"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:15:47 +00:00
parent 1fd95ea69c
commit 6ad52b241b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 4453 additions and 4453 deletions

View File

@ -53,9 +53,39 @@
"references": {
"reference_data": [
{
"name" : "20060314 DMA[2006-0313a] - 'Apple OSX Mail.app RFC1740 Real Name Buffer Overflow'",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/427601/100/0/threaded"
"name": "17081",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17081"
},
{
"name": "23872",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23872"
},
{
"name": "ADV-2006-0949",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0949"
},
{
"name": "1015762",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015762"
},
{
"name": "VU#980084",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/980084"
},
{
"name": "macosx-mail-attachment-bo(25209)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25209"
},
{
"name": "19129",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19129"
},
{
"name": "http://www.digitalmunition.com/DMA%5B2006-0313a%5D.txt",
@ -73,39 +103,9 @@
"url": "http://docs.info.apple.com/article.html?artnum=303453"
},
{
"name" : "VU#980084",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/980084"
},
{
"name" : "17081",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17081"
},
{
"name" : "ADV-2006-0949",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0949"
},
{
"name" : "23872",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23872"
},
{
"name" : "1015762",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015762"
},
{
"name" : "19129",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19129"
},
{
"name" : "macosx-mail-attachment-bo(25209)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25209"
"name": "20060314 DMA[2006-0313a] - 'Apple OSX Mail.app RFC1740 Real Name Buffer Overflow'",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/427601/100/0/threaded"
}
]
}

View File

@ -52,16 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "20060203 Re: cPanel Multiple Cross Site Scripting",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=113894933522271&w=2"
},
{
"name": "ADV-2006-0433",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0433"
},
{
"name": "cpanel-scripts-xss(24468)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24468"
},
{
"name": "20060203 Re: cPanel Multiple Cross Site Scripting",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=113894933522271&w=2"
},
{
"name": "22906",
"refsource": "OSVDB",
@ -71,11 +76,6 @@
"name": "18691",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18691"
},
{
"name" : "cpanel-scripts-xss(24468)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24468"
}
]
}

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "22953",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22953"
},
{
"name": "20060206 [xfocus-SD-060206]BCB compiler incorrect deal sizeof operator vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/424085/100/0/threaded"
},
{
"name" : "http://www.xfocus.net/releases/200602/a849.html",
"refsource" : "MISC",
"url" : "http://www.xfocus.net/releases/200602/a849.html"
},
{
"name" : "22953",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22953"
"name": "bcb-compiler-integer-overflow(24514)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24514"
},
{
"name": "1015588",
@ -73,9 +73,9 @@
"url": "http://securitytracker.com/id?1015588"
},
{
"name" : "bcb-compiler-integer-overflow(24514)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24514"
"name": "http://www.xfocus.net/releases/200602/a849.html",
"refsource": "MISC",
"url": "http://www.xfocus.net/releases/200602/a849.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2006-1193",
"STATE": "PUBLIC"
},
@ -52,31 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "1016280",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016280"
},
{
"name": "20060614 SEC Consult SA-20060613-0 :: Outlook Web Access Cross Site Scripting Vulnerability",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046892.html"
},
{
"name" : "http://www.sec-consult.com/fileadmin/Advisories/20060613-0_owa_xss_noexploit.txt",
"refsource" : "MISC",
"url" : "http://www.sec-consult.com/fileadmin/Advisories/20060613-0_owa_xss_noexploit.txt"
"name": "26441",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26441"
},
{
"name" : "MS06-029",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-029"
"name": "exchange-owa-xss(25550)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25550"
},
{
"name": "TA06-164A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-164A.html"
},
{
"name" : "VU#138188",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/138188"
},
{
"name": "18381",
"refsource": "BID",
@ -88,9 +88,9 @@
"url": "http://www.vupen.com/english/advisories/2006/2326"
},
{
"name" : "26441",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26441"
"name": "oval:org.mitre.oval:def:1161",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1161"
},
{
"name": "oval:org.mitre.oval:def:1070",
@ -98,9 +98,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1070"
},
{
"name" : "oval:org.mitre.oval:def:1161",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1161"
"name": "http://www.sec-consult.com/fileadmin/Advisories/20060613-0_owa_xss_noexploit.txt",
"refsource": "MISC",
"url": "http://www.sec-consult.com/fileadmin/Advisories/20060613-0_owa_xss_noexploit.txt"
},
{
"name": "MS06-029",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-029"
},
{
"name": "oval:org.mitre.oval:def:1315",
@ -108,19 +113,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1315"
},
{
"name" : "1016280",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016280"
"name": "VU#138188",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/138188"
},
{
"name": "20634",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20634"
},
{
"name" : "exchange-owa-xss(25550)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25550"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "1566",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1566"
"name": "ADV-2006-0895",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0895"
},
{
"name": "http://gallery.menalto.com/2.0.4_and_2.1_rc_2a_update",
"refsource": "CONFIRM",
"url": "http://gallery.menalto.com/2.0.4_and_2.1_rc_2a_update"
},
{
"name": "gallery-multiple-index-file-include(25129)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25129"
},
{
"name": "1566",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1566"
},
{
"name": "17051",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17051"
},
{
"name" : "ADV-2006-0895",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0895"
},
{
"name": "19175",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19175"
},
{
"name" : "gallery-multiple-index-file-include(25129)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25129"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2006-1194",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1194"
},
{
"name": "GLSA-200604-01",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200604-01.xml"
},
{
"name": "[MediaWiki-announce] 20060327 MediaWiki 1.5.8, 1.4.15 released [SECURITY]",
"refsource": "MLIST",
@ -63,9 +73,9 @@
"url": "http://www.mediawiki.org/wiki/MediaWiki"
},
{
"name" : "GLSA-200604-01",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200604-01.xml"
"name": "19517",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19517"
},
{
"name": "SUSE-SR:2006:007",
@ -78,14 +88,9 @@
"url": "http://www.securityfocus.com/bid/17269"
},
{
"name" : "ADV-2006-1194",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1194"
},
{
"name" : "19504",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19504"
"name": "mediawiki-unspecified-xss(25588)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25588"
},
{
"name": "19508",
@ -93,14 +98,9 @@
"url": "http://secunia.com/advisories/19508"
},
{
"name" : "19517",
"name": "19504",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19517"
},
{
"name" : "mediawiki-unspecified-xss(25588)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25588"
"url": "http://secunia.com/advisories/19504"
}
]
}

