"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:56:11 +00:00
parent b45dfea59f
commit 751cb51d70
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 4177 additions and 4177 deletions

View File

@ -52,21 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt",
"refsource" : "MISC",
"url" : "http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt"
},
{ {
"name": "17044", "name": "17044",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/17044" "url": "http://www.securityfocus.com/bid/17044"
}, },
{
"name": "sblog-username-xss(25111)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25111"
},
{
"name": "http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt",
"refsource": "MISC",
"url": "http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt"
},
{ {
"name": "ADV-2006-0883", "name": "ADV-2006-0883",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0883" "url": "http://www.vupen.com/english/advisories/2006/0883"
}, },
{
"name": "19151",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19151"
},
{ {
"name": "23759", "name": "23759",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -76,16 +86,6 @@
"name": "23760", "name": "23760",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/23760" "url": "http://www.osvdb.org/23760"
},
{
"name" : "19151",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19151"
},
{
"name" : "sblog-username-xss(25111)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25111"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2006-1186", "ID": "CVE-2006-1186",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS06-013", "name": "VU#959049",
"refsource" : "MS", "refsource": "CERT-VN",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013" "url": "http://www.kb.cert.org/vuls/id/959049"
},
{
"name": "18957",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18957"
},
{
"name": "oval:org.mitre.oval:def:1589",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1589"
},
{
"name": "oval:org.mitre.oval:def:1446",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1446"
},
{
"name": "1015900",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015900"
},
{
"name": "oval:org.mitre.oval:def:1651",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1651"
}, },
{ {
"name": "TA06-101A", "name": "TA06-101A",
@ -63,9 +88,9 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA06-101A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA06-101A.html"
}, },
{ {
"name" : "VU#959049", "name": "MS06-013",
"refsource" : "CERT-VN", "refsource": "MS",
"url" : "http://www.kb.cert.org/vuls/id/959049" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013"
}, },
{ {
"name": "17453", "name": "17453",
@ -78,19 +103,9 @@
"url": "http://www.vupen.com/english/advisories/2006/1318" "url": "http://www.vupen.com/english/advisories/2006/1318"
}, },
{ {
"name" : "oval:org.mitre.oval:def:1446", "name": "ie-com-activex-execute-code(25545)",
"refsource" : "OVAL", "refsource": "XF",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1446" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25545"
},
{
"name" : "oval:org.mitre.oval:def:1589",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1589"
},
{
"name" : "oval:org.mitre.oval:def:1651",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1651"
}, },
{ {
"name": "oval:org.mitre.oval:def:1704", "name": "oval:org.mitre.oval:def:1704",
@ -101,21 +116,6 @@
"name": "oval:org.mitre.oval:def:791", "name": "oval:org.mitre.oval:def:791",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A791" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A791"
},
{
"name" : "1015900",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015900"
},
{
"name" : "18957",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18957"
},
{
"name" : "ie-com-activex-execute-code(25545)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25545"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1015733",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015733"
},
{
"name": "19171",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19171"
},
{ {
"name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.03.07.html", "name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.03.07.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,16 +76,6 @@
"name": "ADV-2006-0870", "name": "ADV-2006-0870",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0870" "url": "http://www.vupen.com/english/advisories/2006/0870"
},
{
"name" : "1015733",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015733"
},
{
"name" : "19171",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19171"
} }
] ]
} }

