"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:56:22 +00:00
parent 18b6da3ea6
commit 7191876bcf
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
50 changed files with 4054 additions and 4054 deletions

View File

@ -57,11 +57,31 @@
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0931.html"
},
{
"name": "pmwiki-multiple-xss(24368)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24368"
},
{
"name": "18634",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18634"
},
{
"name": "http://www.ush.it/2006/01/24/pmwiki-multiple-vulnerabilities/",
"refsource": "MISC",
"url": "http://www.ush.it/2006/01/24/pmwiki-multiple-vulnerabilities/"
},
{
"name": "pmwiki-file-include(24367)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24367"
},
{
"name": "1015550",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015550"
},
{
"name": "16421",
"refsource": "BID",
@ -72,30 +92,10 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0375"
},
{
"name" : "1015550",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015550"
},
{
"name" : "18634",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18634"
},
{
"name" : "pmwiki-multiple-xss(24368)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24368"
},
{
"name": "pmwiki-path-disclosure(24366)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24366"
},
{
"name" : "pmwiki-file-include(24367)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24367"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "16547",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16547"
},
{
"name": "22991",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22991"
},
{
"name": "vwdev-uid-sql-injection(24583)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24583"
},
{
"name": "1015594",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015594"
},
{
"name" : "vwdev-uid-sql-injection(24583)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24583"
"name": "16547",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16547"
}
]
}

View File

@ -52,6 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2006-0937",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0937"
},
{
"name": "1015779",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015779"
},
{
"name": "17123",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17123"
},
{
"name": "dwarfhttp-extension-information-disclosure(25178)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25178"
},
{
"name": "20060313 Secunia Research: Dwarf HTTP Server Source Disclosure andCross-Site Scripting",
"refsource": "BUGTRAQ",
@ -62,40 +82,20 @@
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-13/advisory"
},
{
"name" : "17123",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17123"
},
{
"name" : "ADV-2006-0937",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0937"
},
{
"name": "23836",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23836"
},
{
"name" : "1015779",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015779"
},
{
"name" : "18962",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18962"
},
{
"name": "576",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/576"
},
{
"name" : "dwarfhttp-extension-information-disclosure(25178)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25178"
"name": "18962",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18962"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060228 Limbo CMS code execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/426428"
},
{
"name" : "20060404 Re: Limbo CMS code execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/429946/100/0/threaded"
"name": "519",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/519"
},
{
"name": "20060228 Limbo CMS code execution",
@ -73,9 +68,14 @@
"url": "http://www.securityfocus.com/bid/16902"
},
{
"name" : "519",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/519"
"name": "20060404 Re: Limbo CMS code execution",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/429946/100/0/threaded"
},
{
"name": "20060228 Limbo CMS code execution",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/426428"
},
{
"name": "limbocms-index-code-execution(24992)",

