"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:33:10 +00:00
parent c491fa69d0
commit 76d7866344
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
53 changed files with 3437 additions and 3437 deletions

View File

@ -53,39 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060502 FTP Fuzzer", "name": "goldenftp-nlst-appe-bo(26195)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=114658586018818&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26195"
},
{
"name" : "20060508 INFIGO-2006-05-03: Multiple FTP Servers vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-05/0139.html"
},
{
"name" : "http://www.infigo.hr/en/in_focus/tools",
"refsource" : "MISC",
"url" : "http://www.infigo.hr/en/in_focus/tools"
},
{
"name" : "http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-05-03",
"refsource" : "MISC",
"url" : "http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-05-03"
},
{
"name" : "17801",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17801"
},
{
"name" : "ADV-2006-1640",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1640"
},
{
"name" : "25217",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/25217"
}, },
{ {
"name": "19917", "name": "19917",
@ -93,9 +63,39 @@
"url": "http://secunia.com/advisories/19917" "url": "http://secunia.com/advisories/19917"
}, },
{ {
"name" : "goldenftp-nlst-appe-bo(26195)", "name": "http://www.infigo.hr/en/in_focus/tools",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26195" "url": "http://www.infigo.hr/en/in_focus/tools"
},
{
"name": "25217",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25217"
},
{
"name": "20060502 FTP Fuzzer",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=114658586018818&w=2"
},
{
"name": "ADV-2006-1640",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1640"
},
{
"name": "17801",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17801"
},
{
"name": "http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-05-03",
"refsource": "MISC",
"url": "http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-05-03"
},
{
"name": "20060508 INFIGO-2006-05-03: Multiple FTP Servers vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-05/0139.html"
} }
] ]
} }

View File

@ -62,15 +62,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.packetstormsecurity.org/0606-exploits/xmepftp.txt" "url": "http://www.packetstormsecurity.org/0606-exploits/xmepftp.txt"
}, },
{
"name" : "18711",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18711"
},
{ {
"name": "19970", "name": "19970",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19970" "url": "http://secunia.com/advisories/19970"
},
{
"name": "18711",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18711"
} }
] ]
} }

