"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 21:32:34 +00:00
parent ca5333b894
commit 78984c676e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
48 changed files with 3301 additions and 3301 deletions

View File

@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061008 SQL injection - moodle",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/448023/100/0/threaded"
},
{ {
"name": "20061009 Re: [Full-disclosure] SQL injection - moodle", "name": "20061009 Re: [Full-disclosure] SQL injection - moodle",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/448018/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/448018/100/0/threaded"
}, },
{
"name" : "20061008 SQL injection - moodle",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=116034301209228&w=2"
},
{ {
"name": "http://cvs.moodle.com/blog/index.php?r1=1.18.2.2&r2=1.18.2.3", "name": "http://cvs.moodle.com/blog/index.php?r1=1.18.2.2&r2=1.18.2.3",
"refsource": "MISC", "refsource": "MISC",
"url": "http://cvs.moodle.com/blog/index.php?r1=1.18.2.2&r2=1.18.2.3" "url": "http://cvs.moodle.com/blog/index.php?r1=1.18.2.2&r2=1.18.2.3"
}, },
{ {
"name" : "20395", "name": "moodle-index-sql-injection(29377)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/20395" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29377"
},
{
"name" : "ADV-2006-3957",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3957"
}, },
{ {
"name": "22309", "name": "22309",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22309" "url": "http://secunia.com/advisories/22309"
}, },
{
"name": "ADV-2006-3957",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3957"
},
{
"name": "20061008 SQL injection - moodle",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=116034301209228&w=2"
},
{
"name": "20395",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20395"
},
{ {
"name": "1699", "name": "1699",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1699" "url": "http://securityreason.com/securityalert/1699"
}, },
{ {
"name" : "moodle-index-sql-injection(29377)", "name": "20061008 SQL injection - moodle",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29377" "url": "http://www.securityfocus.com/archive/1/448023/100/0/threaded"
} }
] ]
} }

View File

@ -52,21 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061112 infinicart [ multiples injection sql & xss (post) ]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/451322/100/0/threaded"
},
{
"name" : "20061206 Vendor dispute: infinicart (CVE-2006-5957)",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2006-December/001162.html"
},
{ {
"name": "21043", "name": "21043",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/21043" "url": "http://www.securityfocus.com/bid/21043"
}, },
{
"name": "20061112 infinicart [ multiples injection sql & xss (post) ]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/451322/100/0/threaded"
},
{ {
"name": "ADV-2006-4501", "name": "ADV-2006-4501",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -77,6 +72,11 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22865" "url": "http://secunia.com/advisories/22865"
}, },
{
"name": "20061206 Vendor dispute: infinicart (CVE-2006-5957)",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2006-December/001162.html"
},
{ {
"name": "1881", "name": "1881",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070606 FLEA-2007-0021-2: madwifi", "name": "USN-479-1",
"refsource" : "BUGTRAQ", "refsource": "UBUNTU",
"url" : "http://www.securityfocus.com/archive/1/470674/100/100/threaded" "url": "http://www.ubuntu.com/usn/usn-479-1"
},
{
"name" : "http://madwifi.org/ticket/1335",
"refsource" : "CONFIRM",
"url" : "http://madwifi.org/ticket/1335"
},
{
"name" : "http://madwifi.org/wiki/Security",
"refsource" : "CONFIRM",
"url" : "http://madwifi.org/wiki/Security"
}, },
{ {
"name": "GLSA-200706-04", "name": "GLSA-200706-04",
@ -73,19 +63,9 @@
"url": "http://security.gentoo.org/glsa/glsa-200706-04.xml" "url": "http://security.gentoo.org/glsa/glsa-200706-04.xml"
}, },
{ {
"name" : "MDKSA-2007:132", "name": "25339",
"refsource" : "MANDRIVA", "refsource": "SECUNIA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:132" "url": "http://secunia.com/advisories/25339"
},
{
"name" : "SUSE-SR:2007:014",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
},
{
"name" : "USN-479-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-479-1"
}, },
{ {
"name": "24114", "name": "24114",
@ -93,44 +73,64 @@
"url": "http://www.securityfocus.com/bid/24114" "url": "http://www.securityfocus.com/bid/24114"
}, },
{ {
"name" : "36635", "name": "26083",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36635"
},
{
"name" : "ADV-2007-1919",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1919"
},
{
"name" : "25339",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/25339" "url": "http://secunia.com/advisories/26083"
}, },
{ {
"name": "25622", "name": "25622",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25622" "url": "http://secunia.com/advisories/25622"
}, },
{
"name": "SUSE-SR:2007:014",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
},
{ {
"name": "25763", "name": "25763",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25763" "url": "http://secunia.com/advisories/25763"
}, },
{
"name": "MDKSA-2007:132",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:132"
},
{
"name": "http://madwifi.org/wiki/Security",
"refsource": "CONFIRM",
"url": "http://madwifi.org/wiki/Security"
},
{
"name": "36635",
"refsource": "OSVDB",
"url": "http://osvdb.org/36635"
},
{ {
"name": "25861", "name": "25861",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25861" "url": "http://secunia.com/advisories/25861"
}, },
{ {
"name" : "26083", "name": "ADV-2007-1919",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/26083" "url": "http://www.vupen.com/english/advisories/2007/1919"
},
{
"name": "20070606 FLEA-2007-0021-2: madwifi",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/470674/100/100/threaded"
}, },
{ {
"name": "madwifi-fastframe-dos(34455)", "name": "madwifi-fastframe-dos(34455)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34455" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34455"
},
{
"name": "http://madwifi.org/ticket/1335",
"refsource": "CONFIRM",
"url": "http://madwifi.org/ticket/1335"
} }
] ]
} }

