"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:15:19 +00:00
parent 5ba87c002b
commit 7c773ee80f
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3987 additions and 3987 deletions

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20001204 Multiple Vulnerabilities in CBOS",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/CBOS-multiple.shtml"
},
{
"name": "cisco-cbos-invalid-login(5628)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5628"
},
{
"name": "20001204 Multiple Vulnerabilities in CBOS",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/CBOS-multiple.shtml"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "HPSBUX0102-143",
"refsource" : "HP",
"url" : "http://archives.neohapsis.com/archives/hp/2001-q1/0069.html"
},
{
"name": "6033",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/6033"
},
{
"name": "HPSBUX0102-143",
"refsource": "HP",
"url": "http://archives.neohapsis.com/archives/hp/2001-q1/0069.html"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20010214 Security hole in kicq",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0276.html"
"name": "kicq-execute-commands(6112)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6112"
},
{
"name": "20010303 Re: Security hole in kicq",
@ -63,9 +63,9 @@
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0536.html"
},
{
"name" : "kicq-execute-commands(6112)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6112"
"name": "20010214 Security hole in kicq",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0276.html"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20011017 Mac OS X setuid root security hole",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-10/0121.html"
"name": "M-007",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/m-007.shtml"
},
{
"name": "20011017 Re: Mac OS X setuid root security hole",
@ -68,9 +68,9 @@
"url": "http://www.kb.cert.org/vuls/id/945747"
},
{
"name" : "M-007",
"refsource" : "CIAC",
"url" : "http://www.ciac.org/ciac/bulletins/m-007.shtml"
"name": "20011017 Mac OS X setuid root security hole",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-10/0121.html"
},
{
"name": "3439",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-2162",
"STATE": "PUBLIC"
},
@ -52,55 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806&forum_id=7890",
"refsource" : "CONFIRM",
"url" : "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806&forum_id=7890"
},
{
"name" : "http://www.nagios.org/development/changelog.php",
"refsource" : "CONFIRM",
"url" : "http://www.nagios.org/development/changelog.php"
},
{
"name" : "DSA-1072",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1072"
},
{
"name": "GLSA-200605-07",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml"
},
{
"name" : "SUSE-SR:2006:011",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_05_19.html"
},
{
"name": "USN-282-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/282-1/"
},
{
"name" : "17879",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17879"
"name": "DSA-1072",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1072"
},
{
"name": "SUSE-SR:2006:011",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_05_19.html"
},
{
"name": "http://www.nagios.org/development/changelog.php",
"refsource": "CONFIRM",
"url": "http://www.nagios.org/development/changelog.php"
},
{
"name": "ADV-2006-1662",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1662"
},
{
"name": "19998",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19998"
},
{
"name": "19991",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19991"
},
{
"name" : "19998",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19998"
"name": "nagios-multiple-scripts-bo(26253)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26253"
},
{
"name": "20013",
@ -112,15 +107,20 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20215"
},
{
"name": "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806&forum_id=7890",
"refsource": "CONFIRM",
"url": "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806&forum_id=7890"
},
{
"name": "17879",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17879"
},
{
"name": "20247",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20247"
},
{
"name" : "nagios-multiple-scripts-bo(26253)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26253"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-2309",
"STATE": "PUBLIC"
},
@ -52,31 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060531 Secunia Research: Eserv/3 IMAP and HTTP Server MultipleVulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/435415/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-37/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2006-37/advisory/"
},
{
"name" : "http://www.eserv.ru/ru/news/news_detail.php?ID=235",
"refsource" : "CONFIRM",
"url" : "http://www.eserv.ru/ru/news/news_detail.php?ID=235"
},
{
"name" : "18179",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18179"
},
{
"name" : "ADV-2006-2066",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2066"
},
{
"name": "20059",
"refsource": "SECUNIA",
@ -87,10 +62,35 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1006"
},
{
"name": "http://secunia.com/secunia_research/2006-37/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-37/advisory/"
},
{
"name": "eserv-file-extension-source-code-disclosure(26741)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26741"
},
{
"name": "ADV-2006-2066",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2066"
},
{
"name": "18179",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18179"
},
{
"name": "20060531 Secunia Research: Eserv/3 IMAP and HTTP Server MultipleVulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435415/100/0/threaded"
},
{
"name": "http://www.eserv.ru/ru/news/news_detail.php?ID=235",
"refsource": "CONFIRM",
"url": "http://www.eserv.ru/ru/news/news_detail.php?ID=235"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=337830",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=337830"