View File

@ -52,15 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "VU#802324",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/802324"
},
{ {
"name": "20060618 Microsoft Excel 0-day Vulnerability FAQ document written", "name": "20060618 Microsoft Excel 0-day Vulnerability FAQ document written",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/437636/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/437636/100/0/threaded"
}, },
{ {
"name" : "20060621 Excel 0-day FAQ updated with Microsoft advisory information", "name": "MS06-037",
"refsource" : "BUGTRAQ", "refsource": "MS",
"url" : "http://www.securityfocus.com/archive/1/437936/100/0/threaded" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037"
},
{
"name": "oval:org.mitre.oval:def:537",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A537"
},
{
"name": "excel-unspecified-code-execution(27179)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27179"
}, },
{ {
"name": "http://blogs.securiteam.com/?p=451", "name": "http://blogs.securiteam.com/?p=451",
@ -68,14 +83,14 @@
"url": "http://blogs.securiteam.com/?p=451" "url": "http://blogs.securiteam.com/?p=451"
}, },
{ {
"name" : "http://blogs.technet.com/msrc/archive/2006/06/16/436174.aspx", "name": "26527",
"refsource" : "CONFIRM", "refsource": "OSVDB",
"url" : "http://blogs.technet.com/msrc/archive/2006/06/16/436174.aspx" "url": "http://www.osvdb.org/26527"
}, },
{ {
"name" : "MS06-037", "name": "20686",
"refsource" : "MS", "refsource": "SECUNIA",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037" "url": "http://secunia.com/advisories/20686"
}, },
{ {
"name": "TA06-167A", "name": "TA06-167A",
@ -88,24 +103,14 @@
"url": "http://isc.sans.org/diary.php?storyid=1420" "url": "http://isc.sans.org/diary.php?storyid=1420"
}, },
{ {
"name" : "TA06-192A", "name": "1016316",
"refsource" : "CERT", "refsource": "SECTRACK",
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-192A.html" "url": "http://securitytracker.com/id?1016316"
}, },
{ {
"name" : "VU#802324", "name": "http://blogs.technet.com/msrc/archive/2006/06/16/436174.aspx",
"refsource" : "CERT-VN", "refsource": "CONFIRM",
"url" : "http://www.kb.cert.org/vuls/id/802324" "url": "http://blogs.technet.com/msrc/archive/2006/06/16/436174.aspx"
},
{
"name" : "18422",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18422"
},
{
"name" : "ADV-2006-2361",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2361"
}, },
{ {
"name": "ADV-2006-2755", "name": "ADV-2006-2755",
@ -113,29 +118,24 @@
"url": "http://www.vupen.com/english/advisories/2006/2755" "url": "http://www.vupen.com/english/advisories/2006/2755"
}, },
{ {
"name" : "26527", "name": "18422",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://www.osvdb.org/26527" "url": "http://www.securityfocus.com/bid/18422"
}, },
{ {
"name" : "oval:org.mitre.oval:def:537", "name": "20060621 Excel 0-day FAQ updated with Microsoft advisory information",
"refsource" : "OVAL", "refsource": "BUGTRAQ",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A537" "url": "http://www.securityfocus.com/archive/1/437936/100/0/threaded"
}, },
{ {
"name" : "1016316", "name": "TA06-192A",
"refsource" : "SECTRACK", "refsource": "CERT",
"url" : "http://securitytracker.com/id?1016316" "url": "http://www.us-cert.gov/cas/techalerts/TA06-192A.html"
}, },
{ {
"name" : "20686", "name": "ADV-2006-2361",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/20686" "url": "http://www.vupen.com/english/advisories/2006/2361"
},
{
"name" : "excel-unspecified-code-execution(27179)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27179"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "http://pridels0.blogspot.com/2006/06/hostflow-vuln.html" "url": "http://pridels0.blogspot.com/2006/06/hostflow-vuln.html"
}, },
{ {
"name" : "18695", "name": "26872",
"refsource" : "BID", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/bid/18695" "url": "http://www.osvdb.org/26872"
}, },
{ {
"name": "ADV-2006-2570", "name": "ADV-2006-2570",
@ -68,19 +68,19 @@
"url": "http://www.vupen.com/english/advisories/2006/2570" "url": "http://www.vupen.com/english/advisories/2006/2570"
}, },
{ {
"name" : "26872", "name": "18695",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://www.osvdb.org/26872" "url": "http://www.securityfocus.com/bid/18695"
},
{
"name" : "20863",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20863"
}, },
{ {
"name": "hostflow-ticketdescription-xss(27426)", "name": "hostflow-ticketdescription-xss(27426)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27426" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27426"
},
{
"name": "20863",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20863"
} }
] ]
} }