View File

@ -52,21 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm"
},
{ {
"name": "20428", "name": "20428",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/20428" "url": "http://www.securityfocus.com/bid/20428"
}, },
{
"name" : "ADV-2006-3998",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3998"
},
{ {
"name": "1017025", "name": "1017025",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -81,6 +71,16 @@
"name": "novell-bordermanager-unspecified-dos(29447)", "name": "novell-bordermanager-unspecified-dos(29447)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29447" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29447"
},
{
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm",
"refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm"
},
{
"name": "ADV-2006-3998",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3998"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061012 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/448422/100/100/threaded"
},
{ {
"name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability", "name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
"refsource": "VIM", "refsource": "VIM",
"url": "http://attrition.org/pipermail/vim/2006-October/001085.html" "url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
}, },
{
"name": "20061012 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/448422/100/100/threaded"
},
{ {
"name": "http://www.secureworks.com/press/20061011-dell.html", "name": "http://www.secureworks.com/press/20061011-dell.html",
"refsource": "MISC", "refsource": "MISC",
@ -87,15 +87,15 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22402" "url": "http://secunia.com/advisories/22402"
}, },
{
"name" : "1744",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1744"
},
{ {
"name": "toshiba-bluetooth-stack-code-execute(29503)", "name": "toshiba-bluetooth-stack-code-execute(29503)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29503" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29503"
},
{
"name": "1744",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1744"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061018 {x0n3-h4ck} DEV Web Manager System <= 1.5 XSS Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/449121/100/0/threaded"
},
{ {
"name": "http://www.x0n3-h4ck.org/index.php?name=news&article=139", "name": "http://www.x0n3-h4ck.org/index.php?name=news&article=139",
"refsource": "MISC", "refsource": "MISC",
@ -72,6 +67,11 @@
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1758" "url": "http://securityreason.com/securityalert/1758"
}, },
{
"name": "20061018 {x0n3-h4ck} DEV Web Manager System <= 1.5 XSS Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/449121/100/0/threaded"
},
{ {
"name": "dev-index-xss(29659)", "name": "dev-index-xss(29659)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,60 +52,60 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061101 Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/450270/100/0/threaded"
},
{
"name" : "20061111 Re: Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/451350/100/100/threaded"
},
{
"name" : "20061031 Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050462.html"
},
{
"name" : "http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt",
"refsource" : "MISC",
"url" : "http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt"
},
{
"name" : "http://virtech.org/tools/",
"refsource" : "CONFIRM",
"url" : "http://virtech.org/tools/"
},
{ {
"name": "20837", "name": "20837",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/20837" "url": "http://www.securityfocus.com/bid/20837"
}, },
{
"name" : "ADV-2006-4512",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4512"
},
{
"name" : "1017147",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017147"
},
{ {
"name": "22864", "name": "22864",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22864" "url": "http://secunia.com/advisories/22864"
}, },
{
"name": "ADV-2006-4512",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4512"
},
{
"name": "http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt",
"refsource": "MISC",
"url": "http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt"
},
{
"name": "20061111 Re: Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/451350/100/100/threaded"
},
{
"name": "1017147",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017147"
},
{ {
"name": "1807", "name": "1807",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1807" "url": "http://securityreason.com/securityalert/1807"
}, },
{
"name": "20061031 Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050462.html"
},
{ {
"name": "netquery-nquser-xss(29927)", "name": "netquery-nquser-xss(29927)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29927" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29927"
},
{
"name": "http://virtech.org/tools/",
"refsource": "CONFIRM",
"url": "http://virtech.org/tools/"
},
{
"name": "20061101 Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/450270/100/0/threaded"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2006-5692", "ID": "CVE-2006-5692",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "3761", "name": "mozzers-subsystem-index-code-execution(33739)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/3761" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33739"
}, },
{ {
"name": "23548", "name": "23548",
@ -68,9 +68,9 @@
"url": "http://www.vupen.com/english/advisories/2007/1446" "url": "http://www.vupen.com/english/advisories/2007/1446"
}, },
{ {
"name" : "mozzers-subsystem-index-code-execution(33739)", "name": "3761",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33739" "url": "https://www.exploit-db.com/exploits/3761"
} }
] ]
} }

View File

@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://moaxb.blogspot.com/2007/05/moaxb-09-barcodewiz-activex-control-20.html",
"refsource" : "MISC",
"url" : "http://moaxb.blogspot.com/2007/05/moaxb-09-barcodewiz-activex-control-20.html"
},
{ {
"name": "http://www.shinnai.altervista.org/moaxb/20070509/barcodewiz.txt", "name": "http://www.shinnai.altervista.org/moaxb/20070509/barcodewiz.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.shinnai.altervista.org/moaxb/20070509/barcodewiz.txt" "url": "http://www.shinnai.altervista.org/moaxb/20070509/barcodewiz.txt"
}, },
{ {
"name" : "23891", "name": "barcodewiz-barcodewiz-bo(34180)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/23891" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34180"
},
{
"name": "25209",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25209"
}, },
{ {
"name": "ADV-2007-1728", "name": "ADV-2007-1728",
@ -78,14 +78,14 @@
"url": "http://osvdb.org/35869" "url": "http://osvdb.org/35869"
}, },
{ {
"name" : "25209", "name": "http://moaxb.blogspot.com/2007/05/moaxb-09-barcodewiz-activex-control-20.html",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/25209" "url": "http://moaxb.blogspot.com/2007/05/moaxb-09-barcodewiz-activex-control-20.html"
}, },
{ {
"name" : "barcodewiz-barcodewiz-bo(34180)", "name": "23891",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34180" "url": "http://www.securityfocus.com/bid/23891"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4637",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4637"
},
{
"name" : "http://www.securityfocus.com/bid/31941/exploit",
"refsource" : "MISC",
"url" : "http://www.securityfocus.com/bid/31941/exploit"
},
{ {
"name": "26505", "name": "26505",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26505" "url": "http://www.securityfocus.com/bid/26505"
}, },
{
"name" : "31941",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31941"
},
{
"name" : "ADV-2007-3962",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3962"
},
{ {
"name": "bcoos-click-sql-injection(38594)", "name": "bcoos-click-sql-injection(38594)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38594" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38594"
}, },
{
"name": "4637",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4637"
},
{
"name": "ADV-2007-3962",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3962"
},
{ {
"name": "bcoos-bid-sql-injection(46156)", "name": "bcoos-bid-sql-injection(46156)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46156" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46156"
},
{
"name": "http://www.securityfocus.com/bid/31941/exploit",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/31941/exploit"
},
{
"name": "31941",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31941"
} }
] ]
} }

