"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:35:29 +00:00
parent 52c804e9d5
commit 6bb090612f
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 4091 additions and 4091 deletions

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2006-1699",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1699"
},
{
"name": "http://d4igoro.blogspot.com/2006/05/dynamic-galerie-10-path-traversal-xss.html",
"refsource": "MISC",
@ -63,20 +68,15 @@
"url": "http://www.securityfocus.com/bid/17896"
},
{
"name" : "ADV-2006-1699",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1699"
"name": "25444",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25444"
},
{
"name": "25443",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25443"
},
{
"name" : "25444",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/25444"
},
{
"name": "19995",
"refsource": "SECUNIA",

View File

@ -52,16 +52,31 @@
},
"references": {
"reference_data": [
{
"name" : "20060617 [ECHO_ADV_33$2006] CMS Faethon 1.3.2 mainpath Remote File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/437492/100/0/threaded"
},
{
"name": "http://advisories.echo.or.id/adv/adv33-K-159-2006.txt",
"refsource": "MISC",
"url": "http://advisories.echo.or.id/adv/adv33-K-159-2006.txt"
},
{
"name": "20713",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20713"
},
{
"name": "cms-faethon-dataheader-file-include(27330)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27330"
},
{
"name": "1127",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1127"
},
{
"name": "20060617 [ECHO_ADV_33$2006] CMS Faethon 1.3.2 mainpath Remote File Inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/437492/100/0/threaded"
},
{
"name": "18489",
"refsource": "BID",
@ -71,21 +86,6 @@
"name": "ADV-2006-2409",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2409"
},
{
"name" : "20713",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20713"
},
{
"name" : "1127",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1127"
},
{
"name" : "cms-faethon-dataheader-file-include(27330)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27330"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "22068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22068"
},
{
"name": "ADV-2006-3737",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3737"
},
{
"name": "APPLE-SA-2006-09-21",
"refsource": "APPLE",
@ -62,25 +72,15 @@
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/867796"
},
{
"name" : "20144",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20144"
},
{
"name" : "ADV-2006-3737",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3737"
},
{
"name": "1016903",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016903"
},
{
"name" : "22068",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22068"
"name": "20144",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20144"
}
]
}

View File

@ -52,31 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060710 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/439617/100/0/threaded"
},
{
"name" : "20060711 Re: [Full-disclosure] ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440135/100/0/threaded"
},
{
"name" : "20060710 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047757.html"
},
{
"name" : "20060711 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047794.html"
},
{
"name" : "18906",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18906"
},
{
"name": "ADV-2006-2735",
"refsource": "VUPEN",
@ -87,11 +62,6 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27122"
},
{
"name" : "1016455",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016455"
},
{
"name": "20997",
"refsource": "SECUNIA",
@ -101,6 +71,36 @@
"name": "sipxtapi-cseq-bo(27681)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27681"
},
{
"name": "20060711 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047794.html"
},
{
"name": "20060710 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047757.html"
},
{
"name": "18906",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18906"
},
{
"name": "20060711 Re: [Full-disclosure] ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440135/100/0/threaded"
},
{
"name": "1016455",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016455"
},
{
"name": "20060710 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/439617/100/0/threaded"
}
]
}