View File

@ -53,49 +53,49 @@
"references": {
"reference_data": [
{
"name" : "20060816 [scip_Advisory 2457] Horde Framework and Horde IMP /horde/imp/search.php cross site scripting",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443361/100/0/threaded"
"name": "19544",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19544"
},
{
"name": "[horde-announce] 20060817 IMP H3 (4.1.3) (final)",
"refsource": "MLIST",
"url": "http://lists.horde.org/archives/announce/2006/000294.html"
},
{
"name" : "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2457",
"refsource" : "MISC",
"url" : "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2457"
},
{
"name" : "19544",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19544"
},
{
"name": "ADV-2006-3316",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3316"
},
{
"name" : "1016713",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016713"
},
{
"name" : "21533",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21533"
},
{
"name": "1423",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1423"
},
{
"name": "21533",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21533"
},
{
"name": "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2457",
"refsource": "MISC",
"url": "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2457"
},
{
"name": "horde-search-xss(28409)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28409"
},
{
"name": "20060816 [scip_Advisory 2457] Horde Framework and Horde IMP /horde/imp/search.php cross site scripting",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443361/100/0/threaded"
},
{
"name": "1016713",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016713"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-4331",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2006-02.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2006-02.html"
"name": "ADV-2006-3370",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3370"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-227.htm",
@ -63,24 +63,14 @@
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-227.htm"
},
{
"name" : "GLSA-200608-26",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200608-26.xml"
"name": "21682",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21682"
},
{
"name" : "MDKSA-2006:152",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:152"
},
{
"name" : "RHSA-2006:0658",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0658.html"
},
{
"name" : "VU#638376",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/638376"
"name": "oval:org.mitre.oval:def:14587",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14587"
},
{
"name": "19690",
@ -92,55 +82,65 @@
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10125"
},
{
"name" : "oval:org.mitre.oval:def:14587",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14587"
},
{
"name" : "ADV-2006-3370",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3370"
},
{
"name": "1016736",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016736"
},
{
"name" : "21597",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21597"
"name": "RHSA-2006:0658",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0658.html"
},
{
"name": "21649",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21649"
},
{
"name": "MDKSA-2006:152",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:152"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2006-02.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2006-02.html"
},
{
"name": "21619",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21619"
},
{
"name" : "21682",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21682"
"name": "GLSA-200608-26",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200608-26.xml"
},
{
"name": "wireshark-esp-offbyone(28553)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28553"
},
{
"name": "VU#638376",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/638376"
},
{
"name": "21885",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21885"
},
{
"name": "21597",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21597"
},
{
"name": "22378",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22378"
},
{
"name" : "wireshark-esp-offbyone(28553)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28553"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20060921 Woltlab Burning Board 2.3.X SQL Injection Vulnerability",
"name": "20060926 Re: Re: Woltlab Burning Board 2.3.X SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/446743/100/0/threaded"
"url": "http://www.securityfocus.com/archive/1/447069/100/100/threaded"
},
{
"name": "20060923 Re: Woltlab Burning Board 2.3.X SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/446937/100/0/threaded"
},
{
"name": "20060921 Woltlab Burning Board 2.3.X SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/446743/100/0/threaded"
},
{
"name": "20060924 Re: Woltlab Burning Board 2.3.X SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/446938/100/100/threaded"
},
{
"name" : "20060926 Re: Re: Woltlab Burning Board 2.3.X SQL Injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/447069/100/100/threaded"
}
]
}

View File

@ -62,6 +62,11 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20480"
},
{
"name": "phpnewsreader-phpbbinc-file-include(29481)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29481"
},
{
"name": "ADV-2006-4011",
"refsource": "VUPEN",
@ -71,11 +76,6 @@
"name": "22354",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22354"
},
{
"name" : "phpnewsreader-phpbbinc-file-include(29481)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29481"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "20483",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20483"
},
{
"name": "http://www.phplist.com/news",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "http://tincan.co.uk/?lid=1821",
"refsource": "CONFIRM",
"url": "http://tincan.co.uk/?lid=1821"
},
{
"name" : "20483",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20483"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20643",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20643"
},
{
"name": "29898",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29898"
},
{
"name": "xchangeboard-loginnick-sql-injection(29675)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29675"
},
{
"name": "22489",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22489"
},
{
"name" : "xchangeboard-loginnick-sql-injection(29675)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29675"
"name": "20643",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20643"
}
]
}