View File

@ -58,19 +58,9 @@
"url": "http://www.securityfocus.com/archive/1/429521/100/0/threaded"
},
{
"name" : "20060331 Buffer-overflow and in-game crash in Zdaemon 1.08.01",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044775.html"
},
{
"name" : "http://aluigi.altervista.org/adv/zdaebof-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/zdaebof-adv.txt"
},
{
"name" : "17340",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17340"
"name": "ADV-2006-1198",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1198"
},
{
"name": "ADV-2006-1199",
@ -78,9 +68,24 @@
"url": "http://www.vupen.com/english/advisories/2006/1199"
},
{
"name" : "ADV-2006-1198",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1198"
"name": "17340",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17340"
},
{
"name": "662",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/662"
},
{
"name": "http://aluigi.altervista.org/adv/zdaebof-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/zdaebof-adv.txt"
},
{
"name": "20060331 Buffer-overflow and in-game crash in Zdaemon 1.08.01",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044775.html"
},
{
"name": "19509",
@ -92,11 +97,6 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19496"
},
{
"name" : "662",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/662"
},
{
"name": "zdaemon-memory-access-dos(25593)",
"refsource": "XF",

View File

@ -58,15 +58,20 @@
"url": "http://sourceforge.net/project/shownotes.php?release_id=410001&group_id=24031"
},
{
"name" : "17585",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17585"
"name": "empireserver-unspecified(25863)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25863"
},
{
"name": "ADV-2006-1380",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1380"
},
{
"name": "17585",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17585"
},
{
"name": "24700",
"refsource": "OSVDB",
@ -76,11 +81,6 @@
"name": "19674",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19674"
},
{
"name" : "empireserver-unspecified(25863)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25863"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060927 PHPSelect Web Development Division <= Remote File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/447177/100/0/threaded"
"name": "1666",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1666"
},
{
"name": "20231",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/20231"
},
{
"name" : "1666",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1666"
"name": "20060927 PHPSelect Web Development Division <= Remote File Inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/447177/100/0/threaded"
},
{
"name": "phpselect-index-file-include(29223)",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2006-5584",
"STATE": "PUBLIC"
},
@ -53,54 +53,54 @@
"references": {
"reference_data": [
{
"name" : "HPSBST02180",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
},
{
"name" : "SSRT061288",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
},
{
"name" : "MS06-077",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-077"
},
{
"name" : "TA06-346A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-346A.html"
"name": "ADV-2006-4970",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4970"
},
{
"name": "VU#238064",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/238064"
},
{
"name" : "21495",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21495"
},
{
"name" : "ADV-2006-4970",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4970"
},
{
"name" : "oval:org.mitre.oval:def:375",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A375"
},
{
"name": "1017368",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017368"
},
{
"name": "TA06-346A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-346A.html"
},
{
"name": "MS06-077",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-077"
},
{
"name": "SSRT061288",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
},
{
"name": "HPSBST02180",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
},
{
"name": "23312",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23312"
},
{
"name": "21495",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21495"
},
{
"name": "oval:org.mitre.oval:def:375",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A375"
}
]
}