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "20060702 plume-cms v1.0.4 Multiple Remote File include",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/438948/100/100/threaded"
},
{
"name": "18780",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18780"
},
{
"name" : "1016426",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016426"
"name": "20060702 plume-cms v1.0.4 Multiple Remote File include",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/438948/100/100/threaded"
},
{
"name": "plumecms-multiple-scripts-file-include(27530)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27530"
},
{
"name": "1220",
@ -73,9 +73,9 @@
"url": "http://securityreason.com/securityalert/1220"
},
{
"name" : "plumecms-multiple-scripts-file-include(27530)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27530"
"name": "1016426",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016426"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "20061126 [Aria-Security Team] FipsSHOP SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/453029/100/0/threaded"
"name": "ADV-2006-4779",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4779"
},
{
"name": "1959",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1959"
},
{
"name": "http://www.aria-security.com/forum/showthread.php?t=46",
"refsource": "MISC",
"url": "http://www.aria-security.com/forum/showthread.php?t=46"
},
{
"name" : "21289",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21289"
},
{
"name" : "ADV-2006-4779",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4779"
},
{
"name": "23147",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23147"
},
{
"name" : "1959",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1959"
"name": "20061126 [Aria-Security Team] FipsSHOP SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/453029/100/0/threaded"
},
{
"name": "21289",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21289"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "http://dl.sugarforge.org/sugardocs/Notes/ReleaseNotes/SugarOpenSource_ReleaseNotes_4.5.0g.pdf",
"refsource" : "CONFIRM",
"url" : "http://dl.sugarforge.org/sugardocs/Notes/ReleaseNotes/SugarOpenSource_ReleaseNotes_4.5.0g.pdf"
"name": "1017434",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017434"
},
{
"name": "JVN#74079537",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2374079537/index.html"
},
{
"name" : "21694",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21694"
},
{
"name": "ADV-2006-5100",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5100"
},
{
"name" : "1017434",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017434"
},
{
"name": "23424",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23424"
},
{
"name": "21694",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21694"
},
{
"name": "http://dl.sugarforge.org/sugardocs/Notes/ReleaseNotes/SugarOpenSource_ReleaseNotes_4.5.0g.pdf",
"refsource": "CONFIRM",
"url": "http://dl.sugarforge.org/sugardocs/Notes/ReleaseNotes/SugarOpenSource_ReleaseNotes_4.5.0g.pdf"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "2993",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2993"
"name": "ADV-2006-5151",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5151"
},
{
"name": "21763",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21763"
},
{
"name" : "ADV-2006-5151",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/5151"
},
{
"name": "23515",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23515"
},
{
"name": "2993",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2993"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "3026",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3026"
},
{
"name" : "21793",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21793"
},
{
"name": "ADV-2006-5195",
"refsource": "VUPEN",
@ -71,6 +61,16 @@
"name": "bubla-process-file-include(31135)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31135"
},
{
"name": "3026",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3026"
},
{
"name": "21793",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21793"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://sla.ckers.org/forum/read.php?13,2253",
"refsource" : "MISC",
"url" : "http://sla.ckers.org/forum/read.php?13,2253"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=356355",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=356355"
},
{
"name": "http://sla.ckers.org/forum/read.php?13,2253",
"refsource": "MISC",
"url": "http://sla.ckers.org/forum/read.php?13,2253"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-0008",
"STATE": "PUBLIC"
},
@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=668843",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=668843"
"name": "MDVSA-2011:018",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:018"
},
{
"name": "FEDORA-2011-0470",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html"
},
{
"name": "ADV-2011-0199",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0199"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=668843",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=668843"
},
{
"name": "sudo-parse-privilege-escalation(64965)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64965"
},
{
"name": "FEDORA-2011-0455",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html"
},
{
"name" : "MDVSA-2011:018",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:018"
},
{
"name" : "42968",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42968"
},
{
"name": "ADV-2011-0195",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0195"
},
{
"name" : "ADV-2011-0199",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0199"
},
{
"name" : "sudo-parse-privilege-escalation(64965)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64965"
"name": "42968",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42968"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-0654",
"STATE": "PUBLIC"
},
@ -52,31 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "16166",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/16166"
},
{
"name" : "20110214 MS Windows Server 2003 AD Pre-Auth BROWSER ELECTION Remote Heap Overflow",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0284.html"
},
{
"name": "http://blogs.technet.com/b/mmpc/archive/2011/02/16/my-sweet-valentine-the-cifs-browser-protocol-heap-corruption-vulnerability.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/b/mmpc/archive/2011/02/16/my-sweet-valentine-the-cifs-browser-protocol-heap-corruption-vulnerability.aspx"
},
{
"name" : "http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx"
},
{
"name" : "MS11-019",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-019"
},
{
"name": "TA11-102A",
"refsource": "CERT",
@ -88,39 +68,59 @@
"url": "http://www.kb.cert.org/vuls/id/323172"
},
{
"name" : "46360",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46360"
},
{
"name" : "oval:org.mitre.oval:def:12637",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12637"
},
{
"name" : "1025328",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025328"
},
{
"name" : "43299",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43299"
"name": "16166",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/16166"
},
{
"name": "ADV-2011-0394",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0394"
},
{
"name": "http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx"
},
{
"name": "1025328",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025328"
},
{
"name": "20110214 MS Windows Server 2003 AD Pre-Auth BROWSER ELECTION Remote Heap Overflow",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0284.html"
},
{
"name": "46360",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46360"
},
{
"name": "ADV-2011-0938",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0938"
},
{
"name": "43299",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43299"
},
{
"name": "ms-win-server-browser-bo(65376)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65376"
},
{
"name": "MS11-019",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-019"
},
{
"name": "oval:org.mitre.oval:def:12637",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12637"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-0805",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-0845",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
},
{
"name": "TA11-201A",
"refsource": "CERT",
@ -66,6 +61,11 @@
"name": "48794",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48794"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0935",
"STATE": "PUBLIC"
},