View File

@ -52,90 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://crypto.stanford.edu/advisories/CVE-2007-6244/",
"refsource" : "MISC",
"url" : "http://crypto.stanford.edu/advisories/CVE-2007-6244/"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb07-20.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb07-20.html"
},
{
"name" : "GLSA-200801-07",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml"
},
{
"name" : "RHSA-2007:1126",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1126.html"
},
{
"name" : "238305",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1"
},
{ {
"name": "SUSE-SA:2007:069", "name": "SUSE-SA:2007:069",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html"
}, },
{
"name" : "TA07-355A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-355A.html"
},
{
"name" : "VU#758769",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/758769"
},
{
"name" : "26929",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26929"
},
{
"name" : "26949",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26949"
},
{
"name" : "26960",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26960"
},
{
"name" : "oval:org.mitre.oval:def:10210",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10210"
},
{
"name" : "ADV-2007-4258",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/4258"
},
{
"name" : "ADV-2008-1724",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1724/references"
},
{
"name" : "1019116",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019116"
},
{ {
"name": "28157", "name": "28157",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28157" "url": "http://secunia.com/advisories/28157"
}, },
{ {
"name" : "28161", "name": "30507",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/28161" "url": "http://secunia.com/advisories/30507"
},
{
"name": "adobe-navigatetourl-xss(39131)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39131"
}, },
{ {
"name": "28570", "name": "28570",
@ -143,14 +78,49 @@
"url": "http://secunia.com/advisories/28570" "url": "http://secunia.com/advisories/28570"
}, },
{ {
"name" : "28213", "name": "26960",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/28213" "url": "http://www.securityfocus.com/bid/26960"
}, },
{ {
"name" : "30507", "name": "ADV-2008-1724",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1724/references"
},
{
"name": "TA07-355A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html"
},
{
"name": "GLSA-200801-07",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml"
},
{
"name": "http://crypto.stanford.edu/advisories/CVE-2007-6244/",
"refsource": "MISC",
"url": "http://crypto.stanford.edu/advisories/CVE-2007-6244/"
},
{
"name": "oval:org.mitre.oval:def:10210",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10210"
},
{
"name": "26929",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26929"
},
{
"name": "28161",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/30507" "url": "http://secunia.com/advisories/28161"
},
{
"name": "RHSA-2007:1126",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html"
}, },
{ {
"name": "adobe-asfunction-protocol-xss(39130)", "name": "adobe-asfunction-protocol-xss(39130)",
@ -158,9 +128,39 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39130" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39130"
}, },
{ {
"name" : "adobe-navigatetourl-xss(39131)", "name": "238305",
"refsource" : "XF", "refsource": "SUNALERT",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39131" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1"
},
{
"name": "ADV-2007-4258",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4258"
},
{
"name": "1019116",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019116"
},
{
"name": "26949",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26949"
},
{
"name": "VU#758769",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/758769"
},
{
"name": "28213",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28213"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb07-20.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071204 PR07-39: Multiple vulnerabilities on Absolute News Manager.NET 5.1 including file retrieval and SQL injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/484560/100/0/threaded"
},
{ {
"name": "http://www.procheckup.com/Vulnerability_PR07-39.php", "name": "http://www.procheckup.com/Vulnerability_PR07-39.php",
"refsource": "MISC", "refsource": "MISC",
@ -72,6 +67,11 @@
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3421" "url": "http://securityreason.com/securityalert/3421"
}, },
{
"name": "20071204 PR07-39: Multiple vulnerabilities on Absolute News Manager.NET 5.1 including file retrieval and SQL injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/484560/100/0/threaded"
},
{ {
"name": "absolutenewsmanager-getpath-info-disclosure(38874)", "name": "absolutenewsmanager-getpath-info-disclosure(38874)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225", "name": "ADV-2007-4312",
"refsource" : "MISC", "refsource": "VUPEN",
"url" : "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225" "url": "http://www.vupen.com/english/advisories/2007/4312"
},
{
"name" : "JVN#44736880",
"refsource" : "JVN",
"url" : "http://jvn.jp/jp/JVN%2344736880/index.html"
}, },
{ {
"name": "JVNDB-2007-000822", "name": "JVNDB-2007-000822",
@ -73,9 +68,19 @@
"url": "http://www.securityfocus.com/bid/27017" "url": "http://www.securityfocus.com/bid/27017"
}, },
{ {
"name" : "ADV-2007-4312", "name": "winace-uue-bo(39268)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2007/4312" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
},
{
"name": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225",
"refsource": "MISC",
"url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
},
{
"name": "JVN#44736880",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2344736880/index.html"
}, },
{ {
"name": "40267", "name": "40267",
@ -86,11 +91,6 @@
"name": "28215", "name": "28215",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28215" "url": "http://secunia.com/advisories/28215"
},
{
"name" : "winace-uue-bo(39268)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2010-0117", "ID": "CVE-2010-0117",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://secunia.com/secunia_research/2010-5/", "name": "ADV-2010-2216",
"refsource" : "MISC", "refsource": "VUPEN",
"url" : "http://secunia.com/secunia_research/2010-5/" "url": "http://www.vupen.com/english/advisories/2010/2216"
},
{
"name" : "http://service.real.com/realplayer/security/08262010_player/en/",
"refsource" : "CONFIRM",
"url" : "http://service.real.com/realplayer/security/08262010_player/en/"
},
{
"name" : "oval:org.mitre.oval:def:7169",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7169"
},
{
"name" : "1024370",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024370"
}, },
{ {
"name": "41096", "name": "41096",
@ -78,19 +63,34 @@
"url": "http://secunia.com/advisories/41096" "url": "http://secunia.com/advisories/41096"
}, },
{ {
"name" : "41154", "name": "http://service.real.com/realplayer/security/08262010_player/en/",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/41154" "url": "http://service.real.com/realplayer/security/08262010_player/en/"
},
{
"name" : "ADV-2010-2216",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2216"
}, },
{ {
"name": "realplayer-yuv420-code-execution(61421)", "name": "realplayer-yuv420-code-execution(61421)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61421" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61421"
},
{
"name": "http://secunia.com/secunia_research/2010-5/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2010-5/"
},
{
"name": "1024370",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024370"
},
{
"name": "oval:org.mitre.oval:def:7169",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7169"