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "20061107 WFTPD Pro Server 3.23 Buffer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/450851/100/0/threaded"
},
{
"name" : "20061107 WFTPD Pro Server 3.23 Buffer Overflow",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=116289234522958&w=2"
},
{
"name" : "20061108 WFTPD Pro Server 3.23 Buffer Overflow",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=116295408114746&w=2"
},
{
"name" : "2734",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2734"
},
{
"name": "20942",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20942"
},
{
"name" : "1017173",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017173"
},
{
"name": "1837",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1837"
},
{
"name": "1017173",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017173"
},
{
"name": "2734",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2734"
},
{
"name": "20061108 WFTPD Pro Server 3.23 Buffer Overflow",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=116295408114746&w=2"
},
{
"name": "20061107 WFTPD Pro Server 3.23 Buffer Overflow",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=116289234522958&w=2"
},
{
"name": "wftpd-appe-bo(30079)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30079"
},
{
"name": "20061107 WFTPD Pro Server 3.23 Buffer Overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/450851/100/0/threaded"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20061028 Exporia => 0.3.0 Remote File Include Vulnerability Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/450024/100/200/threaded"
},
{
"name": "20205",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20205"
},
{
"name" : "1858",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1858"
"name": "20061028 Exporia => 0.3.0 Remote File Include Vulnerability Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/450024/100/200/threaded"
},
{
"name": "exporia-common-file-include(29895)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29895"
},
{
"name": "1858",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1858"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "11082",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/11082"
},
{
"name" : "40757",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40757"
},
{
"name": "61617",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/61617"
},
{
"name": "phpcalendars-productlist-sql-injection(55518)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55518"
},
{
"name": "11082",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11082"
},
{
"name": "38036",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38036"
},
{
"name" : "phpcalendars-productlist-sql-injection(55518)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55518"
"name": "40757",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40757"
}
]
}