View File

@ -58,14 +58,9 @@
"url": "http://code.google.com/p/chromium/issues/detail?id=70078"
},
{
"name" : "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html"
},
{
"name" : "46614",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46614"
"name": "google-chrome-form-controls-unspecified(65729)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65729"
},
{
"name": "oval:org.mitre.oval:def:14245",
@ -73,9 +68,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14245"
},
{
"name" : "google-chrome-form-controls-unspecified(65729)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65729"
"name": "46614",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46614"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1623",
"STATE": "PUBLIC"
},
@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20110601 Default Credentials for root Account on the Cisco Media Experience Engine 5600",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80122.shtml"
"name": "72721",
"refsource": "OSVDB",
"url": "http://osvdb.org/72721"
},
{
"name": "cisco-mxe-default-password(67760)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67760"
},
{
"name": "48078",
@ -63,19 +68,14 @@
"url": "http://www.securityfocus.com/bid/48078"
},
{
"name" : "72721",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/72721"
"name": "20110601 Default Credentials for root Account on the Cisco Media Experience Engine 5600",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80122.shtml"
},
{
"name": "1025590",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025590"
},
{
"name" : "cisco-mxe-default-password(67760)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67760"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-3249",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT5016",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5016"
},
{
"name": "http://support.apple.com/kb/HT5130",
"refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "oval:org.mitre.oval:def:16130",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16130"
},
{
"name": "http://support.apple.com/kb/HT5016",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5016"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4122",
"STATE": "PUBLIC"
},
@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20111207 Disputing CVE-2011-4122",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/12/07/3"
},
{
"name" : "[oss-security] 20111208 Re: Disputing CVE-2011-4122",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/12/08/9"
},
{
"name" : "http://c-skills.blogspot.com/2011/11/openpam-trickery.html",
"refsource" : "MISC",
"url" : "http://c-skills.blogspot.com/2011/11/openpam-trickery.html"
},
{
"name": "http://stealth.openwall.net/xSports/pamslam",
"refsource": "MISC",
"url": "http://stealth.openwall.net/xSports/pamslam"
},
{
"name" : "http://trac.des.no/openpam/changeset/478/trunk/lib/openpam_configure.c",
"refsource" : "CONFIRM",
"url" : "http://trac.des.no/openpam/changeset/478/trunk/lib/openpam_configure.c"
},
{
"name" : "76945",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/76945"
},
{
"name": "46756",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46756"
},
{
"name" : "46804",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46804"
"name": "[oss-security] 20111207 Disputing CVE-2011-4122",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/12/07/3"
},
{
"name": "http://trac.des.no/openpam/changeset/478/trunk/lib/openpam_configure.c",
"refsource": "CONFIRM",
"url": "http://trac.des.no/openpam/changeset/478/trunk/lib/openpam_configure.c"
},
{
"name": "openpam-Pamstart-privilege-escalation(71205)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71205"
},
{
"name": "76945",
"refsource": "OSVDB",
"url": "http://osvdb.org/76945"
},
{
"name": "http://c-skills.blogspot.com/2011/11/openpam-trickery.html",
"refsource": "MISC",
"url": "http://c-skills.blogspot.com/2011/11/openpam-trickery.html"
},
{
"name": "[oss-security] 20111208 Re: Disputing CVE-2011-4122",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/12/08/9"
},
{
"name": "46804",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46804"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://technet.microsoft.com/en-us/security/msvr/msvr11-015",
"refsource" : "MISC",
"url" : "http://technet.microsoft.com/en-us/security/msvr/msvr11-015"
},
{
"name" : "http://code.google.com/p/idapython/downloads/detail?name=idapython-1.5.2.3_ida6.1_py2.6_win32.zip",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/idapython/downloads/detail?name=idapython-1.5.2.3_ida6.1_py2.6_win32.zip"
},
{
"name" : "http://code.google.com/p/idapython/source/detail?r=361",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/idapython/source/detail?r=361"
},
{
"name": "47295",
"refsource": "SECUNIA",
@ -76,6 +61,21 @@
"name": "idapro-idb-code-execution(71936)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71936"
},
{
"name": "http://code.google.com/p/idapython/source/detail?r=361",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/idapython/source/detail?r=361"
},
{
"name": "http://code.google.com/p/idapython/downloads/detail?name=idapython-1.5.2.3_ida6.1_py2.6_win32.zip",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/idapython/downloads/detail?name=idapython-1.5.2.3_ida6.1_py2.6_win32.zip"
},
{
"name": "http://technet.microsoft.com/en-us/security/msvr/msvr11-015",
"refsource": "MISC",
"url": "http://technet.microsoft.com/en-us/security/msvr/msvr11-015"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html",
"refsource" : "MISC",
"url" : "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html"
},
{
"name": "ppp-cp-httpresponse-info-disc(72223)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72223"
},
{
"name": "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html",
"refsource": "MISC",
"url": "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5890",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name" : "64758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64758"
"name": "1029619",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029619"
},
{
"name": "64816",
@ -73,9 +68,14 @@
"url": "http://osvdb.org/102104"
},
{
"name" : "1029619",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029619"