},
{
"name": "41154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41154"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-0309", "ID": "CVE-2010-0309",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[kvm] 20100129 KVM: PIT: control word is write-only", "name": "38158",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.mail-archive.com/kvm@vger.kernel.org/msg28002.html" "url": "http://www.securityfocus.com/bid/38158"
},
{
"name" : "[oss-security] 20100202 CVE request - kvm: cat /dev/port in the guest can cause host DoS",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/02/02/1"
},
{
"name" : "[oss-security] 20100202 Re: CVE request - kvm: cat /dev/port in the guest can cause host DoS",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/02/02/4"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=560887",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=560887"
},
{
"name" : "DSA-1996",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-1996"
},
{
"name" : "RHSA-2010:0088",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2010-0088.html"
},
{
"name" : "RHSA-2010:0095",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
}, },
{ {
"name": "USN-914-1", "name": "USN-914-1",
@ -93,19 +63,14 @@
"url": "http://www.ubuntu.com/usn/USN-914-1" "url": "http://www.ubuntu.com/usn/USN-914-1"
}, },
{ {
"name" : "38158", "name": "ADV-2010-0638",
"refsource" : "BID", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/bid/38158" "url": "http://www.vupen.com/english/advisories/2010/0638"
}, },
{ {
"name" : "oval:org.mitre.oval:def:11095", "name": "RHSA-2010:0088",
"refsource" : "OVAL", "refsource": "REDHAT",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11095" "url": "https://rhn.redhat.com/errata/RHSA-2010-0088.html"
},
{
"name" : "38492",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38492"
}, },
{ {
"name": "38922", "name": "38922",
@ -113,9 +78,44 @@
"url": "http://secunia.com/advisories/38922" "url": "http://secunia.com/advisories/38922"
}, },
{ {
"name" : "ADV-2010-0638", "name": "[oss-security] 20100202 Re: CVE request - kvm: cat /dev/port in the guest can cause host DoS",
"refsource" : "VUPEN", "refsource": "MLIST",
"url" : "http://www.vupen.com/english/advisories/2010/0638" "url": "http://www.openwall.com/lists/oss-security/2010/02/02/4"
},
{
"name": "DSA-1996",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-1996"
},
{
"name": "oval:org.mitre.oval:def:11095",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11095"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=560887",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=560887"
},
{
"name": "[oss-security] 20100202 CVE request - kvm: cat /dev/port in the guest can cause host DoS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/02/02/1"
},
{
"name": "[kvm] 20100129 KVM: PIT: control word is write-only",
"refsource": "MLIST",
"url": "http://www.mail-archive.com/kvm@vger.kernel.org/msg28002.html"
},
{
"name": "RHSA-2010:0095",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
},
{
"name": "38492",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38492"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-0745", "ID": "CVE-2010-0745",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,55 +52,55 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[dovecot-news] 20100308 v1.2.11 released",
"refsource" : "MLIST",
"url" : "http://dovecot.org/list/dovecot-news/2010-March/000152.html"
},
{
"name" : "[dovecot] 20100227 Possible CPU Denial-Of-Service attack to dovecot IMAP.",
"refsource" : "MLIST",
"url" : "http://dovecot.org/pipermail/dovecot/2010-February/047190.html"
},
{
"name" : "[oss-security] 20100310 CVE Request -- Dovecot v1.2.11 -- DoS (excessive CPU use) by processing email with huge header",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/03/10/6"
},
{
"name" : "[oss-security] 20100401 Re: CVE Request -- Dovecot v1.2.11 -- DoS (excessive CPU use) by processing email with huge header",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=127013715227551&w=2"
},
{ {
"name": "http://security-tracker.debian.org/tracker/CVE-2010-0745", "name": "http://security-tracker.debian.org/tracker/CVE-2010-0745",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://security-tracker.debian.org/tracker/CVE-2010-0745" "url": "http://security-tracker.debian.org/tracker/CVE-2010-0745"
}, },
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=572268",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=572268"
},
{
"name" : "MDVSA-2010:104",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:104"
},
{
"name" : "SUSE-SR:2010:011",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
},
{ {
"name": "ADV-2010-1107", "name": "ADV-2010-1107",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1107" "url": "http://www.vupen.com/english/advisories/2010/1107"
}, },
{
"name": "[dovecot] 20100227 Possible CPU Denial-Of-Service attack to dovecot IMAP.",
"refsource": "MLIST",
"url": "http://dovecot.org/pipermail/dovecot/2010-February/047190.html"
},
{
"name": "SUSE-SR:2010:011",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
},
{
"name": "MDVSA-2010:104",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:104"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=572268",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=572268"
},
{ {
"name": "ADV-2010-1226", "name": "ADV-2010-1226",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1226" "url": "http://www.vupen.com/english/advisories/2010/1226"
},
{
"name": "[oss-security] 20100310 CVE Request -- Dovecot v1.2.11 -- DoS (excessive CPU use) by processing email with huge header",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/03/10/6"
},
{
"name": "[dovecot-news] 20100308 v1.2.11 released",
"refsource": "MLIST",
"url": "http://dovecot.org/list/dovecot-news/2010-March/000152.html"
},
{
"name": "[oss-security] 20100401 Re: CVE Request -- Dovecot v1.2.11 -- DoS (excessive CPU use) by processing email with huge header",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127013715227551&w=2"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-0862", "ID": "CVE-2010-0862",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,20 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html"
},
{ {
"name": "TA10-103B", "name": "TA10-103B",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-103B.html" "url": "http://www.us-cert.gov/cas/techalerts/TA10-103B.html"
}, },
{ {
"name" : "39444", "name": "oipsr-rmo-unspecifed(57742)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/39444" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57742"
}, },
{ {
"name": "1023872", "name": "1023872",
@ -73,9 +68,14 @@
"url": "http://www.securitytracker.com/id?1023872" "url": "http://www.securitytracker.com/id?1023872"
}, },
{ {
"name" : "oipsr-rmo-unspecifed(57742)", "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57742" "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html"
},
{
"name": "39444",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39444"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt", "name": "38247",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt" "url": "http://secunia.com/advisories/38247"
}, },
{ {
"name": "61845", "name": "61845",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/61845" "url": "http://osvdb.org/61845"
}, },
{
"name" : "38247",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38247"
},
{ {
"name": "lookmermusicportal-mdb-info-disclosure(55751)", "name": "lookmermusicportal-mdb-info-disclosure(55751)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55751" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55751"
},
{
"name": "http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt",
"refsource": "MISC",
"url": "http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt"
} }
] ]
} }