View File

@ -57,6 +57,31 @@
"refsource": "CONFIRM",
"url": "https://www.isc.org/advisories/CVE-2009-4022v6"
},
{
"name": "oval:org.mitre.oval:def:7086",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7086"
},
{
"name": "ADV-2010-1352",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1352"
},
{
"name": "40086",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40086"
},
{
"name": "ADV-2010-0622",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0622"
},
{
"name": "oval:org.mitre.oval:def:6665",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6665"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018",
"refsource": "CONFIRM",
@ -71,31 +96,6 @@
"name": "oval:org.mitre.oval:def:11753",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11753"
},
{
"name" : "oval:org.mitre.oval:def:7086",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7086"
},
{
"name" : "oval:org.mitre.oval:def:6665",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6665"
},
{
"name" : "40086",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40086"
},
{
"name" : "ADV-2010-0622",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/0622"
},
{
"name" : "ADV-2010-1352",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1352"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-0427",
"STATE": "PUBLIC"
},
@ -52,11 +52,76 @@
},
"references": {
"reference_data": [
{
"name": "38803",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38803"
},
{
"name": "ftp://ftp.sudo.ws/pub/sudo/sudo-1.6.9p21.patch.gz",
"refsource": "CONFIRM",
"url": "ftp://ftp.sudo.ws/pub/sudo/sudo-1.6.9p21.patch.gz"
},
{
"name": "GLSA-201003-01",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-201003-01.xml"
},
{
"name": "http://sudo.ws/repos/sudo/rev/aa0b6c01c462",
"refsource": "CONFIRM",
"url": "http://sudo.ws/repos/sudo/rev/aa0b6c01c462"
},
{
"name": "38762",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38762"
},
{
"name": "DSA-2006",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2006"
},
{
"name": "oval:org.mitre.oval:def:10946",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10946"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=567622",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=567622"
},
{
"name": "oval:org.mitre.oval:def:7216",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7216"
},
{
"name": "20101027 rPSA-2010-0075-1 sudo",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/514489/100/0/threaded"
},
{
"name": "USN-905-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-905-1"
},
{
"name": "http://www.gratisoft.us/bugzilla/attachment.cgi?id=255",
"refsource": "CONFIRM",
"url": "http://www.gratisoft.us/bugzilla/attachment.cgi?id=255"
},
{
"name": "SUSE-SR:2010:006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2010-0075",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/Advisories:rPSA-2010-0075"
},
{
"name": "[oss-security] 20100223 CVE assignment notification -- CVE-2010-0427 -- sudo fails to reset group permissions if runas_default set",
"refsource": "MLIST",
@ -68,94 +133,29 @@
"url": "http://www.openwall.com/lists/oss-security/2010/02/24/5"
},
{
"name" : "ftp://ftp.sudo.ws/pub/sudo/sudo-1.6.9p21.patch.gz",
"refsource" : "CONFIRM",
"url" : "ftp://ftp.sudo.ws/pub/sudo/sudo-1.6.9p21.patch.gz"
},
{
"name" : "http://sudo.ws/repos/sudo/rev/aa0b6c01c462",
"refsource" : "CONFIRM",
"url" : "http://sudo.ws/repos/sudo/rev/aa0b6c01c462"
},
{
"name" : "http://www.gratisoft.us/bugzilla/attachment.cgi?id=255",
"refsource" : "CONFIRM",
"url" : "http://www.gratisoft.us/bugzilla/attachment.cgi?id=255"
},
{
"name" : "http://www.gratisoft.us/bugzilla/show_bug.cgi?id=349",
"refsource" : "CONFIRM",
"url" : "http://www.gratisoft.us/bugzilla/show_bug.cgi?id=349"
"name": "38795",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38795"
},
{
"name": "http://www.sudo.ws/cgi-bin/cvsweb/sudo/set_perms.c.diff?r1=1.30.2.7&r2=1.30.2.8",
"refsource": "CONFIRM",
"url": "http://www.sudo.ws/cgi-bin/cvsweb/sudo/set_perms.c.diff?r1=1.30.2.7&r2=1.30.2.8"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=567622",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=567622"
},
{
"name" : "http://wiki.rpath.com/Advisories:rPSA-2010-0075",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/Advisories:rPSA-2010-0075"
},
{
"name" : "DSA-2006",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2006"
},
{
"name" : "GLSA-201003-01",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-201003-01.xml"
},
{
"name" : "SUSE-SR:2010:006",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
},
{
"name" : "USN-905-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-905-1"
},
{
"name" : "oval:org.mitre.oval:def:10946",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10946"
},
{
"name" : "oval:org.mitre.oval:def:7216",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7216"
},
{
"name" : "1023658",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1023658"
},
{
"name": "38915",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38915"
},
{
"name" : "38795",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38795"
"name": "http://www.gratisoft.us/bugzilla/show_bug.cgi?id=349",
"refsource": "CONFIRM",
"url": "http://www.gratisoft.us/bugzilla/show_bug.cgi?id=349"
},
{
"name" : "38803",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38803"
},
{
"name" : "38762",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38762"
"name": "1023658",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023658"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-0429",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-0483",
"STATE": "PUBLIC"
},
@ -53,104 +53,104 @@
"references": {
"reference_data": [
{
"name" : "http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt",
"refsource" : "MISC",
"url" : "http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt"
"name": "oval:org.mitre.oval:def:7170",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7170"
},
{
"name" : "http://isec.pl/vulnerabilities10.html",
"refsource" : "MISC",
"url" : "http://isec.pl/vulnerabilities10.html"
},
{
"name" : "http://www.computerworld.com/s/article/9163298/New_zero_day_involves_IE_puts_Windows_XP_users_at_risk",
"refsource" : "MISC",
"url" : "http://www.computerworld.com/s/article/9163298/New_zero_day_involves_IE_puts_Windows_XP_users_at_risk"
},
{
"name" : "http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/",
"refsource" : "MISC",
"url" : "http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/"
},
{
"name" : "https://www.metasploit.com/svn/framework3/trunk/modules/exploits/windows/browser/ie_winhlp32.rb",
"refsource" : "MISC",
"url" : "https://www.metasploit.com/svn/framework3/trunk/modules/exploits/windows/browser/ie_winhlp32.rb"
},
{
"name" : "http://blogs.technet.com/msrc/archive/2010/02/28/investigating-a-new-win32hlp-and-internet-explorer-issue.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.technet.com/msrc/archive/2010/02/28/investigating-a-new-win32hlp-and-internet-explorer-issue.aspx"
},
{
"name" : "http://blogs.technet.com/msrc/archive/2010/03/01/security-advisory-981169-released.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.technet.com/msrc/archive/2010/03/01/security-advisory-981169-released.aspx"
},
{
"name" : "http://blogs.technet.com/srd/archive/2010/03/01/help-keypress-vulnerability-in-vbscript-enabling-remote-code-execution.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.technet.com/srd/archive/2010/03/01/help-keypress-vulnerability-in-vbscript-enabling-remote-code-execution.aspx"
},
{
"name" : "http://www.microsoft.com/technet/security/advisory/981169.mspx",
"refsource" : "CONFIRM",
"url" : "http://www.microsoft.com/technet/security/advisory/981169.mspx"
"name": "ms-win-msgbox-code-execution(56558)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56558"
},
{
"name": "MS10-022",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-022"
},
{
"name" : "TA10-103A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-103A.html"
},
{
"name": "VU#612021",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/612021"
},
{
"name" : "38463",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/38463"
},
{
"name": "62632",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/62632"
},
{
"name" : "oval:org.mitre.oval:def:7170",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7170"
"name": "ADV-2010-0485",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0485"
},
{
"name": "http://www.computerworld.com/s/article/9163298/New_zero_day_involves_IE_puts_Windows_XP_users_at_risk",
"refsource": "MISC",
"url": "http://www.computerworld.com/s/article/9163298/New_zero_day_involves_IE_puts_Windows_XP_users_at_risk"
},
{
"name": "http://www.microsoft.com/technet/security/advisory/981169.mspx",
"refsource": "CONFIRM",
"url": "http://www.microsoft.com/technet/security/advisory/981169.mspx"
},
{
"name": "http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/",
"refsource": "MISC",
"url": "http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/"
},
{
"name": "http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt",
"refsource": "MISC",
"url": "http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt"
},
{
"name": "38463",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38463"
},
{
"name": "http://isec.pl/vulnerabilities10.html",
"refsource": "MISC",
"url": "http://isec.pl/vulnerabilities10.html"
},
{
"name": "oval:org.mitre.oval:def:8654",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8654"
},
{
"name": "http://blogs.technet.com/srd/archive/2010/03/01/help-keypress-vulnerability-in-vbscript-enabling-remote-code-execution.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/srd/archive/2010/03/01/help-keypress-vulnerability-in-vbscript-enabling-remote-code-execution.aspx"
},
{
"name": "https://www.metasploit.com/svn/framework3/trunk/modules/exploits/windows/browser/ie_winhlp32.rb",
"refsource": "MISC",
"url": "https://www.metasploit.com/svn/framework3/trunk/modules/exploits/windows/browser/ie_winhlp32.rb"
},
{
"name": "1023668",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023668"
},
{
"name": "http://blogs.technet.com/msrc/archive/2010/03/01/security-advisory-981169-released.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/msrc/archive/2010/03/01/security-advisory-981169-released.aspx"
},
{
"name": "http://blogs.technet.com/msrc/archive/2010/02/28/investigating-a-new-win32hlp-and-internet-explorer-issue.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/msrc/archive/2010/02/28/investigating-a-new-win32hlp-and-internet-explorer-issue.aspx"
},
{
"name": "TA10-103A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-103A.html"
},
{
"name": "38727",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38727"
},
{
"name" : "ADV-2010-0485",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/0485"
},
{
"name" : "ms-win-msgbox-code-execution(56558)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56558"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-1417",
"STATE": "PUBLIC"
},
@ -53,35 +53,120 @@
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT4196",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4196"
"name": "MDVSA-2011:039",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
},
{
"name": "http://support.apple.com/kb/HT4220",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4220"
},
{
"name": "ADV-2010-2722",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2722"
},
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "USN-1006-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1006-1"
},
{
"name": "41856",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41856"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "http://support.apple.com/kb/HT4225",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4225"
},
{
"name" : "http://support.apple.com/kb/HT4456",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4456"
},
{
"name": "APPLE-SA-2010-06-07-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html"
},
{
"name": "oval:org.mitre.oval:def:6876",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6876"
},
{
"name": "40196",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40196"
},
{
"name": "40105",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40105"
},
{
"name": "ADV-2010-1373",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1373"
},
{
"name": "APPLE-SA-2010-06-16-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "40672",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40672"
},
{
"name": "42314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42314"
},
{
"name": "ADV-2010-1512",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1512"
},
{
"name": "40620",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40620"
},
{
"name": "ADV-2011-0552",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0552"
},
{
"name": "http://support.apple.com/kb/HT4456",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4456"
},
{
"name": "1024067",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024067"
},
{
"name": "http://support.apple.com/kb/HT4196",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4196"
},
{
"name": "APPLE-SA-2010-06-21-1",
"refsource": "APPLE",
@ -91,91 +176,6 @@
"name": "APPLE-SA-2010-11-22-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
},
{
"name" : "MDVSA-2011:039",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
},
{
"name" : "SUSE-SR:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name" : "USN-1006-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1006-1"
},
{
"name" : "40620",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40620"
},
{
"name" : "40672",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40672"
},
{
"name" : "oval:org.mitre.oval:def:6876",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6876"
},
{
"name" : "1024067",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1024067"
},
{
"name" : "40105",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40105"
},
{
"name" : "40196",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40196"
},
{
"name" : "41856",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41856"
},
{
"name" : "42314",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42314"
},
{
"name" : "43068",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43068"
},
{
"name" : "ADV-2010-1373",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1373"
},
{
"name" : "ADV-2010-1512",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1512"
},
{
"name" : "ADV-2010-2722",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2722"
},
{
"name" : "ADV-2011-0212",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name" : "ADV-2011-0552",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0552"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.org/1001-exploits/phpbannerexchange-xss.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1001-exploits/phpbannerexchange-xss.txt"
"name": "38022",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38022"
},
{
"name": "61446",
@ -63,9 +63,9 @@
"url": "http://osvdb.org/61446"
},
{
"name" : "38022",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38022"
"name": "http://packetstormsecurity.org/1001-exploits/phpbannerexchange-xss.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1001-exploits/phpbannerexchange-xss.txt"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "40899",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40899"
},
{
"name": "http://www.htbridge.ch/advisory/directory_traversal_in_smartftp.html",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "http://www.smartftp.com/forums/index.php?/topic/16425-smartftp-client-40-change-log/",
"refsource": "MISC",
"url": "http://www.smartftp.com/forums/index.php?/topic/16425-smartftp-client-40-change-log/"
},
{
"name" : "40899",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40899"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2010-3283",
"STATE": "PUBLIC"
},