View File

@ -57,40 +57,40 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/450942/100/0/threaded"
},
{
"name" : "HPSBMA02167",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00795552"
},
{
"name" : "SSRT061262",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00795552"
},
{
"name" : "ADV-2006-4410",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4410"
},
{
"name" : "1017197",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017197"
},
{
"name": "22780",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22780"
},
{
"name": "HPSBMA02167",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00795552"
},
{
"name": "1842",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1842"
},
{
"name": "ADV-2006-4410",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4410"
},
{
"name": "hp-openview-radianotify-dos(30138)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30138"
},
{
"name": "SSRT061262",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00795552"
},
{
"name": "1017197",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017197"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2010-0209",
"STATE": "PUBLIC"
},
@ -53,45 +53,20 @@
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-16.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-16.html"
"name": "ADV-2011-0192",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0192"
},
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4435"
},
{
"name" : "APPLE-SA-2010-11-10-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name" : "GLSA-201101-09",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201101-09.xml"
},
{
"name": "HPSBMA02592",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=128767780602751&w=2"
},
{
"name" : "SSRT100300",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=128767780602751&w=2"
},
{
"name" : "oval:org.mitre.oval:def:11461",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11461"
},
{
"name" : "oval:org.mitre.oval:def:16106",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16106"
},
{
"name": "1024621",
"refsource": "SECTRACK",
@ -103,9 +78,34 @@
"url": "http://secunia.com/advisories/43026"
},
{
"name" : "ADV-2011-0192",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0192"
"name": "GLSA-201101-09",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201101-09.xml"
},
{
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "oval:org.mitre.oval:def:11461",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11461"
},
{
"name": "SSRT100300",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=128767780602751&w=2"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-16.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-16.html"
},
{
"name": "oval:org.mitre.oval:def:16106",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16106"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf",
"refsource" : "MISC",
"url" : "http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf"
},
{
"name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2010-001.txt",
"refsource": "MISC",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2010-001.txt"
},
{
"name": "http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf",
"refsource": "MISC",
"url": "http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=43813",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=43813"
},
{
"name" : "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html"
},
{
"name": "oval:org.mitre.oval:def:11818",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11818"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=43813",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=43813"
},
{
"name": "40743",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40743"
},
{
"name": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "bugtrackernet-search-sql-injection(61434)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61434"
},
{
"name": "20100826 BugTracker.net 3.4.3 SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/513385/100/0/threaded"
},
{
"name" : "http://sourceforge.net/projects/btnet/files/btnet_3_4_4_release_notes.txt/view",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/projects/btnet/files/btnet_3_4_4_release_notes.txt/view"
},
{
"name": "41150",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41150"
},
{
"name" : "bugtrackernet-search-sql-injection(61434)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/61434"
"name": "http://sourceforge.net/projects/btnet/files/btnet_3_4_4_release_notes.txt/view",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/projects/btnet/files/btnet_3_4_4_release_notes.txt/view"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21445669",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21445669"
},
{
"name": "43220",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43220"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21445669",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21445669"
},
{
"name": "ADV-2010-2380",
"refsource": "VUPEN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-3655",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1024664",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024664"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "oval:org.mitre.oval:def:12077",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077"
},
{
"name" : "1024664",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024664"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3702",
"STATE": "PUBLIC"
},
@ -52,130 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "FEDORA-2010-16662",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html"
},
{
"name": "[oss-security] 20101004 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/10/04/6"
},
{
"name" : "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf",
"refsource" : "MISC",
"url" : "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf"
},
{
"name" : "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch",
"refsource" : "CONFIRM",