View File

@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1018260",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018260"
},
{ {
"name": "20070618 ShAnKaR: Simle machines forum CAPTCHA bypass and PHP injection", "name": "20070618 ShAnKaR: Simle machines forum CAPTCHA bypass and PHP injection",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471641/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/471641/100/0/threaded"
}, },
{
"name": "smf-forummessage-code-execution(34908)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34908"
},
{ {
"name": "http://securityvulns.ru/Rdocument271.html", "name": "http://securityvulns.ru/Rdocument271.html",
"refsource": "MISC", "refsource": "MISC",
@ -66,16 +76,6 @@
"name": "40433", "name": "40433",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/40433" "url": "http://osvdb.org/40433"
},
{
"name" : "1018260",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1018260"
},
{
"name" : "smf-forummessage-code-execution(34908)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34908"
} }
] ]
} }

View File

@ -57,6 +57,16 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471933/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/471933/100/0/threaded"
}, },
{
"name": "oval:org.mitre.oval:def:14744",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14744"
},
{
"name": "38992",
"refsource": "OSVDB",
"url": "http://osvdb.org/38992"
},
{ {
"name": "http://www.isecpartners.com/advisories/2007-001-vlc.txt", "name": "http://www.isecpartners.com/advisories/2007-001-vlc.txt",
"refsource": "MISC", "refsource": "MISC",
@ -67,16 +77,6 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1332" "url": "http://www.debian.org/security/2007/dsa-1332"
}, },
{
"name" : "38992",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38992"
},
{
"name" : "oval:org.mitre.oval:def:14744",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14744"
},
{ {
"name": "25980", "name": "25980",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -52,36 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/473785/100/0/threaded"
},
{
"name" : "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064666.html"
},
{
"name" : "http://escarpment.net/exlibris.txt",
"refsource" : "MISC",
"url" : "http://escarpment.net/exlibris.txt"
},
{
"name" : "24978",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24978"
},
{ {
"name": "36877", "name": "36877",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/36877" "url": "http://osvdb.org/36877"
}, },
{
"name" : "26162",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26162"
},
{ {
"name": "2889", "name": "2889",
"refsource": "SREASON", "refsource": "SREASON",
@ -91,6 +66,31 @@
"name": "metalib-keywordsearch-xss(35431)", "name": "metalib-keywordsearch-xss(35431)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35431" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35431"
},
{
"name": "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064666.html"
},
{
"name": "26162",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26162"
},
{
"name": "24978",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24978"
},
{
"name": "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/473785/100/0/threaded"
},
{
"name": "http://escarpment.net/exlibris.txt",
"refsource": "MISC",
"url": "http://escarpment.net/exlibris.txt"
} }
] ]
} }

