"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:41:33 +00:00
parent e7b884962b
commit 7cc948d096
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 4597 additions and 4597 deletions

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "ibm-gina-group-add(3166)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3166"
},
{
"name": "19990823 IBM Gina security warning",
"refsource": "NTBUGTRAQ",
@ -61,11 +66,6 @@
"name": "608",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/608"
},
{
"name" : "ibm-gina-group-add(3166)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/3166"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "MS98-006",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-006"
},
{
"name": "Q189262",
"refsource": "MSKB",
"url": "http://support.microsoft.com/support/kb/articles/Q189/2/62.ASP"
},
{
"name": "MS98-006",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-006"
},
{
"name": "iis-passive-ftp(1215)",
"refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.w3.org/Security/Faq/wwwsf4.html",
"refsource" : "MISC",
"url" : "http://www.w3.org/Security/Faq/wwwsf4.html"
"name": "http-cgi-nphpublish(2055)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2055"
},
{
"name": "http://www-genome.wi.mit.edu/WWW/tools/CGI_scripts/server_publish/nph-publish",
@ -63,9 +63,9 @@
"url": "http://www-genome.wi.mit.edu/WWW/tools/CGI_scripts/server_publish/nph-publish"
},
{
"name" : "http-cgi-nphpublish(2055)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/2055"
"name": "http://www.w3.org/Security/Faq/wwwsf4.html",
"refsource": "MISC",
"url": "http://www.w3.org/Security/Faq/wwwsf4.html"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "8099",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/8099"
},
{
"name": "HPSBUX9701-047",
"refsource": "HP",
@ -61,11 +66,6 @@
"name": "hp-movemail(2057)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2057"
},
{
"name" : "8099",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/8099"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20000415 (no subject)",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-04/0073.html"
},
{
"name" : "20000418 AVM's Statement",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=383085010.956159226625.JavaMail.root@web305-mc.mail.com"
"name": "1282",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1282"
},
{
"name": "1103",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/1103"
},
{
"name" : "1282",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/1282"
"name": "20000418 AVM's Statement",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=383085010.956159226625.JavaMail.root@web305-mc.mail.com"
},
{
"name": "20000415 (no subject)",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0073.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20000502 spj-003-000 - S0ftPj Advisory",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=200005021736.TAA01991@ALuSSi"
},
{
"name": "1158",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1158"
},
{
"name": "20000502 spj-003-000 - S0ftPj Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=200005021736.TAA01991@ALuSSi"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "20000903 (SRADV00001) Arbitrary file disclosure through PHP file upload",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-08/0455.html"
"name": "php-file-upload(5190)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5190"
},
{
"name": "20000904 Re: [PHP-DEV] RE: (SRADV00001) Arbitrary file disclosure through PHP file upload",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0477.html"
},
{
"name" : "http://cvsweb.php.net/viewcvs.cgi/php4/main/rfc1867.c.diff?r1=1.38%3Aphp_4_0_2&tr1=1.1&r2=text&tr2=1.45&diff_format=u",
"refsource" : "CONFIRM",
"url" : "http://cvsweb.php.net/viewcvs.cgi/php4/main/rfc1867.c.diff?r1=1.38%3Aphp_4_0_2&tr1=1.1&r2=text&tr2=1.45&diff_format=u"
},
{
"name" : "MDKSA-2000:048",
"refsource" : "MANDRAKE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-09/0150.html"
},
{
"name": "1649",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1649"
},
{
"name" : "php-file-upload(5190)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5190"
"name": "http://cvsweb.php.net/viewcvs.cgi/php4/main/rfc1867.c.diff?r1=1.38%3Aphp_4_0_2&tr1=1.1&r2=text&tr2=1.45&diff_format=u",
"refsource": "CONFIRM",
"url": "http://cvsweb.php.net/viewcvs.cgi/php4/main/rfc1867.c.diff?r1=1.38%3Aphp_4_0_2&tr1=1.1&r2=text&tr2=1.45&diff_format=u"
},
{
"name": "20000903 (SRADV00001) Arbitrary file disclosure through PHP file upload",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0455.html"
},
{
"name": "MDKSA-2000:048",
"refsource": "MANDRAKE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0150.html"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "A100900-1",