"url" : "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=595245",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=595245"
},
{
"name" : "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html",
"refsource" : "CONFIRM",
"url" : "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html"
},
{
"name" : "DSA-2119",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2119"
},
{
"name" : "DSA-2135",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2135"
},
{
"name": "FEDORA-2010-15857",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html"
},
{
"name" : "FEDORA-2010-15911",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html"
},
{
"name" : "FEDORA-2010-15981",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html"
},
{
"name" : "FEDORA-2010-16662",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html"
},
{
"name" : "FEDORA-2010-16705",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html"
},
{
"name" : "FEDORA-2010-16744",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html"
},
{
"name" : "MDVSA-2010:228",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228"
},
{
"name" : "MDVSA-2010:229",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229"
},
{
"name" : "MDVSA-2010:230",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230"
},
{
"name" : "MDVSA-2010:231",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231"
},
{
"name" : "MDVSA-2012:144",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
},
{
"name" : "RHSA-2010:0749",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0749.html"
},
{
"name" : "RHSA-2010:0750",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0750.html"
},
{
"name" : "RHSA-2010:0751",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0751.html"
},
{
"name" : "RHSA-2010:0752",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0752.html"
},
{
"name" : "RHSA-2010:0753",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0753.html"
},
{
"name" : "RHSA-2010:0754",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0754.html"
},
{
"name" : "RHSA-2010:0755",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0755.html"
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf",
"refsource": "MISC",
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf"
},
{
"name": "RHSA-2010:0859",
@ -183,19 +78,29 @@
"url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html"
},
{
"name" : "RHSA-2012:1201",
"name": "42357",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42357"
},
{
"name": "MDVSA-2010:228",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228"
},
{
"name": "ADV-2011-0230",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0230"
},
{
"name": "RHSA-2010:0752",
"refsource": "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html"
},
{
"name" : "SSA:2010-324-01",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720"
},
{
"name" : "SUSE-SR:2010:022",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"
"name": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html",
"refsource": "CONFIRM",
"url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html"
},
{
"name": "SUSE-SR:2010:023",
@ -203,14 +108,24 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"
},
{
"name" : "SUSE-SR:2010:024",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
"name": "MDVSA-2010:230",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230"
},
{
"name" : "USN-1005-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1005-1"
"name": "SUSE-SR:2010:022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"
},
{
"name": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch",
"refsource": "CONFIRM",
"url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch"
},
{
"name": "RHSA-2012:1201",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
},
{
"name": "43845",
@ -218,9 +133,24 @@
"url": "http://www.securityfocus.com/bid/43845"
},
{
"name" : "42141",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42141"
"name": "MDVSA-2010:231",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231"
},
{
"name": "FEDORA-2010-16705",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html"
},
{
"name": "SSA:2010-324-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720"
},
{
"name": "RHSA-2010:0751",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html"
},
{
"name": "42397",
@ -228,24 +158,19 @@
"url": "http://secunia.com/advisories/42397"
},
{
"name" : "42357",
"name": "42141",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/42357"
"url": "http://secunia.com/advisories/42141"
},
{
"name" : "42691",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42691"
"name": "FEDORA-2010-15911",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html"
},
{
"name" : "43079",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43079"
},
{
"name" : "ADV-2010-2897",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2897"
"name": "MDVSA-2012:144",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
},
{
"name": "ADV-2010-3097",
@ -253,9 +178,84 @@
"url": "http://www.vupen.com/english/advisories/2010/3097"
},
{
"name" : "ADV-2011-0230",
"name": "USN-1005-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1005-1"
},
{
"name": "RHSA-2010:0749",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html"
},
{
"name": "RHSA-2010:0754",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0754.html"
},
{
"name": "FEDORA-2010-15981",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html"
},
{
"name": "FEDORA-2010-16744",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=595245",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245"
},
{
"name": "ADV-2010-2897",
"refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0230"
"url": "http://www.vupen.com/english/advisories/2010/2897"
},
{
"name": "42691",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42691"
},
{
"name": "DSA-2119",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2119"
},
{