View File

@ -52,30 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.packetstormsecurity.org/0711-exploits/ossigeno22-rfi.txt",
"refsource" : "MISC",
"url" : "http://www.packetstormsecurity.org/0711-exploits/ossigeno22-rfi.txt"
},
{ {
"name": "26654", "name": "26654",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26654" "url": "http://www.securityfocus.com/bid/26654"
}, },
{ {
"name" : "44312", "name": "http://www.packetstormsecurity.org/0711-exploits/ossigeno22-rfi.txt",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://osvdb.org/44312" "url": "http://www.packetstormsecurity.org/0711-exploits/ossigeno22-rfi.txt"
},
{
"name" : "44313",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/44313"
},
{
"name" : "44314",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/44314"
}, },
{ {
"name": "44315", "name": "44315",
@ -87,10 +72,25 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/44316" "url": "http://osvdb.org/44316"
}, },
{
"name": "44314",
"refsource": "OSVDB",
"url": "http://osvdb.org/44314"
},
{ {
"name": "44317", "name": "44317",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/44317" "url": "http://osvdb.org/44317"
},
{
"name": "44313",
"refsource": "OSVDB",
"url": "http://osvdb.org/44313"
},
{
"name": "44312",
"refsource": "OSVDB",
"url": "http://osvdb.org/44312"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "30037",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30037"
},
{
"name": "1019955",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019955"
},
{ {
"name": "20080430 Akamai Download Manager Arbitrary Program Execution Vulnerability", "name": "20080430 Akamai Download Manager Arbitrary Program Execution Vulnerability",
"refsource": "IDEFENSE", "refsource": "IDEFENSE",
@ -62,25 +72,15 @@
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-April/061923.html" "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-April/061923.html"
}, },
{
"name" : "28993",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28993"
},
{ {
"name": "ADV-2008-1408", "name": "ADV-2008-1408",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1408/references" "url": "http://www.vupen.com/english/advisories/2008/1408/references"
}, },
{ {
"name" : "1019955", "name": "28993",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id?1019955" "url": "http://www.securityfocus.com/bid/28993"
},
{
"name" : "30037",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30037"
}, },
{ {
"name": "akamai-download-code-execution(42117)", "name": "akamai-download-code-execution(42117)",

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://jira.jboss.com/jira/browse/JBSEAM-2084",
"refsource" : "CONFIRM",
"url" : "http://jira.jboss.com/jira/browse/JBSEAM-2084"
},
{ {
"name": "http://sourceforge.net/project/shownotes.php?release_id=549490&group_id=22866", "name": "http://sourceforge.net/project/shownotes.php?release_id=549490&group_id=22866",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=549490&group_id=22866" "url": "http://sourceforge.net/project/shownotes.php?release_id=549490&group_id=22866"
}, },
{
"name" : "RHSA-2008:0158",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0158.html"
},
{
"name" : "RHSA-2008:0151",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0151.html"
},
{ {
"name": "RHSA-2008:0213", "name": "RHSA-2008:0213",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0213.html" "url": "http://www.redhat.com/support/errata/RHSA-2008-0213.html"
}, },
{
"name": "RHSA-2008:0151",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0151.html"
},
{
"name": "http://jira.jboss.com/jira/browse/JBSEAM-2084",
"refsource": "CONFIRM",
"url": "http://jira.jboss.com/jira/browse/JBSEAM-2084"
},
{ {
"name": "26850", "name": "26850",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26850" "url": "http://www.securityfocus.com/bid/26850"
}, },
{
"name": "42631",
"refsource": "OSVDB",
"url": "http://osvdb.org/42631"
},
{ {
"name": "ADV-2007-4215", "name": "ADV-2007-4215",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4215" "url": "http://www.vupen.com/english/advisories/2007/4215"
}, },
{ {
"name" : "42631", "name": "RHSA-2008:0158",
"refsource" : "OSVDB", "refsource": "REDHAT",
"url" : "http://osvdb.org/42631" "url": "http://www.redhat.com/support/errata/RHSA-2008-0158.html"
}, },
{ {
"name": "28077", "name": "28077",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/",
"refsource" : "MISC",
"url" : "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/"
},
{ {
"name": "http://svnweb.freebsd.org/base?view=revision&revision=167872", "name": "http://svnweb.freebsd.org/base?view=revision&revision=167872",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://svnweb.freebsd.org/base?view=revision&revision=167872" "url": "http://svnweb.freebsd.org/base?view=revision&revision=167872"
},
{
"name": "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/",
"refsource": "MISC",
"url": "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/"
} }
] ]
} }