"refsource" : "ATSTAKE",
"url" : "http://www.atstake.com/research/advisories/2000/a100900-1.txt"
},
{
"name" : "1769",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/1769"
"name": "7209",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/7209"
},
{
"name": "ical-csstart-gain-access(5757)",
@ -68,9 +63,14 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5757"
},
{
"name" : "7209",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/7209"
"name": "1769",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1769"
},
{
"name": "A100900-1",
"refsource": "ATSTAKE",
"url": "http://www.atstake.com/research/advisories/2000/a100900-1.txt"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20001102 Mantrap By Recourse Technologies - Fate Advisory (11-01-00)",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-11/0041.html"
},
{
"name" : "20001107 Vendor Response Re: Mantrap Advisory Vendor Followup - Fate Research Labs",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-11/0100.html"
},
{
"name": "20001105 Mantrap Advisory Vendor Followup - Fate Research Labs",
"refsource": "BUGTRAQ",
@ -71,6 +61,16 @@
"name": "mantrap-pwd-reveal-information(5949)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5949"
},
{
"name": "20001102 Mantrap By Recourse Technologies - Fate Advisory (11-01-00)",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0041.html"
},
{
"name": "20001107 Vendor Response Re: Mantrap Advisory Vendor Followup - Fate Research Labs",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0100.html"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value" : "modifyUser.asp in Cool Cafe (Cool Café) Chat 1.2.1 allows remote attackers to obtain the administrator password and email address via a modified nickname value."
"value": "modifyUser.asp in Cool Cafe (Cool Caf\u00e9) Chat 1.2.1 allows remote attackers to obtain the administrator password and email address via a modified nickname value."
}
]
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20050616 CoolCafe Chat SQL injection",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/lists/fulldisclosure/2005/Jun/0205.html"
"name": "17350",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/17350"
},
{
"name": "http://exploitlabs.com/files/advisories/EXPL-A-2005-009-coolcafe.txt",
@ -63,9 +63,9 @@
"url": "http://exploitlabs.com/files/advisories/EXPL-A-2005-009-coolcafe.txt"
},
{
"name" : "17350",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/17350"
"name": "20050616 CoolCafe Chat SQL injection",
"refsource": "FULLDISC",
"url": "http://seclists.org/lists/fulldisclosure/2005/Jun/0205.html"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "3596",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3596"
},
{
"name" : "20070329 iPhotoAlbum v1.1(header.php)Remote File Include Vulnerability",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2007-March/001474.html"
},
{
"name": "14229",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14229"
},
{
"name" : "23189",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23189"
"name": "3596",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3596"
},
{
"name": "1014448",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014448"
},
{
"name": "20070329 iPhotoAlbum v1.1(header.php)Remote File Include Vulnerability",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-March/001474.html"
},
{
"name": "16031",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16031"
},
{
"name": "23189",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23189"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-2874",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042",
"refsource" : "CONFIRM",
"url" : "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"
"name": "FEDORA-2005-908",
"refsource": "FEDORA",
"url": "http://lwn.net/Alerts/152835/"
},
{
"name": "http://www.cups.org/relnotes.php#010123",
@ -63,29 +63,29 @@
"url": "http://www.cups.org/relnotes.php#010123"
},
{
"name" : "FEDORA-2005-908",
"refsource" : "FEDORA",
"url" : "http://lwn.net/Alerts/152835/"
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"
},
{
"name": "1012811",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1012811"
},
{
"name": "RHSA-2005:772",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-772.html"
},
{
"name" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"
},
{
"name": "oval:org.mitre.oval:def:9774",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774"
},
{
"name" : "1012811",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1012811"
"name": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042",
"refsource": "CONFIRM",
"url": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"
}
]
}