},
{
"name" : "DSA-1062",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1062"
},
{
"name": "MDKSA-2006:089",
"refsource": "MANDRIVA",
@ -76,6 +66,16 @@
"name": "ADV-2006-1862",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1862"
},
{
"name": "DSA-1062",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1062"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=337830",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=337830"
}
]
}

View File

@ -52,11 +52,36 @@
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:5702",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5702"
},
{
"name": "21140",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21140"
},
{
"name": "20459",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20459"
},
{
"name": "1016135",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016135"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-109.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-109.htm"
},
{
"name": "18057",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18057"
},
{
"name": "HPSBUX02120",
"refsource": "HP",
@ -68,44 +93,19 @@
"url": "http://www.securityfocus.com/archive/1/434717/100/0/threaded"
},
{
"name" : "18057",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18057"
},
{
"name" : "oval:org.mitre.oval:def:5702",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5702"
"name": "hp-kernel-dos(26593)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26593"
},
{
"name": "ADV-2006-1913",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1913"
},
{
"name" : "1016135",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016135"
},
{
"name": "20227",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20227"
},
{
"name" : "20459",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20459"
},
{
"name" : "21140",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21140"
},
{
"name" : "hp-kernel-dos(26593)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26593"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "7352",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7352"
},
{
"name": "33009",
"refsource": "SECUNIA",
@ -71,6 +66,11 @@
"name": "merlix-teamworx-information-disclosure(47125)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47125"
},
{
"name": "7352",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7352"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "7436",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7436"
},
{
"name" : "33134",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33134"
},
{
"name": "4931",
"refsource": "SREASON",
@ -71,6 +61,16 @@
"name": "aspired2blog-blog-info-disclosure(47294)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47294"
},
{
"name": "7436",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7436"
},
{
"name": "33134",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33134"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20081211 facto Database Disclosure",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/499125/100/0/threaded"
},
{
"name": "4934",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4934"
},
{
"name": "20081211 facto Database Disclosure",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499125/100/0/threaded"
},
{
"name": "facto-facto-information-disclosure(47278)",
"refsource": "XF",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "47771",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47771"
},
{
"name": "http://www.vupen.com/demos/VUPEN_Pwning_Chrome.php",
"refsource": "MISC",
@ -62,11 +67,6 @@
"refsource": "MISC",
"url": "http://www.youtube.com/watch?v=c8cQ0yU89sk"
},
{
"name" : "47771",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/47771"
},
{
"name": "oval:org.mitre.oval:def:14099",
"refsource": "OVAL",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-2332",
"STATE": "PUBLIC"
},
@ -52,6 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "72790",
"refsource": "OSVDB",
"url": "http://osvdb.org/72790"
},
{
"name": "chrome-v8-security-bypass(67903)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67903"
},
{
"name": "44829",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44829"
},
{
"name": "oval:org.mitre.oval:def:14242",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14242"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=83275",
"refsource": "CONFIRM",
@ -66,26 +86,6 @@
"name": "48129",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48129"
},
{
"name" : "72790",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/72790"
},
{
"name" : "oval:org.mitre.oval:def:14242",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14242"
},
{
"name" : "44829",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44829"
},
{
"name" : "chrome-v8-security-bypass(67903)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67903"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-2795",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=87339",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=87339"
},
{
"name" : "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html"
},
{
"name": "74245",
"refsource": "OSVDB",
@ -72,6 +62,16 @@
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14653"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=87339",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=87339"
},
{
"name": "google-chrome-function-info-disclosure(68957)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2939",
"STATE": "PUBLIC"
},
@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110818 CVE request: heap overflow in perl while decoding Unicode string",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/08/18/8"
},
{
"name" : "[oss-security] 20110819 Re: CVE request: heap overflow in perl while decoding Unicode string",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/08/19/17"
},
{
"name" : "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5",