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "PJ37426",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PJ37426"
},
{
"name": "43136",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43136"
},
{
"name": "PJ37426",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PJ37426"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-3541",
"STATE": "PUBLIC"
},
@ -52,150 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html"
},
{
"name" : "http://support.avaya.com/css/P8/documents/100114315",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100114315"
},
{
"name": "http://support.avaya.com/css/P8/documents/100114327",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100114327"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=642202",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=642202"
},
{
"name" : "http://support.avaya.com/css/P8/documents/100123193",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100123193"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name" : "FEDORA-2010-16240",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html"
},
{
"name" : "FEDORA-2010-16294",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html"
},
{
"name" : "FEDORA-2010-16312",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html"
},
{
"name" : "GLSA-201406-32",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBUX02608",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
},
{
"name" : "SSRT100333",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
},
{
"name" : "HPSBMU02799",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
},
{
"name" : "RHSA-2010:0770",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0770.html"
},
{
"name" : "RHSA-2010:0786",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0786.html"
},
{
"name" : "RHSA-2010:0807",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0807.html"
},
{
"name" : "RHSA-2010:0768",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0768.html"
},
{
"name": "RHSA-2010:0865",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0865.html"
},
{
"name" : "RHSA-2010:0873",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0873.html"
"name": "http://support.avaya.com/css/P8/documents/100114315",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100114315"
},
{
"name" : "RHSA-2010:0986",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0986.html"
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "RHSA-2010:0987",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0987.html"
},
{
"name" : "RHSA-2011:0880",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0880.html"
"name": "HPSBMU02799",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
},
{
"name": "SUSE-SA:2010:061",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html"
},
{
"name" : "SUSE-SR:2010:019",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name" : "USN-1010-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1010-1"
},
{
"name": "44032",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44032"
},
{
"name" : "oval:org.mitre.oval:def:12491",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12491"
"name": "RHSA-2010:0770",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html"
},
{
"name": "oval:org.mitre.oval:def:14354",
@ -203,29 +98,134 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14354"
},
{
"name" : "41967",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41967"
"name": "SSRT100333",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
},
{
"name" : "41972",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41972"
"name": "RHSA-2010:0768",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0768.html"
},
{
"name" : "42974",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42974"
"name": "FEDORA-2010-16240",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html"
},
{
"name": "USN-1010-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1010-1"
},
{
"name": "oval:org.mitre.oval:def:12491",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12491"
},
{
"name": "RHSA-2010:0987",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0987.html"
},
{
"name": "RHSA-2010:0986",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0986.html"
},
{
"name": "44954",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44954"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=642202",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=642202"
},
{
"name": "RHSA-2011:0880",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html"
},
{
"name": "RHSA-2010:0873",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0873.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "42974",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42974"
},
{
"name": "41972",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41972"
},
{
"name": "HPSBUX02608",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
},
{
"name": "http://support.avaya.com/css/P8/documents/100123193",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100123193"
},
{
"name": "RHSA-2010:0786",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0786.html"
},
{
"name": "SUSE-SR:2010:019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "41967",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41967"
},
{
"name": "RHSA-2010:0807",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0807.html"
},
{
"name": "FEDORA-2010-16312",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html"
},
{
"name": "ADV-2010-2745",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2745"
},
{
"name": "FEDORA-2010-16294",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=644596",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=644596"
},
{
"name" : "FEDORA-2010-17248",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050763.html"
"name": "ADV-2010-2971",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2971"
},
{
"name": "FEDORA-2010-17256",
@ -68,9 +63,14 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050783.html"
},
{
"name" : "ADV-2010-2971",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2971"
"name": "FEDORA-2010-17248",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050763.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=644596",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=644596"
}
]
}