View File

@ -52,41 +52,41 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070509 Symantec Norton Internet Security 2006 COM Object Security ByPass Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529"
},
{ {
"name": "http://www.symantec.com/avcenter/security/Content/2007.05.09.html", "name": "http://www.symantec.com/avcenter/security/Content/2007.05.09.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.symantec.com/avcenter/security/Content/2007.05.09.html" "url": "http://www.symantec.com/avcenter/security/Content/2007.05.09.html"
}, },
{
"name" : "23822",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23822"
},
{
"name" : "35075",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35075"
},
{ {
"name": "ADV-2007-1751", "name": "ADV-2007-1751",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1751" "url": "http://www.vupen.com/english/advisories/2007/1751"
}, },
{ {
"name" : "1018031", "name": "23822",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id?1018031" "url": "http://www.securityfocus.com/bid/23822"
}, },
{ {
"name": "25172", "name": "25172",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25172" "url": "http://secunia.com/advisories/25172"
}, },
{
"name": "20070509 Symantec Norton Internet Security 2006 COM Object Security ByPass Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529"
},
{
"name": "35075",
"refsource": "OSVDB",
"url": "http://osvdb.org/35075"
},
{
"name": "1018031",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018031"
},
{ {
"name": "symantec-navopts-security-bypass(34200)", "name": "symantec-navopts-security-bypass(34200)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,35 +53,35 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060801 [Kurdish Security # 16 ] newsReporter v1.0 Remote Command Execution", "name": "ADV-2006-3092",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/441808/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2006/3092"
},
{
"name" : "2101",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2101"
}, },
{ {
"name": "19275", "name": "19275",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/19275" "url": "http://www.securityfocus.com/bid/19275"
}, },
{
"name" : "ADV-2006-3092",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3092"
},
{ {
"name": "21312", "name": "21312",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21312" "url": "http://secunia.com/advisories/21312"
}, },
{
"name": "20060801 [Kurdish Security # 16 ] newsReporter v1.0 Remote Command Execution",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/441808/100/0/threaded"
},
{ {
"name": "1326", "name": "1326",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1326" "url": "http://securityreason.com/securityalert/1326"
}, },
{
"name": "2101",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2101"
},
{ {
"name": "newsreporter-index-file-include(28095)", "name": "newsreporter-index-file-include(28095)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "19311",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19311"
},
{ {
"name": "20060802 OZJournal v1.5 - XSS", "name": "20060802 OZJournal v1.5 - XSS",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/442035/100/200/threaded" "url": "http://www.securityfocus.com/archive/1/442035/100/200/threaded"
}, },
{ {
"name" : "http://www.youfucktard.com/blog/2006/08/02/ozjournal-v15-xss/", "name": "ozjournals-index-archive-xss(28188)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://www.youfucktard.com/blog/2006/08/02/ozjournal-v15-xss/" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28188"
},
{
"name" : "19311",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19311"
}, },
{ {
"name": "ADV-2006-3142", "name": "ADV-2006-3142",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3142" "url": "http://www.vupen.com/english/advisories/2006/3142"
}, },
{
"name": "http://www.youfucktard.com/blog/2006/08/02/ozjournal-v15-xss/",
"refsource": "MISC",
"url": "http://www.youfucktard.com/blog/2006/08/02/ozjournal-v15-xss/"
},
{ {
"name": "21311", "name": "21311",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21311" "url": "http://secunia.com/advisories/21311"
},
{
"name" : "ozjournals-index-archive-xss(28188)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28188"
} }
] ]
} }