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "56471",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-2005",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "JVNDB-2014-000061",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000061"
},
{
"name": "http://www.sophos.com/en-us/support/knowledgebase/121066.aspx",
"refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN63940326/index.html"
},
{
"name" : "JVNDB-2014-000061",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000061"
},
{
"name": "68169",
"refsource": "BID",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-2483",
"STATE": "PUBLIC"
},
@ -53,79 +53,79 @@
"references": {
"reference_data": [
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name" : "http://hg.openjdk.java.net/jdk7u/jdk7u/hotspot/rev/848481af9003",
"refsource" : "CONFIRM",
"url" : "http://hg.openjdk.java.net/jdk7u/jdk7u/hotspot/rev/848481af9003"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1119626",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1119626"
"name": "DSA-2987",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2987"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name" : "DSA-2987",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2987"
},
{
"name" : "GLSA-201502-12",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201502-12.xml"
},
{
"name": "HPSBUX03091",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
},
{
"name" : "SSRT101667",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
},
{
"name" : "RHSA-2014:0902",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2014:0902"
},
{
"name" : "68608",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68608"
},
{
"name": "1030577",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030577"
},
{
"name" : "60485",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60485"
"name": "SSRT101667",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
},
{
"name": "60812",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60812"
},
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1119626",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1119626"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name": "60485",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60485"
},
{
"name": "http://hg.openjdk.java.net/jdk7u/jdk7u/hotspot/rev/848481af9003",
"refsource": "CONFIRM",
"url": "http://hg.openjdk.java.net/jdk7u/jdk7u/hotspot/rev/848481af9003"
},
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name": "RHSA-2014:0902",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0902"
},
{
"name": "GLSA-201502-12",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
},
{
"name": "68608",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68608"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-2797",
"STATE": "PUBLIC"
},
@ -57,6 +57,11 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037"
},
{
"name": "59775",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59775"
},
{
"name": "68380",
"refsource": "BID",
@ -66,11 +71,6 @@
"name": "1030532",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030532"
},
{
"name" : "59775",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59775"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-2813",
"STATE": "PUBLIC"
},
@ -62,15 +62,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68390"
},
{
"name" : "1030532",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030532"
},
{
"name": "59775",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59775"
},
{
"name": "1030532",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030532"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-6121",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21693035",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21693035"
},
{
"name": "1031427",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031427"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21693035",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693035"
},
{
"name": "ibm-appscan-cve20146121-xss(96722)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-6564",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
"name": "70511",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70511"
},
{
"name": "SUSE-SU-2015:0743",
@ -63,9 +63,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
},
{
"name" : "70511",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70511"
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-6582",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-6595",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "GLSA-201612-27",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-27"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "openSUSE-SU-2015:0229",
"refsource": "SUSE",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6743",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "VU#436329",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/436329"
},
{
"name" : "VU#582497",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/582497"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6787",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#690033",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/690033"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#690033",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/690033"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7075",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "VU#460353",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/460353"
},
{
"name" : "VU#582497",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/582497"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-7245",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7328",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#556361",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7652",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#671377",
"refsource": "CERT-VN",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0168",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0168"
"name": "1038232",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038232"
},
{
"name": "97418",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/97418"
},
{
"name" : "1038232",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038232"
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0168",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0168"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-07-05T00:00:00",