"refsource" : "CONFIRM",
"url" : "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5"
},
{
"name" : "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_(CVE-2011-2939)",
"refsource" : "CONFIRM",
"url" : "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_(CVE-2011-2939)"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=731246",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=731246"
"name": "46989",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46989"
},
{
"name": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod",
@ -83,14 +63,9 @@
"url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
},
{
"name" : "MDVSA-2012:008",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008"
},
{
"name" : "RHSA-2011:1424",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1424.html"
"name": "55314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55314"
},
{
"name": "USN-1643-1",
@ -103,14 +78,14 @@
"url": "http://www.securityfocus.com/bid/49858"
},
{
"name" : "46989",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46989"
"name": "[oss-security] 20110818 CVE request: heap overflow in perl while decoding Unicode string",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/18/8"
},
{
"name" : "51457",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51457"
"name": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5",
"refsource": "CONFIRM",
"url": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5"
},
{
"name": "46172",
@ -118,9 +93,34 @@
"url": "http://secunia.com/advisories/46172"
},
{
"name" : "55314",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=731246",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731246"
},
{
"name": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_(CVE-2011-2939)",
"refsource": "CONFIRM",
"url": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_(CVE-2011-2939)"
},
{
"name": "MDVSA-2012:008",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008"
},
{
"name": "RHSA-2011:1424",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1424.html"
},
{
"name": "[oss-security] 20110819 Re: CVE request: heap overflow in perl while decoding Unicode string",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/19/17"
},
{
"name": "51457",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/55314"
"url": "http://secunia.com/advisories/51457"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2011/mfsa2011-29.html",
"name": "oval:org.mitre.oval:def:14458",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14458"
},
{
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-33.html",
"refsource": "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2011/mfsa2011-29.html"
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-33.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=664983",
@ -67,20 +72,15 @@
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=679588"
},
{
"name" : "http://www.mozilla.org/security/announce/2011/mfsa2011-33.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2011/mfsa2011-33.html"
},
{
"name": "SUSE-SA:2011:037",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html"
},
{
"name" : "oval:org.mitre.oval:def:14458",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14458"
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-29.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-29.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2011-3163",
"STATE": "PUBLIC"
},
@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "HPSBPI02711",
"name": "SSRT100647",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=131914362310845&w=2"
},
{
"name" : "SSRT100647",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=131914362310845&w=2"
"name": "8479",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8479"
},
{
"name": "50297",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50297"
},
{
"name": "HPSBPI02711",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=131914362310845&w=2"
},
{
"name": "46532",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46532"
},
{
"name" : "8479",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/8479"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3310",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-3506",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
},
{
"name" : "RHSA-2012:1232",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1232.html"
},
{
"name": "46527",
"refsource": "SECUNIA",
@ -72,10 +62,20 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46528"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
},
{
"name": "50084",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50084"
},
{
"name": "RHSA-2012:1232",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0269",
"STATE": "PUBLIC"
},
@ -52,120 +52,120 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130211 Denial of Service and Unsafe Object Creation Vulnerability in JSON [CVE-2013-0269]",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/02/11/7"
},
{
"name" : "[oss-security] 20130211 Patch update for [CVE-2013-0269]",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/02/11/8"
},
{
"name" : "[rubyonrails-security] 20130211 Denial of Service and Unsafe Object Creation Vulnerability in JSON [CVE-2013-0269]",
"refsource" : "MLIST",
"url" : "https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain"
},
{
"name" : "http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection",
"refsource" : "MISC",
"url" : "http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection"
},
{
"name" : "http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/",
"refsource" : "CONFIRM",
"url" : "http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/"
},
{
"name" : "http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed",
"refsource" : "CONFIRM",
"url" : "http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed"
},
{
"name" : "https://puppet.com/security/cve/cve-2013-0269",
"refsource" : "CONFIRM",