View File

@ -53,39 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060828 SYMSA-2006-009", "name": "maxdb-webdbm-bo(28636)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/444601/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28636"
}, },
{ {
"name": "http://www.symantec.com/enterprise/research/SYMSA-2006-009.txt", "name": "http://www.symantec.com/enterprise/research/SYMSA-2006-009.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.symantec.com/enterprise/research/SYMSA-2006-009.txt" "url": "http://www.symantec.com/enterprise/research/SYMSA-2006-009.txt"
}, },
{
"name" : "http://dev.mysql.com/doc/maxdb/changes/changes_7.6.00.32.html",
"refsource" : "CONFIRM",
"url" : "http://dev.mysql.com/doc/maxdb/changes/changes_7.6.00.32.html"
},
{ {
"name": "DSA-1190", "name": "DSA-1190",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1190" "url": "http://www.debian.org/security/2006/dsa-1190"
}, },
{ {
"name" : "19660", "name": "20060828 SYMSA-2006-009",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/19660" "url": "http://www.securityfocus.com/archive/1/444601/100/0/threaded"
},
{
"name" : "ADV-2006-3410",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3410"
},
{
"name" : "1016766",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016766"
}, },
{ {
"name": "21677", "name": "21677",
@ -98,9 +83,24 @@
"url": "http://secunia.com/advisories/22518" "url": "http://secunia.com/advisories/22518"
}, },
{ {
"name" : "maxdb-webdbm-bo(28636)", "name": "http://dev.mysql.com/doc/maxdb/changes/changes_7.6.00.32.html",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28636" "url": "http://dev.mysql.com/doc/maxdb/changes/changes_7.6.00.32.html"
},
{
"name": "1016766",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016766"
},
{
"name": "ADV-2006-3410",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3410"
},
{
"name": "19660",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19660"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.yetanothercommunitysystem.com/yacs/articles/view.php/1664",
"refsource" : "CONFIRM",
"url" : "http://www.yetanothercommunitysystem.com/yacs/articles/view.php/1664"
},
{
"name" : "31301",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/31301"
},
{
"name" : "31302",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/31302"
},
{ {
"name": "31303", "name": "31303",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -82,16 +67,36 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/31305" "url": "http://www.osvdb.org/31305"
}, },
{
"name": "31310",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/31310"
},
{ {
"name": "31306", "name": "31306",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/31306" "url": "http://www.osvdb.org/31306"
}, },
{
"name": "31302",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/31302"
},
{
"name": "31301",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/31301"
},
{ {
"name": "31307", "name": "31307",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/31307" "url": "http://www.osvdb.org/31307"
}, },
{
"name": "http://www.yetanothercommunitysystem.com/yacs/articles/view.php/1664",
"refsource": "CONFIRM",
"url": "http://www.yetanothercommunitysystem.com/yacs/articles/view.php/1664"
},
{ {
"name": "31308", "name": "31308",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -102,11 +107,6 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/31309" "url": "http://www.osvdb.org/31309"
}, },
{
"name" : "31310",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/31310"
},
{ {
"name": "21680", "name": "21680",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061117 XSS vBulletin 3.6.X Admin Control Painel",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/451959/100/0/threaded"
},
{ {
"name": "http://www.vbulletin.com/forum/showthread.php?postid=1256434", "name": "http://www.vbulletin.com/forum/showthread.php?postid=1256434",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.vbulletin.com/forum/showthread.php?postid=1256434" "url": "http://www.vbulletin.com/forum/showthread.php?postid=1256434"
}, },
{
"name" : "21157",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21157"
},
{
"name" : "ADV-2006-4599",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4599"
},
{ {
"name": "23011", "name": "23011",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23011" "url": "http://secunia.com/advisories/23011"
}, },
{ {
"name" : "1903", "name": "21157",
"refsource" : "SREASON", "refsource": "BID",
"url" : "http://securityreason.com/securityalert/1903" "url": "http://www.securityfocus.com/bid/21157"
}, },
{ {
"name": "vbulletin-index-admin-control-xss(30408)", "name": "vbulletin-index-admin-control-xss(30408)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30408" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30408"
},
{
"name": "ADV-2006-4599",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4599"
},
{
"name": "1903",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1903"
},
{
"name": "20061117 XSS vBulletin 3.6.X Admin Control Painel",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/451959/100/0/threaded"
} }
] ]
} }