View File

@ -53,25 +53,20 @@
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=60055",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=60055"
"name": "42690",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42690"
},
{
"name": "oval:org.mitre.oval:def:12198",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12198"
},
{
"name": "http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html"
},
{
"name" : "http://review.webmproject.org/gitweb?p=libvpx.git;a=blob;f=CHANGELOG",
"refsource" : "CONFIRM",
"url" : "http://review.webmproject.org/gitweb?p=libvpx.git;a=blob;f=CHANGELOG"
},
{
"name" : "http://review.webmproject.org/gitweb?p=libvpx.git;a=commit;h=09bcc1f710ea65dc158639479288fb1908ff0c53",
"refsource" : "CONFIRM",
"url" : "http://review.webmproject.org/gitweb?p=libvpx.git;a=commit;h=09bcc1f710ea65dc158639479288fb1908ff0c53"
},
{
"name": "GLSA-201101-03",
"refsource": "GENTOO",
@ -82,35 +77,40 @@
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0999.html"
},
{
"name" : "oval:org.mitre.oval:def:12198",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12198"
},
{
"name": "42109",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42109"
},
{
"name": "http://review.webmproject.org/gitweb?p=libvpx.git;a=blob;f=CHANGELOG",
"refsource": "CONFIRM",
"url": "http://review.webmproject.org/gitweb?p=libvpx.git;a=blob;f=CHANGELOG"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=60055",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=60055"
},
{
"name": "42118",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42118"
},
{
"name" : "42690",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42690"
"name": "ADV-2011-0115",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0115"
},
{
"name": "http://review.webmproject.org/gitweb?p=libvpx.git;a=commit;h=09bcc1f710ea65dc158639479288fb1908ff0c53",
"refsource": "CONFIRM",
"url": "http://review.webmproject.org/gitweb?p=libvpx.git;a=commit;h=09bcc1f710ea65dc158639479288fb1908ff0c53"
},
{
"name": "42908",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42908"
},
{
"name" : "ADV-2011-0115",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0115"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "14217",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/14217"
},
{
"name" : "http://packetstormsecurity.org/1007-exploits/wikiwebhelp-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1007-exploits/wikiwebhelp-sql.txt"
"name": "ADV-2010-1704",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1704"
},
{
"name": "41344",
@ -73,9 +68,14 @@
"url": "http://securityreason.com/securityalert/8491"
},
{
"name" : "ADV-2010-1704",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1704"
"name": "14217",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14217"
},
{
"name": "http://packetstormsecurity.org/1007-exploits/wikiwebhelp-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1007-exploits/wikiwebhelp-sql.txt"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-0255",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3499",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-4442",
"STATE": "PUBLIC"
},
@ -52,26 +52,26 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/kb/HT6535",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT6535"
},
{
"name": "APPLE-SA-2014-10-16-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{
"name" : "70624",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70624"
},
{
"name": "1031063",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031063"
},
{
"name": "https://support.apple.com/kb/HT6535",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6535"
},
{
"name": "70624",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70624"
},
{
"name": "macosx-cve20144442-dos(97632)",
"refsource": "XF",