"url" : "https://puppet.com/security/cve/cve-2013-0269"
},
{
"name" : "APPLE-SA-2013-10-22-5",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
},
{
"name" : "RHSA-2013:0686",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0686.html"
},
{
"name": "RHSA-2013:0701",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0701.html"
},
{
"name" : "RHSA-2013:1028",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
},
{
"name" : "RHSA-2013:1147",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1147.html"
},
{
"name" : "SSA:2013-075-01",
"refsource" : "SLACKWARE",
"url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862"
},
{
"name": "openSUSE-SU-2013:0603",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html"
},
{
"name" : "SUSE-SU-2013:0609",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"
"name": "APPLE-SA-2013-10-22-5",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
},
{
"name" : "SUSE-SU-2013:0647",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"
},
{
"name" : "USN-1733-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1733-1"
},
{
"name" : "57899",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/57899"
},
{
"name" : "90074",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/90074"
},
{
"name" : "52075",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/52075"
"name": "SSA:2013-075-01",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862"
},
{
"name": "52774",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52774"
},
{
"name": "http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed",
"refsource": "CONFIRM",
"url": "http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed"
},
{
"name": "[rubyonrails-security] 20130211 Denial of Service and Unsafe Object Creation Vulnerability in JSON [CVE-2013-0269]",
"refsource": "MLIST",
"url": "https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain"
},
{
"name": "90074",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/90074"
},
{
"name": "https://puppet.com/security/cve/cve-2013-0269",
"refsource": "CONFIRM",
"url": "https://puppet.com/security/cve/cve-2013-0269"
},
{
"name": "52902",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52902"
},
{
"name": "RHSA-2013:0686",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0686.html"
},
{
"name": "57899",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57899"
},
{
"name": "[oss-security] 20130211 Denial of Service and Unsafe Object Creation Vulnerability in JSON [CVE-2013-0269]",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/11/7"
},
{
"name": "http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection",
"refsource": "MISC",
"url": "http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection"
},
{
"name": "[oss-security] 20130211 Patch update for [CVE-2013-0269]",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/11/8"
},
{
"name": "USN-1733-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1733-1"
},
{
"name": "SUSE-SU-2013:0609",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"
},
{
"name": "RHSA-2013:1028",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
},
{
"name": "json-ruby-security-bypass(82010)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82010"
},
{
"name": "RHSA-2013:1147",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1147.html"
},
{
"name": "http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/",
"refsource": "CONFIRM",
"url": "http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/"
},
{
"name": "52075",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52075"
},
{
"name": "SUSE-SU-2013:0647",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0299",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-0566",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21647750",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21647750"
},
{
"name": "JR46776",
"refsource": "AIXAPAR",
@ -66,6 +61,11 @@
"name": "wscommerce-cve20130566-xss(83139)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83139"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21647750",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21647750"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1157",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1178",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1289",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS13-035",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-035"
},
{
"name": "TA13-100A",
"refsource": "CERT",
@ -66,6 +61,11 @@
"name": "oval:org.mitre.oval:def:16599",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16599"
},
{
"name": "MS13-035",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-035"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-1373",
"STATE": "PUBLIC"
},
@ -53,20 +53,15 @@
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb13-05.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb13-05.html"
"name": "SUSE-SU-2013:0296",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html"
},
{
"name": "RHSA-2013:0254",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0254.html"
},
{
"name" : "SUSE-SU-2013:0296",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html"
},
{
"name": "openSUSE-SU-2013:0295",
"refsource": "SUSE",
@ -81,6 +76,11 @@
"name": "TA13-043A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb13-05.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb13-05.html"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20130123 CVE-2013-1393",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2013/Jan/218"
},
{
"name" : "20130123 [Security-news] SA-CONTRIB-2013-008 - CurvyCorners - Cross Site Scripting (XSS) - module unsupported",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2013/Jan/211"
},
{
"name" : "https://drupal.org/node/1896718",
"name": "http://packetstormsecurity.com/files/119814/CurvyCorners-Cross-Site-Scripting.html",
"refsource": "MISC",
"url" : "https://drupal.org/node/1896718"