View File

@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ipa.go.jp/about/press/20100517_2.html",
"refsource" : "MISC",
"url" : "http://www.ipa.go.jp/about/press/20100517_2.html"
},
{ {
"name": "http://www.nec.co.jp/security-info/secinfo/nv10-005.html", "name": "http://www.nec.co.jp/security-info/secinfo/nv10-005.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.nec.co.jp/security-info/secinfo/nv10-005.html" "url": "http://www.nec.co.jp/security-info/secinfo/nv10-005.html"
}, },
{ {
"name" : "JVN#82749282", "name": "40190",
"refsource" : "JVN", "refsource": "BID",
"url" : "http://jvn.jp/en/jp/JVN82749282/index.html" "url": "http://www.securityfocus.com/bid/40190"
},
{
"name": "http://www.ipa.go.jp/about/press/20100517_2.html",
"refsource": "MISC",
"url": "http://www.ipa.go.jp/about/press/20100517_2.html"
}, },
{ {
"name": "JVNDB-2010-000020", "name": "JVNDB-2010-000020",
@ -73,9 +73,9 @@
"url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000020.html" "url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000020.html"
}, },
{ {
"name" : "40190", "name": "ADV-2010-1166",
"refsource" : "BID", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/bid/40190" "url": "http://www.vupen.com/english/advisories/2010/1166"
}, },
{ {
"name": "64701", "name": "64701",
@ -88,9 +88,9 @@
"url": "http://secunia.com/advisories/39800" "url": "http://secunia.com/advisories/39800"
}, },
{ {
"name" : "ADV-2010-1166", "name": "JVN#82749282",
"refsource" : "VUPEN", "refsource": "JVN",
"url" : "http://www.vupen.com/english/advisories/2010/1166" "url": "http://jvn.jp/en/jp/JVN82749282/index.html"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-266",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-266"
},
{
"name" : "http://service.real.com/realplayer/security/12102010_player/en/",
"refsource" : "CONFIRM",
"url" : "http://service.real.com/realplayer/security/12102010_player/en/"
},
{ {
"name": "RHSA-2010:0981", "name": "RHSA-2010:0981",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0981.html" "url": "http://www.redhat.com/support/errata/RHSA-2010-0981.html"
}, },
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-266",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-266"
},
{ {
"name": "1024861", "name": "1024861",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024861" "url": "http://www.securitytracker.com/id?1024861"
},
{
"name": "http://service.real.com/realplayer/security/12102010_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/12102010_player/en/"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21454745", "name": "1024901",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21454745" "url": "http://securitytracker.com/id?1024901"
}, },
{ {
"name": "IC66686", "name": "IC66686",
@ -63,9 +63,9 @@
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC66686" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC66686"
}, },
{ {
"name" : "1024901", "name": "ADV-2010-3251",
"refsource" : "SECTRACK", "refsource": "VUPEN",
"url" : "http://securitytracker.com/id?1024901" "url": "http://www.vupen.com/english/advisories/2010/3251"
}, },
{ {
"name": "42639", "name": "42639",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/42639" "url": "http://secunia.com/advisories/42639"
}, },
{ {
"name" : "ADV-2010-3251", "name": "http://www.ibm.com/support/docview.wss?uid=swg21454745",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2010/3251" "url": "http://www.ibm.com/support/docview.wss?uid=swg21454745"
} }
] ]
} }