View File

@ -57,71 +57,36 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/06/26/24"
},
{
"name" : "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html",
"refsource" : "MISC",
"url" : "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html"
},
{
"name" : "http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html",
"refsource" : "MISC",
"url" : "http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html"
},
{
"name" : "https://www.securitymouse.com/lms-2014-06-16-5",
"refsource" : "MISC",
"url" : "https://www.securitymouse.com/lms-2014-06-16-5"
},
{
"name": "https://www.securitymouse.com/lms-2014-06-16-6",
"refsource": "MISC",
"url": "https://www.securitymouse.com/lms-2014-06-16-6"
},
{
"name" : "http://twitter.com/djrbliss/statuses/484931749013495809",
"refsource" : "MISC",
"url" : "http://twitter.com/djrbliss/statuses/484931749013495809"
},
{
"name" : "http://twitter.com/djrbliss/statuses/485042901399789568",
"refsource" : "MISC",
"url" : "http://twitter.com/djrbliss/statuses/485042901399789568"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=206204a1162b995e2185275167b22468c00d6b36",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=206204a1162b995e2185275167b22468c00d6b36"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1112436",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1112436"
},
{
"name" : "https://code.google.com/p/lz4/issues/detail?id=52",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/lz4/issues/detail?id=52"
},
{
"name": "https://code.google.com/p/lz4/source/detail?r=118",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/lz4/source/detail?r=118"
},
{
"name" : "https://github.com/torvalds/linux/commit/206204a1162b995e2185275167b22468c00d6b36",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/206204a1162b995e2185275167b22468c00d6b36"
},
{
"name": "openSUSE-SU-2014:0924",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00025.html"
},
{
"name": "http://twitter.com/djrbliss/statuses/485042901399789568",
"refsource": "MISC",
"url": "http://twitter.com/djrbliss/statuses/485042901399789568"
},
{
"name": "60238",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60238"
},
{
"name": "http://twitter.com/djrbliss/statuses/484931749013495809",
"refsource": "MISC",
"url": "http://twitter.com/djrbliss/statuses/484931749013495809"
},
{
"name": "1030491",
"refsource": "SECTRACK",
@ -133,14 +98,49 @@
"url": "http://secunia.com/advisories/59770"
},
{
"name" : "60238",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60238"
"name": "http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html",
"refsource": "MISC",
"url": "http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html"
},
{
"name": "59567",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59567"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=206204a1162b995e2185275167b22468c00d6b36",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=206204a1162b995e2185275167b22468c00d6b36"
},
{
"name": "https://github.com/torvalds/linux/commit/206204a1162b995e2185275167b22468c00d6b36",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/206204a1162b995e2185275167b22468c00d6b36"
},
{
"name": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html",
"refsource": "MISC",
"url": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1112436",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112436"
},
{
"name": "https://www.securitymouse.com/lms-2014-06-16-5",
"refsource": "MISC",
"url": "https://www.securitymouse.com/lms-2014-06-16-5"
},
{
"name": "https://code.google.com/p/lz4/issues/detail?id=52",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/lz4/issues/detail?id=52"
}
]
}

View File

@ -53,20 +53,25 @@
"references": {
"reference_data": [
{
"name" : "http://xenbits.xenproject.org/xsa/advisory-112.html",
"refsource" : "CONFIRM",
"url" : "http://xenbits.xenproject.org/xsa/advisory-112.html"
"name": "RHSA-2015:0783",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0783.html"
},
{
"name": "GLSA-201504-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-04"
},
{
"name": "62672",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62672"
},
{
"name": "http://support.citrix.com/article/CTX201794",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX201794"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "http://support.citrix.com/article/CTX200288",
"refsource": "CONFIRM",
@ -77,30 +82,25 @@
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3140"
},
{
"name" : "GLSA-201504-04",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-04"
},
{
"name" : "RHSA-2015:0783",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0783.html"
},
{
"name": "openSUSE-SU-2015:0226",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "openSUSE-SU-2015:0256",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html"
},
{
"name" : "71331",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71331"
"name": "http://xenbits.xenproject.org/xsa/advisory-112.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xenproject.org/xsa/advisory-112.html"
},
{
"name": "59949",
@ -108,9 +108,9 @@
"url": "http://secunia.com/advisories/59949"
},
{
"name" : "62672",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62672"
"name": "71331",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71331"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2014-9923",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-05-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-05-01"
},
{
"name": "98225",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98225"
},
{
"name": "https://source.android.com/security/bulletin/2017-05-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-05-01"
}
]
}