"url": "http://packetstormsecurity.com/files/119814/CurvyCorners-Cross-Site-Scripting.html"
},
{
"name": "http://packetstormsecurity.com/files/119766/Drupal-CurvyCorners-6.x-7.x-Cross-Site-Scripting.html",
@ -73,29 +63,39 @@
"url": "http://packetstormsecurity.com/files/119766/Drupal-CurvyCorners-6.x-7.x-Cross-Site-Scripting.html"
},
{
"name" : "http://packetstormsecurity.com/files/119814/CurvyCorners-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/119814/CurvyCorners-Cross-Site-Scripting.html"
},
{
"name" : "http://www.csnc.ch/misc/files/advisories/CVE-2013-1393.txt",
"refsource" : "MISC",
"url" : "http://www.csnc.ch/misc/files/advisories/CVE-2013-1393.txt"
},
{
"name" : "57526",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/57526"
"name": "20130123 CVE-2013-1393",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Jan/218"
},
{
"name": "89571",
"refsource": "OSVDB",
"url": "http://osvdb.org/89571"
},
{
"name": "20130123 [Security-news] SA-CONTRIB-2013-008 - CurvyCorners - Cross Site Scripting (XSS) - module unsupported",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Jan/211"
},
{
"name": "57526",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57526"
},
{
"name": "drupal-curvycorners-unspecified-xss(81499)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81499"
},
{
"name": "http://www.csnc.ch/misc/files/advisories/CVE-2013-1393.txt",
"refsource": "MISC",
"url": "http://www.csnc.ch/misc/files/advisories/CVE-2013-1393.txt"
},
{
"name": "https://drupal.org/node/1896718",
"refsource": "MISC",
"url": "https://drupal.org/node/1896718"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-1503",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-1557",
"STATE": "PUBLIC"
},
@ -52,36 +52,111 @@
},
"references": {
"reference_data": [
{
"name": "SUSE-SU-2013:0835",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html"
},
{
"name": "oval:org.mitre.oval:def:19294",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19294"
},
{
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name": "[distro-pkg-dev] 20130417 [SECURITY] IcedTea 1.11.10 for OpenJDK 6 Released!",
"refsource": "MLIST",
"url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022796.html"
},
{
"name": "SUSE-SU-2013:0871",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html"
},
{
"name": "RHSA-2013:0758",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0758.html"
},
{
"name": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/76eb3fb80740",
"refsource": "MISC",
"url": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/76eb3fb80740"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=952648",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=952648"
"name": "APPLE-SA-2013-04-16-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
"name": "MDVSA-2013:145",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:145"
},
{
"name" : "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/",
"refsource" : "CONFIRM",
"url" : "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/"
"name": "oval:org.mitre.oval:def:19672",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19672"
},
{
"name": "TA13-107A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-107A"
},
{
"name": "IV40772",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV40772"
},
{
"name": "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/",
"refsource": "CONFIRM",
"url": "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/"
},
{
"name": "SSRT101252",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=952648",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "SSRT101305",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "59170",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59170"
},
{
"name": "RHSA-2013:0757",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
},
{
"name": "HPSBUX02922",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21645566",
"refsource": "CONFIRM",
@ -93,74 +168,34 @@
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124"
},
{
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
"refsource" : "CONFIRM",
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
},
{
"name" : "IV40772",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV40772"
},
{
"name" : "APPLE-SA-2013-04-16-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
},
{
"name" : "GLSA-201406-32",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBUX02889",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
},
{
"name" : "SSRT101252",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
},
{
"name" : "HPSBUX02922",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "SSRT101305",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "MDVSA-2013:145",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:145"
"name": "openSUSE-SU-2013:0777",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html"
},
{
"name": "MDVSA-2013:161",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:161"
},
{
"name": "openSUSE-SU-2013:0964",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html"
},
{
"name": "RHSA-2013:0752",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0752.html"
},
{
"name" : "RHSA-2013:0757",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
"name": "USN-1806-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1806-1"
},
{
"name" : "RHSA-2013:0758",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0758.html"
},
{
"name" : "RHSA-2013:1455",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
"name": "oval:org.mitre.oval:def:16688",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16688"
},
{
"name": "RHSA-2013:1456",
@ -173,19 +208,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html"
},
{
"name" : "openSUSE-SU-2013:0777",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html"
"name": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
},
{
"name" : "SUSE-SU-2013:0835",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html"
},
{
"name" : "SUSE-SU-2013:0871",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html"