"name": "SUSE-SR:2010:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name": "MDVSA-2010:229",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229"
},
{
"name": "DSA-2135",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2135"
},
{
"name": "RHSA-2010:0750",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0750.html"
},
{
"name": "RHSA-2010:0755",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0755.html"
},
{
"name": "RHSA-2010:0753",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html"
},
{
"name": "43079",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43079"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4254",
"STATE": "PUBLIC"
},
@ -52,70 +52,70 @@
},
"references": {
"reference_data": [
{
"name" : "15974",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/15974"
},
{
"name" : "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability",
"refsource" : "CONFIRM",
"url" : "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability"
},
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=654136",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=654136"
},
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=655847",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=655847"
},
{
"name" : "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399",
"refsource" : "CONFIRM",
"url" : "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399"
},
{
"name" : "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358",
"refsource" : "CONFIRM",
"url" : "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358"
},
{
"name" : "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac",
"refsource" : "CONFIRM",
"url" : "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac"
},
{
"name": "SUSE-SR:2011:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
},
{
"name" : "SUSE-SR:2010:024",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name" : "45051",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/45051"
},
{
"name": "42373",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42373"
},
{
"name": "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability",
"refsource": "CONFIRM",
"url": "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability"
},
{
"name": "15974",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15974"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=655847",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=655847"
},
{
"name": "42877",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42877"
},
{
"name": "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399",
"refsource": "CONFIRM",
"url": "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399"
},
{
"name": "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac",
"refsource": "CONFIRM",
"url": "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac"
},
{
"name": "45051",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45051"
},
{
"name": "ADV-2011-0076",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0076"
},
{
"name": "SUSE-SR:2010:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name": "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358",
"refsource": "CONFIRM",
"url": "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=654136",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=654136"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4348",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20101215 CVE request: MantisBT <=1.2.3 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/15/4"
},
{
"name" : "[oss-security] 20101216 Re: CVE request: MantisBT <=1.2.3 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/16/1"
"name": "ADV-2011-0002",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0002"
},
{
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php",
@ -68,34 +63,9 @@
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php"
},
{
"name" : "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112",
"refsource" : "CONFIRM",
"url" : "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112"
},
{
"name" : "http://www.mantisbt.org/bugs/view.php?id=12607",
"refsource" : "CONFIRM",
"url" : "http://www.mantisbt.org/bugs/view.php?id=12607"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=663230",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=663230"
},
{
"name" : "http://www.mantisbt.org/blog/?p=123",
"refsource" : "CONFIRM",
"url" : "http://www.mantisbt.org/blog/?p=123"
},
{
"name" : "FEDORA-2010-19070",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html"
},
{
"name" : "FEDORA-2010-19078",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html"
"name": "[oss-security] 20101216 Re: CVE request: MantisBT <=1.2.3 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/16/1"
},
{
"name": "GLSA-201211-01",
@ -103,9 +73,14 @@
"url": "http://security.gentoo.org/glsa/glsa-201211-01.xml"
},
{
"name" : "42772",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42772"
"name": "http://www.mantisbt.org/blog/?p=123",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/blog/?p=123"
},
{
"name": "http://www.mantisbt.org/bugs/view.php?id=12607",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/bugs/view.php?id=12607"
},
{
"name": "51199",
@ -113,9 +88,34 @@
"url": "http://secunia.com/advisories/51199"
},
{
"name" : "ADV-2011-0002",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0002"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=663230",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230"
},
{
"name": "FEDORA-2010-19078",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html"
},
{
"name": "[oss-security] 20101215 CVE request: MantisBT <=1.2.3 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/15/4"
},
{
"name": "42772",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42772"
},
{
"name": "FEDORA-2010-19070",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html"
},
{
"name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112",
"refsource": "CONFIRM",
"url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112"
}
]
}