View File

@ -58,19 +58,9 @@
"url": "http://www.phpmyadmin.net/home_page/security/PMASA-2016-7.php"
},
{
"name" : "https://github.com/phpmyadmin/phpmyadmin/commit/019c4f25d500ec5db9ba3b84cc961a7e4e850738",
"refsource" : "CONFIRM",
"url" : "https://github.com/phpmyadmin/phpmyadmin/commit/019c4f25d500ec5db9ba3b84cc961a7e4e850738"
},
{
"name" : "FEDORA-2016-e1fe01e96e",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176483.html"
},
{
"name" : "FEDORA-2016-e55278763e",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176739.html"
"name": "openSUSE-SU-2016:0378",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00049.html"
},
{
"name": "openSUSE-SU-2016:0357",
@ -78,9 +68,19 @@
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00028.html"
},
{
"name" : "openSUSE-SU-2016:0378",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00049.html"
"name": "FEDORA-2016-e55278763e",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176739.html"
},
{
"name": "FEDORA-2016-e1fe01e96e",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176483.html"
},
{
"name": "https://github.com/phpmyadmin/phpmyadmin/commit/019c4f25d500ec5db9ba3b84cc961a7e4e850738",
"refsource": "CONFIRM",
"url": "https://github.com/phpmyadmin/phpmyadmin/commit/019c4f25d500ec5db9ba3b84cc961a7e4e850738"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2263",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3075",
"STATE": "PUBLIC"
},
@ -53,20 +53,25 @@
"references": {
"reference_data": [
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=19879",
"refsource" : "CONFIRM",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=19879"
"name": "FEDORA-2016-68abc0be35",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"
},
{
"name": "openSUSE-SU-2016:1779",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html"
},
{
"name": "85732",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85732"
},
{
"name": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=317b199b4aff8cfa27f2302ab404d2bb5032b9a4",
"refsource": "CONFIRM",
"url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=317b199b4aff8cfa27f2302ab404d2bb5032b9a4"
},
{
"name" : "FEDORA-2016-68abc0be35",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"
},
{
"name": "GLSA-201702-11",
"refsource": "GENTOO",
@ -82,20 +87,15 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html"
},
{
"name" : "openSUSE-SU-2016:1779",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html"
},
{
"name": "USN-2985-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2985-1"
},
{
"name" : "85732",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/85732"
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=19879",
"refsource": "CONFIRM",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19879"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-3247",
"STATE": "PUBLIC"
},
@ -53,20 +53,25 @@
"references": {
"reference_data": [
{
"name" : "20161118 CVE-2016-3247 Microsoft Edge CTextExtractor::GetBlockText OOB read details",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/539779/100/0/threaded"
"name": "1036789",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036789"
},
{
"name" : "40797",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40797/"
"name": "92828",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92828"
},
{
"name": "20161118 CVE-2016-3247 Microsoft Edge CTextExtractor::GetBlockText OOB read details",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Nov/111"
},
{
"name": "20161118 CVE-2016-3247 Microsoft Edge CTextExtractor::GetBlockText OOB read details",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/539779/100/0/threaded"
},
{
"name": "http://blog.skylined.nl/20161118002.html",
"refsource": "MISC",
@ -82,20 +87,15 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-105"
},
{
"name" : "92828",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92828"
},
{
"name": "1036788",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036788"
},
{
"name" : "1036789",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036789"
"name": "40797",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40797/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-3486",
"STATE": "PUBLIC"
},
@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name" : "RHSA-2016:1601",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1601.html"
},
{
"name": "USN-3040-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3040-1"
},
{
"name" : "91787",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91787"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "91980",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91980"
},
{
"name": "RHSA-2016:1601",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1601.html"
},
{
"name": "1036362",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036362"
},
{
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20160408 [CVE-2016-3971]DotCMS xss vulnerability",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Apr/37"
},
{
"name": "http://dotcms.com/security/SI-33",
"refsource": "CONFIRM",
"url": "http://dotcms.com/security/SI-33"
},
{
"name": "20160408 [CVE-2016-3971]DotCMS xss vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Apr/37"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://www.phpmyadmin.net/security/PMASA-2016-31"
},
{
"name" : "GLSA-201701-32",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-32"
},
{
"name": "93258",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93258"
},
{
"name": "GLSA-201701-32",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-32"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://www.phpmyadmin.net/security/PMASA-2016-54",
"refsource" : "CONFIRM",
"url" : "https://www.phpmyadmin.net/security/PMASA-2016-54"
"name": "92496",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92496"
},
{
"name": "GLSA-201701-32",
@ -63,9 +63,9 @@
"url": "https://security.gentoo.org/glsa/201701-32"
},
{
"name" : "92496",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92496"
"name": "https://www.phpmyadmin.net/security/PMASA-2016-54",
"refsource": "CONFIRM",
"url": "https://www.phpmyadmin.net/security/PMASA-2016-54"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-6969",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html"
"name": "1036986",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036986"
},
{
"name": "93491",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/93491"
},
{
"name" : "1036986",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036986"
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "MS16-148",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-148"
},
{
"name": "94784",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94784"
},
{
"name": "MS16-148",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-148"
},
{
"name": "1037441",
"refsource": "SECTRACK",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/HT207487",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207487"
},
{
"name": "40955",
"refsource": "EXPLOIT-DB",
@ -62,16 +67,6 @@
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207422"
},
{
"name" : "https://support.apple.com/HT207423",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207423"
},
{
"name" : "https://support.apple.com/HT207487",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207487"
},
{
"name": "94905",
"refsource": "BID",
@ -81,6 +76,11 @@
"name": "1037469",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037469"
},
{
"name": "https://support.apple.com/HT207423",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207423"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7740",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7767",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7846",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{