View File

@ -52,20 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "DSA-902",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-902"
},
{
"name": "20051013 Multiple Vendor XMail 'sendmail' Recipient Buffer Overflow Vulnerability",
"refsource": "IDEFENSE",
"url": "http://www.idefense.com/application/poi/display?id=321&type=vulnerabilities"
},
{
"name" : "http://www.xmailserver.org/ChangeLog.html#oct_12__2005_v_1_22",
"refsource" : "CONFIRM",
"url" : "http://www.xmailserver.org/ChangeLog.html#oct_12__2005_v_1_22"
"name": "15103",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15103"
},
{
"name" : "DSA-902",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-902"
"name": "xmail-addressfromatptr-bo(22724)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22724"
},
{
"name": "GLSA-200512-05",
@ -73,9 +78,19 @@
"url": "http://www.gentoo.org/security/en/glsa/glsa-200512-05.xml"
},
{
"name" : "15103",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15103"
"name": "18052",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18052"
},
{
"name": "http://www.xmailserver.org/ChangeLog.html#oct_12__2005_v_1_22",
"refsource": "CONFIRM",
"url": "http://www.xmailserver.org/ChangeLog.html#oct_12__2005_v_1_22"
},
{
"name": "81",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/81"
},
{
"name": "20010",
@ -92,25 +107,10 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17637"
},
{
"name" : "18052",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18052"
},
{
"name": "17194",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17194"
},
{
"name" : "81",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/81"
},
{
"name" : "xmail-addressfromatptr-bo(22724)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22724"
}
]
}

View File

@ -54,13 +54,13 @@
"reference_data": [
{
"name": "20050914 Oracle Reports: Generic SQL Injection Vulnerability via Lexical References",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=112681849113948&w=2"
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037156.html"
},
{
"name": "20050914 Oracle Reports: Generic SQL Injection Vulnerability via Lexical References",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037156.html"
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112681849113948&w=2"
},
{
"name": "http://www.red-database-security.com/wp/sql_injection_reports_us.pdf",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20051103 Buggy blogging",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0091.html"
},
{
"name": "14911",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14911"
},
{
"name": "20051103 Buggy blogging",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0091.html"
},
{
"name": "16899",
"refsource": "SECUNIA",

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20051101 Cisco IPS MC Malformed Configuration Download Vulnerability",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20051101-ipsmc.shtml"
},
{
"name" : "VU#154883",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/154883"
},
{
"name" : "15269",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15269"
"name": "cisco-ios-ips-bypass-security(22926)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22926"
},
{
"name": "ADV-2005-2266",
@ -77,15 +67,25 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/20444"
},
{
"name": "15269",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15269"
},
{
"name": "VU#154883",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/154883"
},
{
"name": "1015133",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015133"
},
{
"name" : "17397",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17397"
"name": "20051101 Cisco IPS MC Malformed Configuration Download Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20051101-ipsmc.shtml"
},
{
"name": "137",
@ -93,9 +93,9 @@
"url": "http://securityreason.com/securityalert/137"
},
{
"name" : "cisco-ios-ips-bypass-security(22926)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22926"
"name": "17397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17397"
}
]
}

View File

@ -62,16 +62,16 @@
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA05-292A.html"
},
{
"name" : "VU#210524",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/210524"
},
{
"name": "15134",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15134"
},
{
"name": "VU#210524",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/210524"
},
{
"name": "17250",
"refsource": "SECUNIA",

