97220"
},
{
"name" : "https://crbug.com/705445",
"refsource" : "MISC",
"url" : "https://crbug.com/705445"
},
{
"name" : "GLSA-201704-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201704-02"
}, },
{ {
"name": "RHSA-2017:0860", "name": "RHSA-2017:0860",
@ -73,9 +63,19 @@
"url": "https://access.redhat.com/errata/RHSA-2017:0860" "url": "https://access.redhat.com/errata/RHSA-2017:0860"
}, },
{ {
"name" : "97220", "name": "GLSA-201704-02",
"refsource" : "BID", "refsource": "GENTOO",
"url" : "http://www.securityfocus.com/bid/97220" "url": "https://security.gentoo.org/glsa/201704-02"
},
{
"name": "https://crbug.com/705445",
"refsource": "MISC",
"url": "https://crbug.com/705445"
},
{
"name": "https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop_29.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop_29.html"
}, },
{ {
"name": "1038623", "name": "1038623",