View File

@ -57,25 +57,25 @@
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15621"
},
{
"name" : "http://packetstormsecurity.org/files/view/96131/jurpopage-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/files/view/96131/jurpopage-sql.txt"
},
{
"name" : "45076",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/45076"
},
{
"name": "42387",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42387"
},
{
"name": "http://packetstormsecurity.org/files/view/96131/jurpopage-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/files/view/96131/jurpopage-sql.txt"
},
{
"name": "ADV-2010-3071",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3071"
},
{
"name": "45076",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45076"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.opera.com/docs/changelogs/mac/1100/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/mac/1100/"
"name": "42653",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42653"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/1100/",
@ -67,15 +67,15 @@
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1100/"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/1100/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/mac/1100/"
},
{
"name": "SUSE-SR:2010:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name" : "42653",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42653"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0202",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3617",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140915 Moodle security notifications public",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2014/09/15/1"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-46619",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-46619"
},
{
"name": "[oss-security] 20140915 Moodle security notifications public",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/09/15/1"
},
{
"name": "https://moodle.org/mod/forum/discuss.php?d=269591",
"refsource": "CONFIRM",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-4338",
"STATE": "PUBLIC"
},
@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140425 Re: Re: cups-browsed remote exploit",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2014/04/25/7"
},
{
"name" : "[oss-security] 20140619 Re: cups-browsed remote exploit",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2014/06/19/12"
},
{
"name" : "https://bugs.linuxfoundation.org/show_bug.cgi?id=1204",
"refsource" : "CONFIRM",
"url" : "https://bugs.linuxfoundation.org/show_bug.cgi?id=1204"
},
{
"name": "RHSA-2014:1795",
"refsource": "REDHAT",
@ -77,10 +62,25 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68124"
},
{
"name": "https://bugs.linuxfoundation.org/show_bug.cgi?id=1204",
"refsource": "CONFIRM",
"url": "https://bugs.linuxfoundation.org/show_bug.cgi?id=1204"
},
{
"name": "62044",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62044"
},
{
"name": "[oss-security] 20140425 Re: Re: cups-browsed remote exploit",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/04/25/7"
},
{
"name": "[oss-security] 20140619 Re: cups-browsed remote exploit",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/06/19/12"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-8138",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://www.ocert.org/advisories/ocert-2014-012.html",
"refsource" : "MISC",
"url" : "https://www.ocert.org/advisories/ocert-2014-012.html"
},
{
"name" : "http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html"
},
{
"name" : "http://advisories.mageia.org/MGASA-2014-0539.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2014-0539.html"
"name": "MDVSA-2015:012",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:012"
},
{
"name": "DSA-3106",
@ -73,79 +63,44 @@
"url": "http://www.debian.org/security/2014/dsa-3106"
},
{
"name" : "MDVSA-2015:012",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:012"
},
{
"name" : "MDVSA-2015:159",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:159"
},
{
"name" : "RHSA-2014:2021",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-2021.html"
},
{
"name" : "RHSA-2015:0698",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0698.html"
},
{
"name" : "RHSA-2015:1713",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1713.html"
},
{
"name" : "SSA:2015-302-02",
"refsource" : "SLACKWARE",
"url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606"
"name": "62619",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62619"
},
{
"name": "openSUSE-SU-2015:0038",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html"
},
{
"name" : "openSUSE-SU-2015:0039",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html"
},
{
"name": "openSUSE-SU-2015:0042",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html"
},
{
"name" : "USN-2483-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2483-1"
},
{
"name" : "USN-2483-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2483-2"
},
{
"name" : "71746",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71746"
},
{
"name" : "1033459",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033459"
},
{
"name": "61747",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61747"
},
{
"name" : "62311",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62311"
"name": "http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html"
},
{
"name": "USN-2483-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2483-2"
},
{
"name": "USN-2483-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2483-1"
},
{
"name": "https://www.ocert.org/advisories/ocert-2014-012.html",
"refsource": "MISC",
"url": "https://www.ocert.org/advisories/ocert-2014-012.html"
},
{
"name": "62615",
@ -153,9 +108,54 @@
"url": "http://secunia.com/advisories/62615"
},
{
"name" : "62619",
"name": "1033459",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033459"
},
{
"name": "RHSA-2015:0698",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0698.html"
},
{
"name": "openSUSE-SU-2015:0039",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html"
},
{
"name": "62311",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/62619"
"url": "http://secunia.com/advisories/62311"
},
{
"name": "RHSA-2014:2021",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-2021.html"
},
{
"name": "71746",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71746"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0539.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0539.html"
},
{
"name": "SSA:2015-302-02",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606"
},
{
"name": "MDVSA-2015:159",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:159"
},
{
"name": "RHSA-2015:1713",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1713.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2014-8449",
"STATE": "PUBLIC"
},