View File

@ -58,24 +58,9 @@
"url": "http://www.mozilla.org/security/announce/2010/mfsa2010-24.html" "url": "http://www.mozilla.org/security/announce/2010/mfsa2010-24.html"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=490790", "name": "39397",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=490790" "url": "http://secunia.com/advisories/39397"
},
{
"name" : "http://support.avaya.com/css/P8/documents/100091069",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100091069"
},
{
"name" : "MDVSA-2010:070",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:070"
},
{
"name" : "RHSA-2010:0500",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0500.html"
}, },
{ {
"name": "RHSA-2010:0501", "name": "RHSA-2010:0501",
@ -83,34 +68,49 @@
"url": "http://www.redhat.com/support/errata/RHSA-2010-0501.html" "url": "http://www.redhat.com/support/errata/RHSA-2010-0501.html"
}, },
{ {
"name" : "SUSE-SR:2010:013", "name": "ADV-2010-1557",
"refsource" : "SUSE", "refsource": "VUPEN",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" "url": "http://www.vupen.com/english/advisories/2010/1557"
},
{
"name" : "USN-921-1",
"refsource" : "UBUNTU",
"url" : "http://ubuntu.com/usn/usn-921-1"
}, },
{ {
"name": "39479", "name": "39479",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/39479" "url": "http://www.securityfocus.com/bid/39479"
}, },
{
"name": "USN-921-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-921-1"
},
{ {
"name": "oval:org.mitre.oval:def:7618", "name": "oval:org.mitre.oval:def:7618",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7618" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7618"
}, },
{ {
"name" : "oval:org.mitre.oval:def:9375", "name": "SUSE-SR:2010:013",
"refsource" : "OVAL", "refsource": "SUSE",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9375" "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
}, },
{ {
"name" : "39397", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=490790",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/39397" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=490790"
},
{
"name": "RHSA-2010:0500",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0500.html"
},
{
"name": "MDVSA-2010:070",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:070"
},
{
"name": "firefox-xmldocumentload-weak-security(57396)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57396"
}, },
{ {
"name": "ADV-2010-0748", "name": "ADV-2010-0748",
@ -123,14 +123,14 @@
"url": "http://www.vupen.com/english/advisories/2010/0849" "url": "http://www.vupen.com/english/advisories/2010/0849"
}, },
{ {
"name" : "ADV-2010-1557", "name": "oval:org.mitre.oval:def:9375",
"refsource" : "VUPEN", "refsource": "OVAL",
"url" : "http://www.vupen.com/english/advisories/2010/1557" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9375"
}, },
{ {
"name" : "firefox-xmldocumentload-weak-security(57396)", "name": "http://support.avaya.com/css/P8/documents/100091069",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57396" "url": "http://support.avaya.com/css/P8/documents/100091069"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-0516", "ID": "CVE-2010-0516",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "oval:org.mitre.oval:def:7062",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7062"
},
{ {
"name": "20100402 ZDI-10-040: Apple QuickTime RLE Bit Depth Remote Code Execution Vulnerability", "name": "20100402 ZDI-10-040: Apple QuickTime RLE Bit Depth Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/510513/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/510513/100/0/threaded"
}, },
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-040",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-040"
},
{
"name" : "http://support.apple.com/kb/HT4077",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4077"
},
{ {
"name": "APPLE-SA-2010-03-29-1", "name": "APPLE-SA-2010-03-29-1",
"refsource": "APPLE", "refsource": "APPLE",
@ -78,9 +73,14 @@
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00002.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:7062", "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-040",
"refsource" : "OVAL", "refsource": "MISC",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7062" "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-040"
},
{
"name": "http://support.apple.com/kb/HT4077",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4077"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "38976",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38976"
},
{ {
"name": "http://packetstormsecurity.org/1003-exploits/joomlackforms-lfisql.txt", "name": "http://packetstormsecurity.org/1003-exploits/joomlackforms-lfisql.txt",
"refsource": "MISC", "refsource": "MISC",
@ -62,25 +67,20 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11785" "url": "http://www.exploit-db.com/exploits/11785"
}, },
{
"name" : "38785",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/38785"
},
{ {
"name": "63032", "name": "63032",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/63032" "url": "http://www.osvdb.org/63032"
}, },
{
"name" : "38976",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38976"
},
{ {
"name": "ckforms-index-sql-injection(56988)", "name": "ckforms-index-sql-injection(56988)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56988" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56988"
},
{
"name": "38785",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38785"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-1399", "ID": "CVE-2010-1399",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT4196",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4196"
},
{ {
"name": "http://support.apple.com/kb/HT4220", "name": "http://support.apple.com/kb/HT4220",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4220" "url": "http://support.apple.com/kb/HT4220"
}, },
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{ {
"name": "http://support.apple.com/kb/HT4225", "name": "http://support.apple.com/kb/HT4225",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -73,64 +78,59 @@