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "15220", "name": "flex-timesheet-username-sql-injection(62374)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "http://www.exploit-db.com/exploits/15220" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62374"
},
{
"name" : "http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt"
},
{
"name" : "43886",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/43886"
},
{
"name" : "41763",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41763"
}, },
{ {
"name": "8222", "name": "8222",
@ -78,9 +63,24 @@
"url": "http://securityreason.com/securityalert/8222" "url": "http://securityreason.com/securityalert/8222"
}, },
{ {
"name" : "flex-timesheet-username-sql-injection(62374)", "name": "41763",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62374" "url": "http://secunia.com/advisories/41763"
},
{
"name": "15220",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15220"
},
{
"name": "43886",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43886"
},
{
"name": "http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4",
"refsource": "CONFIRM",
"url": "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4"
},
{ {
"name": "http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/", "name": "http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://twitter.com/digitalbond/status/619250429751222277", "name": "https://twitter.com/digitalbond/status/619250429751222277",
"refsource": "MISC", "refsource": "MISC",
"url": "https://twitter.com/digitalbond/status/619250429751222277" "url": "https://twitter.com/digitalbond/status/619250429751222277"
},
{
"name" : "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4",
"refsource" : "CONFIRM",
"url" : "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-0422", "ID": "CVE-2014-0422",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,64 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "name": "56432",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" "url": "http://secunia.com/advisories/56432"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1051528", "name": "RHSA-2014:0414",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1051528" "url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name": "RHSA-2014:0136",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0136.html"
},
{
"name": "openSUSE-SU-2014:0174",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html"
},
{
"name": "SSRT101455",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name": "RHSA-2014:0135",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0135.html"
},
{
"name": "56535",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56535"
},
{
"name": "USN-2089-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name": "RHSA-2014:0030",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
},
{
"name": "RHSA-2014:0097",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0097.html"
},
{
"name": "56485",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56485"
},
{
"name": "SSRT101454",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
}, },
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
@ -72,140 +122,90 @@
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2" "url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
}, },
{
"name" : "HPSBUX02973",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name" : "SSRT101454",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
},
{
"name" : "SSRT101455",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name" : "RHSA-2014:0026",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0026.html"
},
{ {
"name": "RHSA-2014:0027", "name": "RHSA-2014:0027",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0027.html" "url": "http://rhn.redhat.com/errata/RHSA-2014-0027.html"
}, },
{
"name" : "RHSA-2014:0097",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0097.html"
},
{
"name" : "RHSA-2014:0136",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0136.html"
},
{
"name" : "RHSA-2014:0030",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
},
{
"name" : "RHSA-2014:0134",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0134.html"
},
{
"name" : "RHSA-2014:0135",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0135.html"
},
{
"name" : "RHSA-2014:0414",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "openSUSE-SU-2014:0174",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html"
},
{
"name" : "SUSE-SU-2014:0246",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html"
},
{
"name" : "SUSE-SU-2014:0266",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html"
},
{
"name" : "openSUSE-SU-2014:0177",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html"
},
{
"name" : "openSUSE-SU-2014:0180",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html"
},
{
"name" : "SUSE-SU-2014:0451",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html"
},
{
"name" : "USN-2089-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name" : "USN-2124-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2124-1"
},
{
"name" : "64758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64758"
},
{
"name" : "64921",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64921"
},
{
"name" : "101997",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/101997"
},
{
"name" : "1029608",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029608"
},
{
"name" : "56432",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56432"
},
{
"name" : "56485",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56485"
},
{ {
"name": "56486", "name": "56486",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56486" "url": "http://secunia.com/advisories/56486"
}, },
{ {
"name" : "56535", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1051528",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/56535" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051528"
},
{
"name": "SUSE-SU-2014:0451",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html"
},
{
"name": "HPSBUX02973",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name": "1029608",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029608"
},
{
"name": "64921",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64921"
},
{
"name": "USN-2124-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2124-1"
},
{
"name": "SUSE-SU-2014:0266",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html"
},
{
"name": "RHSA-2014:0026",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0026.html"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "101997",
"refsource": "OSVDB",
"url": "http://osvdb.org/101997"
},
{
"name": "SUSE-SU-2014:0246",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "RHSA-2014:0134",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0134.html"
},
{
"name": "openSUSE-SU-2014:0180",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html"
},
{
"name": "openSUSE-SU-2014:0177",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2014-0469", "ID": "CVE-2014-0469",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "67090",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67090"
},
{
"name": "DSA-2921",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2921"
},
{ {
"name": "[oss-security] 20140428 CVE-2014-0469: xbuffy stack-based buffer overflow in subject processing", "name": "[oss-security] 20140428 CVE-2014-0469: xbuffy stack-based buffer overflow in subject processing",
"refsource": "MLIST", "refsource": "MLIST",
@ -61,16 +71,6 @@
"name": "http://packages.qa.debian.org/x/xbuffy/news/20140427T181904Z.html", "name": "http://packages.qa.debian.org/x/xbuffy/news/20140427T181904Z.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://packages.qa.debian.org/x/xbuffy/news/20140427T181904Z.html" "url": "http://packages.qa.debian.org/x/xbuffy/news/20140427T181904Z.html"
},
{
"name" : "DSA-2921",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2921"
},
{
"name" : "67090",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/67090"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1335", "ID": "CVE-2014-1335",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT6254",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6254"
},
{ {
"name": "https://support.apple.com/kb/HT6537", "name": "https://support.apple.com/kb/HT6537",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6537" "url": "https://support.apple.com/kb/HT6537"
}, },
{
"name" : "APPLE-SA-2014-05-21-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html"
},
{
"name" : "APPLE-SA-2014-06-30-3",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
},
{ {
"name": "APPLE-SA-2014-06-30-4", "name": "APPLE-SA-2014-06-30-4",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html"
}, },
{
"name": "http://support.apple.com/kb/HT6254",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6254"
},
{
"name": "APPLE-SA-2014-06-30-3",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
},
{ {
"name": "67553", "name": "67553",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/67553" "url": "http://www.securityfocus.com/bid/67553"
},
{
"name": "APPLE-SA-2014-05-21-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html"
} }
] ]
} }