View File

@ -53,25 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20061208 [Aria-Security Team] cPanel BoxTrapper Cross Site Scripting", "name": "23302",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/453888/100/0/threaded" "url": "http://secunia.com/advisories/23302"
}, },
{ {
"name": "http://www.aria-security.com/forum/showthread.php?t=67", "name": "http://www.aria-security.com/forum/showthread.php?t=67",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.aria-security.com/forum/showthread.php?t=67" "url": "http://www.aria-security.com/forum/showthread.php?t=67"
}, },
{
"name": "20061208 [Aria-Security Team] cPanel BoxTrapper Cross Site Scripting",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/453888/100/0/threaded"
},
{ {
"name": "21497", "name": "21497",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/21497" "url": "http://www.securityfocus.com/bid/21497"
}, },
{
"name" : "23302",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23302"
},
{ {
"name": "2028", "name": "2028",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2522", "ID": "CVE-2010-2522",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20100706 patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/07/06/5"
},
{ {
"name": "[oss-security] 20100707 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon", "name": "[oss-security] 20100707 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/07/4" "url": "http://www.openwall.com/lists/oss-security/2010/07/07/4"
}, },
{ {
"name" : "[oss-security] 20100707 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon", "name": "[oss-security] 20100706 patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://marc.info/?l=oss-security&m=127850299910685&w=2" "url": "http://www.openwall.com/lists/oss-security/2010/07/06/5"
}, },
{ {
"name": "[oss-security] 20100708 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon", "name": "[oss-security] 20100708 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/09/1" "url": "http://www.openwall.com/lists/oss-security/2010/07/09/1"
}, },
{
"name": "[oss-security] 20100707 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127850299910685&w=2"
},
{ {
"name": "[oss-security] 20100708 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon", "name": "[oss-security] 20100708 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon",
"refsource": "MLIST", "refsource": "MLIST",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-0106", "ID": "CVE-2011-0106",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0181", "ID": "CVE-2011-0181",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT4581",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4581"
},
{ {
"name": "APPLE-SA-2011-03-21-1", "name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1021", "ID": "CVE-2011-1021",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,24 +58,24 @@
"url": "http://www.openwall.com/lists/oss-security/2011/02/25/5" "url": "http://www.openwall.com/lists/oss-security/2011/02/25/5"
}, },
{ {
"name" : "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0", "name": "https://github.com/torvalds/linux/commit/526b4af47f44148c9d665e57723ed9f86634c6e3",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0" "url": "https://github.com/torvalds/linux/commit/526b4af47f44148c9d665e57723ed9f86634c6e3"
}, },
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=526b4af47f44148c9d665e57723ed9f86634c6e3", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=526b4af47f44148c9d665e57723ed9f86634c6e3",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=526b4af47f44148c9d665e57723ed9f86634c6e3" "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=526b4af47f44148c9d665e57723ed9f86634c6e3"
}, },
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0",
"refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=680841", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=680841",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680841" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680841"
},
{
"name" : "https://github.com/torvalds/linux/commit/526b4af47f44148c9d665e57723ed9f86634c6e3",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/526b4af47f44148c9d665e57723ed9f86634c6e3"
} }
] ]
} }