"ID": "CVE-2017-0664",
"STATE": "PUBLIC"
@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-07-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-07-01"
},
{
"name": "99470",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99470"
},
{
"name": "https://source.android.com/security/bulletin/2017-07-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-07-01"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://hackerone.com/reports/173622",
"refsource" : "MISC",
"url" : "https://hackerone.com/reports/173622"
},
{
"name": "https://nextcloud.com/security/advisory/?id=nc-sa-2017-005",
"refsource": "CONFIRM",
"url": "https://nextcloud.com/security/advisory/?id=nc-sa-2017-005"
},
{
"name": "https://hackerone.com/reports/173622",
"refsource": "MISC",
"url": "https://hackerone.com/reports/173622"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-1000366",
"REQUESTER": "qsa@qualys.com",
"STATE": "PUBLIC"
@ -12,18 +12,18 @@
"product": {
"product_data": [
{
"product_name" : "glibc",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.25"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "GNU Project"
"vendor_name": "n/a"
}
]
}
@ -45,7 +45,7 @@
"description": [
{
"lang": "eng",
"value" : "A specific CWE doesn't exist, listing as unknown for now"
"value": "n/a"
}
]
}
@ -54,9 +54,14 @@
"references": {
"reference_data": [
{
"name" : "42274",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/42274/"
"name": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
"refsource": "MISC",
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
},
{
"name": "1038712",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038712"
},
{
"name": "42275",
@ -64,45 +69,15 @@
"url": "https://www.exploit-db.com/exploits/42275/"
},
{
"name" : "42276",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/42276/"
},
{
"name" : "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
"refsource" : "MISC",
"url" : "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
},
{
"name" : "https://access.redhat.com/security/cve/CVE-2017-1000366",
"refsource" : "CONFIRM",
"url" : "https://access.redhat.com/security/cve/CVE-2017-1000366"
"name": "RHSA-2017:1712",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1712"
},
{
"name": "https://www.suse.com/security/cve/CVE-2017-1000366/",
"refsource": "CONFIRM",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"name" : "https://www.suse.com/support/kb/doc/?id=7020973",
"refsource" : "CONFIRM",
"url" : "https://www.suse.com/support/kb/doc/?id=7020973"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10205",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10205"
},
{
"name" : "DSA-3887",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3887"
},
{
"name" : "GLSA-201706-19",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201706-19"
},
{
"name": "RHSA-2017:1479",
"refsource": "REDHAT",
@ -114,9 +89,19 @@
"url": "https://access.redhat.com/errata/RHSA-2017:1480"
},
{
"name" : "RHSA-2017:1481",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1481"
"name": "99127",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99127"
},
{
"name": "42276",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42276/"
},
{
"name": "https://www.suse.com/support/kb/doc/?id=7020973",
"refsource": "CONFIRM",
"url": "https://www.suse.com/support/kb/doc/?id=7020973"
},
{
"name": "RHSA-2017:1567",
@ -124,19 +109,34 @@
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
},
{
"name" : "RHSA-2017:1712",
"name": "42274",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42274/"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2017-1000366",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"name": "RHSA-2017:1481",
"refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1712"
"url": "https://access.redhat.com/errata/RHSA-2017:1481"
},
{
"name" : "99127",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99127"
"name": "DSA-3887",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3887"
},
{
"name" : "1038712",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038712"
"name": "GLSA-201706-19",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-19"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10205",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10205"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-1000376",
"REQUESTER": "qsa@qualys.com",
"STATE": "PUBLIC"
@ -12,18 +12,18 @@
"product": {
"product_data": [
{
"product_name" : "libffi",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "3.1"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "libffi"
"vendor_name": "n/a"
}
]
}
@ -45,7 +45,7 @@
"description": [
{
"lang": "eng",
"value" : "Requests executable stack"
"value": "n/a"
}
]
}

View File

@ -62,25 +62,25 @@
},
"references": {
"reference_data": [
{
"name": "ibm-websphere-cve20171743-info-disc(134933)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134933"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22013601",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22013601"
},
{
"name" : "104134",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104134"
},
{
"name": "1040890",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040890"
},
{
"name" : "ibm-websphere-cve20171743-info-disc(134933)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/134933"
"name": "104134",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104134"
}
]
}

View File

@ -53,20 +53,20 @@
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01"
"name": "https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager",
"refsource": "CONFIRM",
"url": "https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager"
},
{
"name": "96028",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96028"
},
{
"name": "https://support.citrix.com/article/CTX219885",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX219885"
},
{
"name" : "https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager",
"refsource" : "CONFIRM",
"url" : "https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager"
},
{
"name": "https://www.schneider-electric.com/en/download/document/SEVD-2018-137-01/",
"refsource": "CONFIRM",
@ -78,9 +78,9 @@
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-144-01/"
},
{
"name" : "96028",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96028"
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01"
}
]
}