View File

@ -53,45 +53,50 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20141103 Re: Re: strings / libbfd crasher",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/11/02/4"
"name": "62241",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62241"
},
{
"name": "[oss-security] 20141105 Re: Re: strings / libbfd crasher",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/11/05/7"
},
{
"name": "MDVSA-2015:029",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029"
},
{
"name": "FEDORA-2015-0750",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148438.html"
},
{
"name": "USN-2496-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2496-1"
},
{
"name": "[oss-security] 20141103 Re: Re: strings / libbfd crasher",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/11/02/4"
},
{
"name": "[oss-security] 20141113 Re: strings / libbfd crasher",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/11/13/2"
},
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=17533",
"refsource" : "CONFIRM",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=17533"
},
{
"name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bb0d867169d7e9743d229804106a8fbcab7f3b3f",
"refsource" : "CONFIRM",
"url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bb0d867169d7e9743d229804106a8fbcab7f3b3f"
"name": "71083",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71083"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "DSA-3123",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3123"
},
{
"name" : "FEDORA-2014-17586",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147354.html"
},
{
"name": "FEDORA-2014-17603",
"refsource": "FEDORA",
@ -103,39 +108,34 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148427.html"
},
{
"name" : "FEDORA-2015-0750",
"name": "62746",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62746"
},
{
"name": "FEDORA-2014-17586",
"refsource": "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148438.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147354.html"
},
{
"name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bb0d867169d7e9743d229804106a8fbcab7f3b3f",
"refsource": "CONFIRM",
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bb0d867169d7e9743d229804106a8fbcab7f3b3f"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=17533",
"refsource": "CONFIRM",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17533"
},
{
"name": "DSA-3123",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3123"
},
{
"name": "GLSA-201612-24",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-24"
},
{
"name" : "MDVSA-2015:029",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029"
},
{
"name" : "USN-2496-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2496-1"
},
{
"name" : "71083",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71083"
},
{
"name" : "62241",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62241"
},
{
"name" : "62746",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62746"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534149/100/0/threaded"
},
{
"name" : "http://www.itas.vn/news/ITAS-Team-discovered-SQL-Injection-in-PBBoard-CMS-68.html",
"refsource" : "MISC",
"url" : "http://www.itas.vn/news/ITAS-Team-discovered-SQL-Injection-in-PBBoard-CMS-68.html"
},
{
"name": "https://www.youtube.com/watch?v=AQiGvH5xrJg",
"refsource": "MISC",
"url": "https://www.youtube.com/watch?v=AQiGvH5xrJg"
},
{
"name": "http://www.itas.vn/news/ITAS-Team-discovered-SQL-Injection-in-PBBoard-CMS-68.html",
"refsource": "MISC",
"url": "http://www.itas.vn/news/ITAS-Team-discovered-SQL-Injection-in-PBBoard-CMS-68.html"
}
]
}

View File

@ -52,100 +52,100 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20141225 Re: CVE Request: Linux x86_64 userspace address leak",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/12/25/1"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f647d7c155f069c1a068030255c300663516420e",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f647d7c155f069c1a068030255c300663516420e"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1177260",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1177260"
},
{
"name" : "https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e"
},
{
"name" : "DSA-3128",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3128"
},
{
"name" : "FEDORA-2015-0515",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html"
},
{
"name": "FEDORA-2015-0517",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html"
},
{
"name" : "MDVSA-2015:058",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058"
},
{
"name" : "RHSA-2015:1081",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1081.html"
},
{
"name" : "SUSE-SU-2015:0529",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html"
},
{
"name" : "SUSE-SU-2015:0736",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"
},
{
"name" : "openSUSE-SU-2015:0714",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html"
},
{
"name": "USN-2515-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2515-1"
},
{
"name" : "USN-2516-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2516-1"
},
{
"name" : "USN-2517-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2517-1"
},
{
"name" : "USN-2518-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2518-1"
},
{
"name" : "USN-2541-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2541-1"
"name": "https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e"
},
{
"name": "USN-2542-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2542-1"
},
{
"name": "SUSE-SU-2015:0736",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"
},
{
"name": "USN-2541-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2541-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1177260",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177260"
},
{
"name": "USN-2518-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2518-1"
},
{
"name": "MDVSA-2015:058",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058"
},
{
"name": "FEDORA-2015-0515",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html"
},
{
"name": "71794",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71794"
},
{
"name": "SUSE-SU-2015:0529",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html"
},
{
"name": "[oss-security] 20141225 Re: CVE Request: Linux x86_64 userspace address leak",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/12/25/1"
},
{
"name": "USN-2517-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2517-1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f647d7c155f069c1a068030255c300663516420e",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f647d7c155f069c1a068030255c300663516420e"
},
{
"name": "openSUSE-SU-2015:0714",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html"
},
{
"name": "DSA-3128",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3128"
},
{
"name": "USN-2516-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2516-1"
},
{
"name": "RHSA-2015:1081",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1081.html"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "62150",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62150"
},
{
"name": "https://erpscan.io/advisories/erpscan-14-025-sap-kernel-rce-dos/",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/",
"refsource": "MISC",
"url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/"
},
{
"name" : "62150",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62150"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2014-9935",
"STATE": "PUBLIC"
},