View File

@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://code.google.com/p/chromium/issues/detail?id=70885", "name": "46785",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://code.google.com/p/chromium/issues/detail?id=70885" "url": "http://www.securityfocus.com/bid/46785"
}, },
{ {
"name": "http://code.google.com/p/chromium/issues/detail?id=71167", "name": "http://code.google.com/p/chromium/issues/detail?id=71167",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=71167" "url": "http://code.google.com/p/chromium/issues/detail?id=71167"
}, },
{
"name" : "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html"
},
{
"name" : "46785",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46785"
},
{ {
"name": "oval:org.mitre.oval:def:14461", "name": "oval:org.mitre.oval:def:14461",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14461" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14461"
}, },
{ {
"name" : "ADV-2011-0628", "name": "http://code.google.com/p/chromium/issues/detail?id=70885",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2011/0628" "url": "http://code.google.com/p/chromium/issues/detail?id=70885"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html"
}, },
{ {
"name": "google-popup-sec-bypass(65958)", "name": "google-popup-sec-bypass(65958)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65958" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65958"
},
{
"name": "ADV-2011-0628",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0628"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://code.google.com/p/chromium/issues/detail?id=70589", "name": "oval:org.mitre.oval:def:14305",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://code.google.com/p/chromium/issues/detail?id=70589" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14305"
}, },
{ {
"name": "http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html", "name": "http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html",
@ -63,9 +63,9 @@
"url": "http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html" "url": "http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:14305", "name": "http://code.google.com/p/chromium/issues/detail?id=70589",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14305" "url": "http://code.google.com/p/chromium/issues/detail?id=70589"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1777", "ID": "CVE-2011-1777",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,15 +53,30 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://code.google.com/p/libarchive/source/detail?r=3158", "name": "48034",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://code.google.com/p/libarchive/source/detail?r=3158" "url": "http://secunia.com/advisories/48034"
},
{
"name": "RHSA-2011:1507",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2011-1507.html"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=705849", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=705849",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=705849" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705849"
}, },
{
"name": "http://code.google.com/p/libarchive/source/detail?r=3158",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/libarchive/source/detail?r=3158"
},
{
"name": "DSA-2413",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2413"
},
{ {
"name": "http://support.apple.com/kb/HT5281", "name": "http://support.apple.com/kb/HT5281",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,21 +86,6 @@
"name": "APPLE-SA-2012-05-09-1", "name": "APPLE-SA-2012-05-09-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name" : "DSA-2413",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2413"
},
{
"name" : "RHSA-2011:1507",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2011-1507.html"
},
{
"name" : "48034",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48034"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-4150", "ID": "CVE-2011-4150",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://download.novell.com/Download?buildid=Cfw1tDezgbw~",
"refsource" : "CONFIRM",
"url" : "http://download.novell.com/Download?buildid=Cfw1tDezgbw~"
},
{ {
"name": "https://bugzilla.novell.com/show_bug.cgi?id=671020", "name": "https://bugzilla.novell.com/show_bug.cgi?id=671020",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "https://bugzilla.novell.com/show_bug.cgi?id=702491", "name": "https://bugzilla.novell.com/show_bug.cgi?id=702491",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=702491" "url": "https://bugzilla.novell.com/show_bug.cgi?id=702491"
},
{
"name": "http://download.novell.com/Download?buildid=Cfw1tDezgbw~",
"refsource": "CONFIRM",
"url": "http://download.novell.com/Download?buildid=Cfw1tDezgbw~"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-4429", "ID": "CVE-2011-4429",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4585", "ID": "CVE-2011-4585",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://git.moodle.org/gw?p=moodle.git;a=commit;h=01dd64a8c8aa95f793accea371b2392e662663c5",
"refsource" : "CONFIRM",
"url" : "http://git.moodle.org/gw?p=moodle.git;a=commit;h=01dd64a8c8aa95f793accea371b2392e662663c5"
},
{
"name" : "http://moodle.org/mod/forum/discuss.php?d=191752",
"refsource" : "CONFIRM",
"url" : "http://moodle.org/mod/forum/discuss.php?d=191752"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "DSA-2421", "name": "DSA-2421",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2421" "url": "http://www.debian.org/security/2012/dsa-2421"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=191752",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=191752"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=01dd64a8c8aa95f793accea371b2392e662663c5",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=01dd64a8c8aa95f793accea371b2392e662663c5"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4923", "ID": "CVE-2011-4923",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,6 +57,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/10/27/8" "url": "http://www.openwall.com/lists/oss-security/2011/10/27/8"
}, },
{
"name": "backuppc-num-xss(71030)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71030"
},
{ {
"name": "[oss-security] 20120104 Re: CVE Request: Security issue in backuppc", "name": "[oss-security] 20120104 Re: CVE Request: Security issue in backuppc",
"refsource": "MLIST", "refsource": "MLIST",
@ -76,11 +81,6 @@
"name": "46615", "name": "46615",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46615" "url": "http://secunia.com/advisories/46615"
},
{
"name" : "backuppc-num-xss(71030)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71030"
} }
] ]
} }