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html"
}, },
{ {
"name" : "APPLE-SA-2010-06-16-1", "name": "40196",
"refsource" : "APPLE", "refsource": "SECUNIA",
"url" : "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html" "url": "http://secunia.com/advisories/40196"
},
{
"name" : "APPLE-SA-2010-06-21-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
},
{
"name" : "SUSE-SR:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name" : "40620",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40620"
},
{
"name" : "oval:org.mitre.oval:def:6709",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6709"
},
{
"name" : "1024067",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1024067"
}, },
{ {
"name": "40105", "name": "40105",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40105" "url": "http://secunia.com/advisories/40105"
}, },
{
"name" : "40196",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40196"
},
{
"name" : "43068",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43068"
},
{ {
"name": "ADV-2010-1373", "name": "ADV-2010-1373",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1373" "url": "http://www.vupen.com/english/advisories/2010/1373"
}, },
{
"name": "oval:org.mitre.oval:def:6709",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6709"
},
{
"name": "APPLE-SA-2010-06-16-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{ {
"name": "ADV-2010-1512", "name": "ADV-2010-1512",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1512" "url": "http://www.vupen.com/english/advisories/2010/1512"
}, },
{ {
"name" : "ADV-2011-0212", "name": "40620",
"refsource" : "VUPEN", "refsource": "BID",
"url" : "http://www.vupen.com/english/advisories/2011/0212" "url": "http://www.securityfocus.com/bid/40620"
},
{
"name": "1024067",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024067"
},
{
"name": "http://support.apple.com/kb/HT4196",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4196"
},
{
"name": "APPLE-SA-2010-06-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2010-1509", "ID": "CVE-2010-1509",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20100512 Secunia Research: IrfanView PSD Image Parsing Sign-Extension Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/511274/100/0/threaded"
},
{ {
"name": "http://secunia.com/secunia_research/2010-41", "name": "http://secunia.com/secunia_research/2010-41",
"refsource": "MISC", "refsource": "MISC",
"url": "http://secunia.com/secunia_research/2010-41" "url": "http://secunia.com/secunia_research/2010-41"
}, },
{ {
"name" : "http://irfanview.com/main_history.htm", "name": "20100512 Secunia Research: IrfanView PSD Image Parsing Sign-Extension Vulnerability",
"refsource" : "CONFIRM", "refsource": "BUGTRAQ",
"url" : "http://irfanview.com/main_history.htm" "url": "http://www.securityfocus.com/archive/1/511274/100/0/threaded"
}, },
{ {
"name" : "40104", "name": "39036",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/40104" "url": "http://secunia.com/advisories/39036"
}, },
{ {
"name": "64627", "name": "64627",
@ -83,9 +78,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6705" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6705"
}, },
{ {
"name" : "39036", "name": "40104",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/39036" "url": "http://www.securityfocus.com/bid/40104"
},
{
"name": "http://irfanview.com/main_history.htm",
"refsource": "CONFIRM",
"url": "http://irfanview.com/main_history.htm"
}, },
{ {
"name": "irfanview-psd-bo(58548)", "name": "irfanview-psd-bo(58548)",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0019", "ID": "CVE-2014-0019",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,41 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20140128 Socat security advisory 5 - PROXY-CONNECT address overflow",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q1/159"
},
{
"name" : "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt",
"refsource" : "MISC",
"url" : "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt"
},
{
"name" : "http://www.dest-unreach.org/socat",
"refsource" : "CONFIRM",
"url" : "http://www.dest-unreach.org/socat"
},
{ {
"name": "FEDORA-2014-1795", "name": "FEDORA-2014-1795",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html"
}, },
{
"name" : "FEDORA-2014-1811",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html"
},
{ {
"name": "MDVSA-2014:033", "name": "MDVSA-2014:033",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033"
}, },
{
"name" : "openSUSE-SU-2015:0760",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html"
},
{ {
"name": "65201", "name": "65201",
"refsource": "BID", "refsource": "BID",
@ -96,6 +71,31 @@
"name": "102612", "name": "102612",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/102612" "url": "http://osvdb.org/102612"
},
{
"name": "[oss-security] 20140128 Socat security advisory 5 - PROXY-CONNECT address overflow",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q1/159"
},
{
"name": "http://www.dest-unreach.org/socat",
"refsource": "CONFIRM",
"url": "http://www.dest-unreach.org/socat"
},
{
"name": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt",
"refsource": "MISC",
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt"
},
{
"name": "openSUSE-SU-2015:0760",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html"
},
{
"name": "FEDORA-2014-1811",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0129", "ID": "CVE-2014-0129",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-0382", "ID": "CVE-2014-0382",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "name": "56484",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" "url": "http://secunia.com/advisories/56484"
},
{
"name": "56535",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56535"
},
{
"name": "RHSA-2014:0030",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
},
{
"name": "56485",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56485"
},
{
"name": "oracle-cpujan2014-cve20140382(90355)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90355"
},
{
"name": "SSRT101454",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
}, },
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