View File

@ -52,26 +52,31 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160128 Re: invalid Read in the JasPer's jas_matrix_clip() function",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/01/28/6"
},
{
"name" : "[oss-security] 20160128 invalid Read in the JasPer's jas_matrix_clip() function",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/01/28/4"
},
{
"name": "DSA-3508",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3508"
},
{
"name": "83108",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/83108"
},
{
"name": "[oss-security] 20160128 Re: invalid Read in the JasPer's jas_matrix_clip() function",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/28/6"
},
{
"name": "RHSA-2017:1208",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1208"
},
{
"name": "[oss-security] 20160128 invalid Read in the JasPer's jas_matrix_clip() function",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/28/4"
},
{
"name": "openSUSE-SU-2016:0408",
"refsource": "SUSE",
@ -81,11 +86,6 @@
"name": "openSUSE-SU-2016:0413",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00063.html"
},
{
"name" : "83108",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/83108"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2016-2297",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2701",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-3383",
"STATE": "PUBLIC"
},

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "95899",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95899"
},
{
"name": "https://wiki.zimbra.com/wiki/Zimbra_Releases/8.7.0",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
"refsource": "CONFIRM",
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"
},
{
"name" : "95899",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95899"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-3434",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-3753",
"STATE": "PUBLIC"
},

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1037004",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037004"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-fin",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "93519",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93519"
},
{
"name" : "1037004",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037004"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-6762",
"STATE": "PUBLIC"
},

View File

@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/",
"refsource" : "MISC",
"url" : "http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/"
},
{
"name" : "https://tom.vg/papers/heist_blackhat2016.pdf",
"refsource" : "MISC",
"url" : "https://tom.vg/papers/heist_blackhat2016.pdf"
},
{
"name" : "92769",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92769"
},
{
"name" : "1036744",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036744"
},
{
"name": "1036741",
"refsource": "SECTRACK",
@ -83,15 +63,35 @@
"url": "http://www.securitytracker.com/id/1036742"
},
{
"name" : "1036743",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036743"
"name": "92769",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92769"
},
{
"name": "https://tom.vg/papers/heist_blackhat2016.pdf",
"refsource": "MISC",
"url": "https://tom.vg/papers/heist_blackhat2016.pdf"
},
{
"name": "1036745",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036745"
},
{
"name": "http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/",
"refsource": "MISC",
"url": "http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/"
},
{
"name": "1036744",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036744"
},
{
"name": "1036743",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036743"
},
{
"name": "1036746",
"refsource": "SECTRACK",

View File

@ -52,21 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "40786",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40786/"
},
{
"name": "40793",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40793/"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-593",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-593"
},
{
"name": "MS16-129",
"refsource": "MS",
@ -77,11 +67,21 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-144"
},
{
"name": "40786",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40786/"
},
{
"name": "94042",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94042"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-593",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-593"
},
{
"name": "1037245",
"refsource": "SECTRACK",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7748",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7901",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{