View File

@ -52,6 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "51089",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/51089"
},
{
"name": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/",
"refsource": "CONFIRM",
"url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
},
{
"name": "77778",
"refsource": "OSVDB",
"url": "http://osvdb.org/77778"
},
{
"name": "sentinel-unspecified-csrf(71857)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71857"
},
{ {
"name": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html", "name": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html",
"refsource": "MISC", "refsource": "MISC",
@ -62,30 +82,10 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://plugins.trac.wordpress.org/changeset?reponame=&new=475315@wordpress-sentinel&old=474998@wordpress-sentinel" "url": "http://plugins.trac.wordpress.org/changeset?reponame=&new=475315@wordpress-sentinel&old=474998@wordpress-sentinel"
}, },
{
"name" : "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/",
"refsource" : "CONFIRM",
"url" : "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
},
{
"name" : "51089",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/51089"
},
{
"name" : "77778",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/77778"
},
{ {
"name": "47020", "name": "47020",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47020" "url": "http://secunia.com/advisories/47020"
},
{
"name" : "sentinel-unspecified-csrf(71857)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71857"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-5370", "ID": "CVE-2011-5370",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-5372", "ID": "CVE-2011-5372",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2177", "ID": "CVE-2014-2177",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20141106 Cisco RV Series multiple vulnerabilities", "name": "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers",
"refsource" : "BUGTRAQ", "refsource": "CISCO",
"url" : "http://www.securityfocus.com/archive/1/533917/100/0/threaded" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv"
},
{
"name" : "20141106 Cisco RV Series multiple vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Nov/6"
}, },
{ {
"name": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html", "name": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html",
@ -68,19 +63,24 @@
"url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html"
}, },
{ {
"name" : "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers", "name": "cisco-cve20142177-command-exec(98497)",
"refsource" : "CISCO", "refsource": "XF",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98497"
},
{
"name": "20141106 Cisco RV Series multiple vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Nov/6"
},
{
"name": "20141106 Cisco RV Series multiple vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded"
}, },
{ {
"name": "1031171", "name": "1031171",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031171" "url": "http://www.securitytracker.com/id/1031171"
},
{
"name" : "cisco-cve20142177-command-exec(98497)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98497"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-2364", "ID": "CVE-2014-2364",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-2445", "ID": "CVE-2014-2445",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3576", "ID": "CVE-2014-3576",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,36 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20151106 [ANNOUNCE] CVE-2014-3576 - Apache ActiveMQ vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/536862/100/0/threaded"
},
{
"name" : "[dev] 20150721 About CVE-2014-3576",
"refsource" : "MLIST",
"url" : "http://activemq.2283324.n4.nabble.com/About-CVE-2014-3576-tp4699628.html"
},
{ {
"name": "http://packetstormsecurity.com/files/134274/Apache-ActiveMQ-5.10.1-Denial-Of-Service.html", "name": "http://packetstormsecurity.com/files/134274/Apache-ActiveMQ-5.10.1-Denial-Of-Service.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/134274/Apache-ActiveMQ-5.10.1-Denial-Of-Service.html" "url": "http://packetstormsecurity.com/files/134274/Apache-ActiveMQ-5.10.1-Denial-Of-Service.html"
}, },
{
"name" : "https://github.com/apache/activemq/commit/00921f2",
"refsource" : "CONFIRM",
"url" : "https://github.com/apache/activemq/commit/00921f2"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
}, },
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{ {
"name": "DSA-3330", "name": "DSA-3330",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -92,10 +72,30 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/76272" "url": "http://www.securityfocus.com/bid/76272"
}, },
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name": "[dev] 20150721 About CVE-2014-3576",
"refsource": "MLIST",
"url": "http://activemq.2283324.n4.nabble.com/About-CVE-2014-3576-tp4699628.html"
},
{ {
"name": "1033898", "name": "1033898",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033898" "url": "http://www.securitytracker.com/id/1033898"
},
{
"name": "https://github.com/apache/activemq/commit/00921f2",
"refsource": "CONFIRM",
"url": "https://github.com/apache/activemq/commit/00921f2"
},
{
"name": "20151106 [ANNOUNCE] CVE-2014-3576 - Apache ActiveMQ vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/536862/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-6507", "ID": "CVE-2014-6507",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", "name": "62073",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" "url": "http://secunia.com/advisories/62073"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
@ -63,9 +63,9 @@
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "name": "SUSE-SU-2015:0743",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
}, },
{ {
"name": "GLSA-201411-02", "name": "GLSA-201411-02",
@ -73,9 +73,9 @@
"url": "http://security.gentoo.org/glsa/glsa-201411-02.xml" "url": "http://security.gentoo.org/glsa/glsa-201411-02.xml"
}, },
{ {
"name" : "SUSE-SU-2015:0743", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
}, },
{ {
"name": "70550", "name": "70550",
@ -88,9 +88,9 @@
"url": "http://secunia.com/advisories/61579" "url": "http://secunia.com/advisories/61579"
}, },
{ {
"name" : "62073", "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/62073" "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6830", "ID": "CVE-2014-6830",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#712825",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/712825"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#712825", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/712825" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-7347", "ID": "CVE-2014-7347",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7466", "ID": "CVE-2014-7466",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#730161",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/730161"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#730161", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/730161" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-7615", "ID": "CVE-2014-7615",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-7730", "ID": "CVE-2014-7730",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2017-0480", "ID": "CVE-2017-0480",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -75,15 +75,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01" "url": "https://source.android.com/security/bulletin/2017-03-01"
}, },
{
"name" : "96958",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96958"
},
{ {
"name": "1037968", "name": "1037968",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037968" "url": "http://www.securitytracker.com/id/1037968"
},
{
"name": "96958",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96958"
} }
] ]
} }