@ -68,20 +93,20 @@
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2" "url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
}, },
{ {
"name" : "SSRT101454", "name": "1029608",
"refsource" : "HP", "refsource": "SECTRACK",
"url" : "http://marc.info/?l=bugtraq&m=139402697611681&w=2" "url": "http://www.securitytracker.com/id/1029608"
},
{
"name" : "RHSA-2014:0030",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
}, },
{ {
"name": "64758", "name": "64758",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758" "url": "http://www.securityfocus.com/bid/64758"
}, },
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{ {
"name": "64936", "name": "64936",
"refsource": "BID", "refsource": "BID",
@ -91,31 +116,6 @@
"name": "102026", "name": "102026",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/102026" "url": "http://osvdb.org/102026"
},
{
"name" : "1029608",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029608"
},
{
"name" : "56484",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56484"
},
{
"name" : "56485",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56485"
},
{
"name" : "56535",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56535"
},
{
"name" : "oracle-cpujan2014-cve20140382(90355)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90355"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2014-0512", "ID": "CVE-2014-0512",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://twitter.com/thezdi/statuses/443827076580122624",
"refsource" : "MISC",
"url" : "http://twitter.com/thezdi/statuses/443827076580122624"
},
{ {
"name": "http://www.pwn2own.com/2014/03/pwn2own-results-for-wednesday-day-one/", "name": "http://www.pwn2own.com/2014/03/pwn2own-results-for-wednesday-day-one/",
"refsource": "MISC", "refsource": "MISC",
@ -66,6 +61,11 @@
"name": "http://helpx.adobe.com/security/products/reader/apsb14-15.html", "name": "http://helpx.adobe.com/security/products/reader/apsb14-15.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/reader/apsb14-15.html" "url": "http://helpx.adobe.com/security/products/reader/apsb14-15.html"
},
{
"name": "http://twitter.com/thezdi/statuses/443827076580122624",
"refsource": "MISC",
"url": "http://twitter.com/thezdi/statuses/443827076580122624"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-0682", "ID": "CVE-2014-0682",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=32618",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=32618"
},
{
"name" : "20140128 Cisco WebEx Meetings Server Unauthorized Meeting Actions Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0682"
},
{ {
"name": "65198", "name": "65198",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/65198" "url": "http://www.securityfocus.com/bid/65198"
}, },
{
"name" : "102590",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/102590"
},
{ {
"name": "1029700", "name": "1029700",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029700" "url": "http://www.securitytracker.com/id/1029700"
}, },
{
"name": "102590",
"refsource": "OSVDB",
"url": "http://osvdb.org/102590"
},
{
"name": "20140128 Cisco WebEx Meetings Server Unauthorized Meeting Actions Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0682"
},
{ {
"name": "56668", "name": "56668",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56668" "url": "http://secunia.com/advisories/56668"
},
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32618",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32618"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20140207 Re: Xen Security Advisory 84 - integer overflow in several XSM/Flask hypercalls", "name": "SUSE-SU-2014:0373",
"refsource" : "MLIST", "refsource": "SUSE",
"url" : "http://www.openwall.com/lists/oss-security/2014/02/07/4" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html"
},
{
"name" : "[oss-security] 20140207 Re: Xen Security Advisory 84 - integer overflow in several XSM/Flask hypercalls",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/02/07/12"
}, },
{ {
"name": "[oss-security] 20140210 Xen Security Advisory 84 (CVE-2014-1891,CVE-2014-1892,CVE-2014-1893,CVE-2014-1894) - integer overflow in several XSM/Flask hypercalls", "name": "[oss-security] 20140210 Xen Security Advisory 84 (CVE-2014-1891,CVE-2014-1892,CVE-2014-1893,CVE-2014-1894) - integer overflow in several XSM/Flask hypercalls",
@ -72,6 +67,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-84.html" "url": "http://xenbits.xen.org/xsa/advisory-84.html"
}, },
{
"name": "[oss-security] 20140207 Re: Xen Security Advisory 84 - integer overflow in several XSM/Flask hypercalls",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/02/07/4"
},
{ {
"name": "GLSA-201407-03", "name": "GLSA-201407-03",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -82,15 +82,15 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html"
}, },
{
"name" : "SUSE-SU-2014:0373",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html"
},
{ {
"name": "SUSE-SU-2014:0446", "name": "SUSE-SU-2014:0446",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name": "[oss-security] 20140207 Re: Xen Security Advisory 84 - integer overflow in several XSM/Flask hypercalls",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/02/07/12"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-4482", "ID": "CVE-2014-4482",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "34594",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/34594"
},
{ {
"name": "20140831 [The ManageOwnage Series, part III]: Multiple vulnerabilities / RCE in ManageEngine Desktop Central", "name": "20140831 [The ManageOwnage Series, part III]: Multiple vulnerabilities / RCE in ManageEngine Desktop Central",
"refsource": "FULLDISC", "refsource": "FULLDISC",
@ -71,6 +66,11 @@
"name": "110643", "name": "110643",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/110643" "url": "http://osvdb.org/show/osvdb/110643"
},
{