View File

@ -53,9 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20140213 Wordpress plugin Buddypress <= 1.9.1 stored xss vulnerability", "name": "65555",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/531049/100/0/threaded" "url": "http://www.securityfocus.com/bid/65555"
},
{
"name": "buddypress-cve20141888-xss(91175)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91175"
},
{
"name": "56950",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56950"
}, },
{ {
"name": "http://packetstormsecurity.com/files/125212/WordPress-Buddypress-1.9.1-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/125212/WordPress-Buddypress-1.9.1-Cross-Site-Scripting.html",
@ -68,24 +78,14 @@
"url": "http://buddypress.org/2014/02/buddypress-1-9-2" "url": "http://buddypress.org/2014/02/buddypress-1-9-2"
}, },
{ {
"name" : "65555", "name": "20140213 Wordpress plugin Buddypress <= 1.9.1 stored xss vulnerability",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/65555" "url": "http://www.securityfocus.com/archive/1/531049/100/0/threaded"
}, },
{ {
"name": "103307", "name": "103307",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/103307" "url": "http://osvdb.org/103307"
},
{
"name" : "56950",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56950"
},
{
"name" : "buddypress-cve20141888-xss(91175)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/91175"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://jvn.jp/vu/JVNVU97441356/index.html", "name": "VU#566894",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "http://jvn.jp/vu/JVNVU97441356/index.html" "url": "http://www.kb.cert.org/vuls/id/566894"
},
{
"name": "102814",
"refsource": "OSVDB",
"url": "http://osvdb.org/102814"
}, },
{ {
"name": "http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details", "name": "http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details",
@ -63,20 +68,15 @@
"url": "http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details" "url": "http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details"
}, },
{ {
"name" : "VU#566894", "name": "http://jvn.jp/vu/JVNVU97441356/index.html",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/566894" "url": "http://jvn.jp/vu/JVNVU97441356/index.html"
}, },
{ {
"name": "65305", "name": "65305",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/65305" "url": "http://www.securityfocus.com/bid/65305"
}, },
{
"name" : "102814",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/102814"
},
{ {
"name": "102815", "name": "102815",
"refsource": "OSVDB", "refsource": "OSVDB",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-4235", "ID": "CVE-2014-4235",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded" "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
}, },
{ {
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "FULLDISC", "refsource": "BUGTRAQ",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23" "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", "name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
@ -68,9 +68,9 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
}, },
{ {
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "CONFIRM", "refsource": "FULLDISC",
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" "url": "http://seclists.org/fulldisclosure/2014/Dec/23"
}, },
{ {
"name": "68647", "name": "68647",