"name": "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/",
"refsource": "CONFIRM",
"url": "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/"
},
{
"name": "SUSE-SU-2013:0934",
@ -193,39 +223,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html"
},
{
"name" : "openSUSE-SU-2013:0964",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html"
},
{
"name" : "USN-1806-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1806-1"
},
{
"name" : "TA13-107A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-107A"
},
{
"name" : "59170",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/59170"
},
{
"name" : "oval:org.mitre.oval:def:16688",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16688"
},
{
"name" : "oval:org.mitre.oval:def:19294",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19294"
},
{
"name" : "oval:org.mitre.oval:def:19672",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19672"
"name": "HPSBUX02889",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4594",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "55431",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55431"
},
{
"name": "[oss-security] 20131118 Re: CVE request for Drupal contributed modules",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q4/317"
},
{
"name" : "https://drupal.org/node/2129373",
"refsource" : "MISC",
"url" : "https://drupal.org/node/2129373"
},
{
"name": "https://drupal.org/node/2128345",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/2128345"
},
{
"name" : "55431",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/55431"
"name": "https://drupal.org/node/2129373",
"refsource": "MISC",
"url": "https://drupal.org/node/2129373"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-5340",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-5446",
"STATE": "PUBLIC"
},
@ -57,6 +57,11 @@
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21653546"
},
{
"name": "webspheredp-xc10-cve20135446-logoff(87910)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87910"
},
{
"name": "IC93164",
"refsource": "AIXAPAR",
@ -66,11 +71,6 @@
"name": "IC96617",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC96617"
},
{
"name" : "webspheredp-xc10-cve20135446-logoff(87910)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/87910"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0620",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-1000002",
"REQUESTER": "mattd@bugfuzz.com",
"STATE": "PUBLIC"
@ -12,18 +12,18 @@
"product": {
"product_data": [
{
"product_name" : "ATutor",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.2.1"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "ATutor"
"vendor_name": "n/a"
}
]
}
@ -45,7 +45,7 @@
"description": [
{
"lang": "eng",
"value" : "Directory Traversal"
"value": "n/a"
}
]
}
@ -54,9 +54,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.atutor.ca/atutor/mantis/changelog_page.php?version_id=55",
"refsource" : "CONFIRM",
"url" : "http://www.atutor.ca/atutor/mantis/changelog_page.php?version_id=55"
"name": "99599",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99599"
},
{
"name": "http://www.atutor.ca/atutor/mantis/view.php?id=5681",
@ -64,9 +64,9 @@
"url": "http://www.atutor.ca/atutor/mantis/view.php?id=5681"
},
{
"name" : "99599",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99599"
"name": "http://www.atutor.ca/atutor/mantis/changelog_page.php?version_id=55",
"refsource": "CONFIRM",
"url": "http://www.atutor.ca/atutor/mantis/changelog_page.php?version_id=55"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.310507",
"ID": "CVE-2017-1000089",
"REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins Pipeline: Build Step Plugin",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.5 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins Pipeline: Build Step Plugin"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Incorrect Access Control"
"value": "n/a"
}
]
}

View File

@ -57,21 +57,6 @@
"refsource": "CONFIRM",
"url": "http://openwall.com/lists/oss-security/2017/08/01/1"
},
{
"name" : "http://openwall.com/lists/oss-security/2017/08/01/2",
"refsource" : "CONFIRM",
"url" : "http://openwall.com/lists/oss-security/2017/08/01/2"
},
{
"name" : "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0",
"refsource" : "CONFIRM",
"url" : "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0"
},
{
"name" : "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5",
"refsource" : "CONFIRM",
"url" : "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5"
},
{
"name": "https://mantisbt.org/bugs/view.php?id=23146",
"refsource": "CONFIRM",
@ -81,6 +66,21 @@
"name": "1039030",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039030"
},
{
"name": "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0",
"refsource": "CONFIRM",
"url": "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0"
},
{
"name": "http://openwall.com/lists/oss-security/2017/08/01/2",
"refsource": "CONFIRM",
"url": "http://openwall.com/lists/oss-security/2017/08/01/2"
},
{
"name": "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5",
"refsource": "CONFIRM",
"url": "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16432",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4723",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4766",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4869",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -63,9 +63,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2017-0008.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2017-0008.html"
"name": "1038281",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038281"
},
{
"name": "97921",
@ -78,9 +78,9 @@
"url": "http://www.securitytracker.com/id/1038280"
},
{
"name" : "1038281",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038281"
"name": "http://www.vmware.com/security/advisories/VMSA-2017-0008.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2017-0008.html"
}
]
}