View File

@ -58,24 +58,24 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html" "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html"
}, },
{ {
"name" : "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update", "name": "DSA-4321",
"refsource" : "MLIST", "refsource": "DEBIAN",
"url" : "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html" "url": "https://www.debian.org/security/2018/dsa-4321"
}, },
{ {
"name": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/53a4d841e90f", "name": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/53a4d841e90f",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/53a4d841e90f" "url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/53a4d841e90f"
}, },
{
"name": "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html"
},
{ {
"name": "https://sourceforge.net/p/graphicsmagick/bugs/473/", "name": "https://sourceforge.net/p/graphicsmagick/bugs/473/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://sourceforge.net/p/graphicsmagick/bugs/473/" "url": "https://sourceforge.net/p/graphicsmagick/bugs/473/"
},
{
"name" : "DSA-4321",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4321"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1845", "ID": "CVE-2017-1845",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1848", "ID": "CVE-2017-1848",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1973", "ID": "CVE-2017-1973",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-033-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-033-01"
},
{ {
"name": "95971", "name": "95971",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95971" "url": "http://www.securityfocus.com/bid/95971"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-033-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-033-01"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html", "name": "1037755",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html" "url": "http://www.securitytracker.com/id/1037755"
}, },
{ {
"name": "DSA-3775", "name": "DSA-3775",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3775" "url": "http://www.debian.org/security/2017/dsa-3775"
}, },
{
"name" : "GLSA-201702-30",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201702-30"
},
{ {
"name": "RHSA-2017:1871", "name": "RHSA-2017:1871",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1871" "url": "https://access.redhat.com/errata/RHSA-2017:1871"
}, },
{
"name": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html",
"refsource": "CONFIRM",
"url": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html"
},
{ {
"name": "95852", "name": "95852",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95852" "url": "http://www.securityfocus.com/bid/95852"
}, },
{ {
"name" : "1037755", "name": "GLSA-201702-30",
"refsource" : "SECTRACK", "refsource": "GENTOO",
"url" : "http://www.securitytracker.com/id/1037755" "url": "https://security.gentoo.org/glsa/201702-30"
} }
] ]
} }

View File

@ -58,15 +58,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00076&languageid=en-fr" "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00076&languageid=en-fr"
}, },
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesb3p03767en_us",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesb3p03767en_us"
},
{ {
"name": "https://support.lenovo.com/us/en/product_security/LEN-15184", "name": "https://support.lenovo.com/us/en/product_security/LEN-15184",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-15184" "url": "https://support.lenovo.com/us/en/product_security/LEN-15184"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesb3p03767en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesb3p03767en_us"
} }
] ]
} }