"name": "34594",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/34594"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5913", "ID": "CVE-2014-5913",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#972337", "name": "VU#972337",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/972337" "url": "http://www.kb.cert.org/vuls/id/972337"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20170101 Re: Re: libtiff: multiple heap-based buffer overflow",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/01/01/12"
},
{
"name" : "[oss-security] 20170101 Re: libtiff: multiple heap-based buffer overflow",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/01/01/10"
},
{ {
"name": "https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/", "name": "https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/",
"refsource": "MISC", "refsource": "MISC",
@ -72,20 +62,30 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2610" "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2610"
}, },
{
"name": "[oss-security] 20170101 Re: Re: libtiff: multiple heap-based buffer overflow",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/01/01/12"
},
{ {
"name": "https://github.com/vadz/libtiff/commit/787c0ee906430b772f33ca50b97b8b5ca070faec", "name": "https://github.com/vadz/libtiff/commit/787c0ee906430b772f33ca50b97b8b5ca070faec",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/vadz/libtiff/commit/787c0ee906430b772f33ca50b97b8b5ca070faec" "url": "https://github.com/vadz/libtiff/commit/787c0ee906430b772f33ca50b97b8b5ca070faec"
}, },
{
"name" : "DSA-3762",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3762"
},
{ {
"name": "95215", "name": "95215",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95215" "url": "http://www.securityfocus.com/bid/95215"
},
{
"name": "[oss-security] 20170101 Re: libtiff: multiple heap-based buffer overflow",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/01/01/10"
},
{
"name": "DSA-3762",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3762"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-3294", "ID": "CVE-2016-3294",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS16-105", "name": "1036789",
"refsource" : "MS", "refsource": "SECTRACK",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-105" "url": "http://www.securitytracker.com/id/1036789"
}, },
{ {
"name": "92789", "name": "92789",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/92789" "url": "http://www.securityfocus.com/bid/92789"
}, },
{ {
"name" : "1036789", "name": "MS16-105",
"refsource" : "SECTRACK", "refsource": "MS",
"url" : "http://www.securitytracker.com/id/1036789" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-105"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-3300", "ID": "CVE-2016-3300",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS16-101",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-101"
},
{ {
"name": "92296", "name": "92296",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92296" "url": "http://www.securityfocus.com/bid/92296"
}, },
{
"name": "MS16-101",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-101"
},
{ {
"name": "1036576", "name": "1036576",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-3870", "ID": "CVE-2016-3870",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-09-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-09-01.html"
},
{ {
"name": "https://android.googlesource.com/platform/frameworks/av/+/1e9801783770917728b7edbdeff3d0ec09c621ac", "name": "https://android.googlesource.com/platform/frameworks/av/+/1e9801783770917728b7edbdeff3d0ec09c621ac",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/1e9801783770917728b7edbdeff3d0ec09c621ac" "url": "https://android.googlesource.com/platform/frameworks/av/+/1e9801783770917728b7edbdeff3d0ec09c621ac"
}, },
{
"name": "http://source.android.com/security/bulletin/2016-09-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-09-01.html"
},
{ {
"name": "1036763", "name": "1036763",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-16-320-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-16-320-01"
},
{ {
"name": "94344", "name": "94344",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94344" "url": "http://www.securityfocus.com/bid/94344"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-320-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-320-01"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-8438", "ID": "CVE-2016-8438",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,25 +53,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1281071",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1281071"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2016-89/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2016-89/"
},
{ {
"name": "94337", "name": "94337",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94337" "url": "http://www.securityfocus.com/bid/94337"
}, },
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1281071",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1281071"
},
{ {
"name": "1037298", "name": "1037298",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037298" "url": "http://www.securitytracker.com/id/1037298"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2016-89/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2016-89/"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9232", "ID": "CVE-2016-9232",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "openSUSE-SU-2016:3035",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html"
},
{
"name": "GLSA-201701-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"name": "94420",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94420"
},
{ {
"name": "[oss-security] 20161118 Re: CVE-2016-9297 LibTIFF regression", "name": "[oss-security] 20161118 Re: CVE-2016-9297 LibTIFF regression",
"refsource": "MLIST", "refsource": "MLIST",
@ -66,21 +81,6 @@
"name": "DSA-3762", "name": "DSA-3762",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3762" "url": "http://www.debian.org/security/2017/dsa-3762"
},
{
"name" : "GLSA-201701-16",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-16"
},
{
"name" : "openSUSE-SU-2016:3035",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html"
},
{
"name" : "94420",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94420"
} }
] ]
} }