View File

@ -57,16 +57,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/" "url": "http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/"
}, },
{
"name" : "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html",
"refsource" : "CONFIRM",
"url" : "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html"
},
{
"name" : "GLSA-201407-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201407-02.xml"
},
{ {
"name": "RHSA-2014:0860", "name": "RHSA-2014:0860",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -77,6 +67,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/68457" "url": "http://www.securityfocus.com/bid/68457"
}, },
{
"name": "59774",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59774"
},
{ {
"name": "1030533", "name": "1030533",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -88,9 +83,14 @@
"url": "http://secunia.com/advisories/59837" "url": "http://secunia.com/advisories/59837"
}, },
{ {
"name" : "59774", "name": "GLSA-201407-02",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/59774" "url": "http://security.gentoo.org/glsa/glsa-201407-02.xml"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-3850", "ID": "CVE-2016-3850",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-3890", "ID": "CVE-2016-3890",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "92851",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92851"
},
{ {
"name": "http://source.android.com/security/bulletin/2016-09-01.html", "name": "http://source.android.com/security/bulletin/2016-09-01.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-09-01.html" "url": "http://source.android.com/security/bulletin/2016-09-01.html"
}, },
{
"name" : "https://android.googlesource.com/platform/system/core/+/014b01706cc64dc9c2ad94a96f62e07c058d0b5d",
"refsource" : "CONFIRM",
"url" : "https://android.googlesource.com/platform/system/core/+/014b01706cc64dc9c2ad94a96f62e07c058d0b5d"
},
{ {
"name": "https://android.googlesource.com/platform/system/core/+/268068f25673242d1d5130d96202d3288c91b700", "name": "https://android.googlesource.com/platform/system/core/+/268068f25673242d1d5130d96202d3288c91b700",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/system/core/+/268068f25673242d1d5130d96202d3288c91b700" "url": "https://android.googlesource.com/platform/system/core/+/268068f25673242d1d5130d96202d3288c91b700"
}, },
{
"name" : "92851",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92851"
},
{ {
"name": "1036763", "name": "1036763",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036763" "url": "http://www.securitytracker.com/id/1036763"
},
{
"name": "https://android.googlesource.com/platform/system/core/+/014b01706cc64dc9c2ad94a96f62e07c058d0b5d",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/system/core/+/014b01706cc64dc9c2ad94a96f62e07c058d0b5d"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1037252",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037252"
},
{ {
"name": "MS16-134", "name": "MS16-134",
"refsource": "MS", "refsource": "MS",
@ -61,11 +66,6 @@
"name": "94015", "name": "94015",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94015" "url": "http://www.securityfocus.com/bid/94015"
},
{
"name" : "1037252",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037252"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "GLSA-201702-23",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-23"
},
{
"name": "92974",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92974"
},
{ {
"name": "[oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74", "name": "[oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74",
"refsource": "MLIST", "refsource": "MLIST",
@ -66,16 +76,6 @@
"name": "https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb", "name": "https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb" "url": "https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb"
},
{
"name" : "GLSA-201702-23",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201702-23"
},
{
"name" : "92974",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92974"
} }
] ]
} }

View File

@ -53,25 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913", "name": "JVN#96681653",
"refsource" : "CONFIRM", "refsource": "JVN",
"url" : "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913" "url": "https://jvn.jp/en/jp/JVN96681653/index.html"
}, },
{ {
"name": "https://www.wireshark.org/news/20161214.html", "name": "https://www.wireshark.org/news/20161214.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.wireshark.org/news/20161214.html" "url": "https://www.wireshark.org/news/20161214.html"
}, },
{
"name": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913",
"refsource": "CONFIRM",
"url": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913"
},
{ {
"name": "JVN#90813656", "name": "JVN#90813656",
"refsource": "JVN", "refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN90813656/index.html" "url": "https://jvn.jp/en/jp/JVN90813656/index.html"
}, },
{
"name" : "JVN#96681653",
"refsource" : "JVN",
"url" : "https://jvn.jp/en/jp/JVN96681653/index.html"
},
{ {
"name": "95099", "name": "95099",
"refsource": "BID", "refsource": "BID",

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-624", "name": "SUSE-SU-2016:3148",
"refsource" : "MISC", "refsource": "SUSE",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-624" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
},
{
"name" : "GLSA-201701-17",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-17"
}, },
{ {
"name": "MS16-154", "name": "MS16-154",
@ -73,29 +63,39 @@
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
}, },
{ {
"name" : "RHSA-2016:2947", "name": "http://www.zerodayinitiative.com/advisories/ZDI-16-624",
"refsource" : "REDHAT", "refsource": "MISC",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2947.html" "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-624"
},
{
"name" : "SUSE-SU-2016:3148",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
},
{
"name" : "openSUSE-SU-2016:3160",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
}, },
{ {
"name": "94871", "name": "94871",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94871" "url": "http://www.securityfocus.com/bid/94871"
}, },
{
"name": "GLSA-201701-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-17"
},
{ {
"name": "1037442", "name": "1037442",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037442" "url": "http://www.securitytracker.com/id/1037442"
},
{
"name": "RHSA-2016:2947",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
},
{
"name": "openSUSE-SU-2016:3160",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8267", "ID": "CVE-2016-8267",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-8415", "ID": "CVE-2016-8415",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20161104 Re: CVE request: XXE in perl Image:nfo and XML:wig",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/11/04/2"
},
{ {
"name": "94219", "name": "94219",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94219" "url": "http://www.securityfocus.com/bid/94219"
},
{
"name": "[oss-security] 20161104 Re: CVE request: XXE in perl Image:nfo and XML:wig",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/11/04/2"
} }
] ]
} }

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.phpmyadmin.net/security/PMASA-2016-70" "url": "https://www.phpmyadmin.net/security/PMASA-2016-70"
}, },
{
"name" : "GLSA-201701-32",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-32"
},
{ {
"name": "94531", "name": "94531",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94531" "url": "http://www.securityfocus.com/bid/94531"
},
{
"name": "GLSA-201701-32",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-32"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{ {
"name": "106579", "name": "106579",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106579" "url": "http://www.securityfocus.com/bid/106579"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
} }
] ]
} }