View File

@ -52,36 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960",
"refsource" : "MISC",
"url" : "https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960"
},
{ {
"name": "https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013", "name": "https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013" "url": "https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013"
}, },
{ {
"name" : "https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1", "name": "https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1" "url": "https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a"
}, },
{ {
"name" : "https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14", "name": "https://nextcloud.com/security/advisory/?id=nc-sa-2016-010",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14" "url": "https://nextcloud.com/security/advisory/?id=nc-sa-2016-010"
}, },
{ {
"name": "https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071", "name": "https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071" "url": "https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071"
}, },
{
"name" : "https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a",
"refsource" : "MISC",
"url" : "https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a"
},
{ {
"name": "https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d", "name": "https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d",
"refsource": "MISC", "refsource": "MISC",
@ -92,15 +82,25 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/owncloud/core/commit/e7acbce27fa0ef1c6fe216ca67c72d86484919a4" "url": "https://github.com/owncloud/core/commit/e7acbce27fa0ef1c6fe216ca67c72d86484919a4"
}, },
{
"name": "https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14",
"refsource": "MISC",
"url": "https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14"
},
{ {
"name": "https://hackerone.com/reports/154827", "name": "https://hackerone.com/reports/154827",
"refsource": "MISC", "refsource": "MISC",
"url": "https://hackerone.com/reports/154827" "url": "https://hackerone.com/reports/154827"
}, },
{ {
"name" : "https://nextcloud.com/security/advisory/?id=nc-sa-2016-010", "name": "https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://nextcloud.com/security/advisory/?id=nc-sa-2016-010" "url": "https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960"
},
{
"name": "https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1",
"refsource": "MISC",
"url": "https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1"
}, },
{ {
"name": "https://owncloud.org/security/advisory/?id=oc-sa-2016-020", "name": "https://owncloud.org/security/advisory/?id=oc-sa-2016-020",

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{ {
"name": "106580", "name": "106580",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106580" "url": "http://www.securityfocus.com/bid/106580"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
} }
] ]
} }