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20051129 Opera 8.50 DoS with simple java applet",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/418201/100/0/threaded"
},
{
"name" : "20051201 Re: Opera 8.50 DoS with simple java applet",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/418274/100/0/threaded"
},
{
"name": "http://www.illegalaccess.org/exploit/opera85/OperaApplet.html",
"refsource": "MISC",
@ -71,6 +61,16 @@
"name": "15648",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15648"
},
{
"name": "20051129 Opera 8.50 DoS with simple java applet",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/418201/100/0/threaded"
},
{
"name": "20051201 Re: Opera 8.50 DoS with simple java applet",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/418274/100/0/threaded"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://research.microsoft.com/apps/pubs/default.aspx?id=79323",
"refsource" : "MISC",
"url" : "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
"name": "safari-httpconnect-code-execution(51202)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51202"
},
{
"name": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/35412"
},
{
"name" : "safari-httpconnect-code-execution(51202)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51202"
"name": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323",
"refsource": "MISC",
"url": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "8997",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/8997"
},
{
"name": "35457",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35457"
},
{
"name": "8997",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/8997"
},
{
"name": "ADV-2009-1652",
"refsource": "VUPEN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-2462",
"STATE": "PUBLIC"
},
@ -53,50 +53,135 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2009/mfsa2009-34.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2009/mfsa2009-34.html"
"name": "265068",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=413085",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=413085"
"name": "1020800",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=442227",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=442227"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=445177",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=445177"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=461861",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=461861"
"name": "RHSA-2010:0153",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0153.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=463350",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=463350"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=466763",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=466763"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=468211",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=468211"
},
{
"name": "FEDORA-2009-7961",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html"
},
{
"name": "36145",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36145"
},
{
"name": "35944",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35944"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=461861",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=461861"
},
{
"name": "ADV-2010-0650",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0650"
},
{
"name": "35943",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35943"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=442227",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=442227"
},
{
"name": "SUSE-SA:2009:039",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html"
},
{
"name": "RHSA-2009:1162",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1162.html"
},
{
"name": "http://www.mozilla.org/security/announce/2009/mfsa2009-34.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-34.html"
},
{
"name": "RHSA-2010:0154",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0154.html"
},
{
"name": "oval:org.mitre.oval:def:10906",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10906"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=466763",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=466763"
},
{
"name": "35758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35758"
},
{
"name": "ADV-2009-2152",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2152"
},
{
"name": "36005",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36005"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=445177",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=445177"
},
{
"name": "RHSA-2009:1163",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1163.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=472668",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=472668"
},
{
"name": "35947",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35947"
},
{
"name": "SUSE-SA:2009:042",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=472950",
"refsource": "CONFIRM",
@ -107,105 +192,20 @@
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=491134"
},
{
"name" : "FEDORA-2009-7961",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html"
},
{
"name" : "RHSA-2009:1162",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2009-1162.html"
},
{
"name" : "RHSA-2009:1163",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2009-1163.html"
},
{
"name" : "RHSA-2010:0153",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0153.html"
},
{
"name" : "RHSA-2010:0154",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0154.html"
},
{
"name" : "265068",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1"
},
{
"name" : "1020800",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1"
},
{
"name" : "SUSE-SA:2009:042",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html"
},
{
"name" : "SUSE-SA:2009:039",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html"
},
{
"name" : "35758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35758"
},
{
"name" : "oval:org.mitre.oval:def:10906",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10906"
},
{
"name": "35914",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35914"
},
{
"name" : "35943",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35943"
},
{
"name" : "35944",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35944"
},
{
"name" : "35947",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35947"
},
{
"name" : "36145",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36145"
},
{
"name" : "36005",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36005"
},
{
"name": "ADV-2009-1972",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1972"
},
{
"name" : "ADV-2009-2152",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/2152"
},
{
"name" : "ADV-2010-0650",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/0650"
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=413085",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=413085"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT3860",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3860"
},
{
"name" : "APPLE-SA-2009-09-09-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html"
"name": "ipod-iphone-exchange-security-bypass(53181)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53181"
},
{
"name": "36342",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36342"
},
{
"name": "APPLE-SA-2009-09-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html"
},
{
"name": "36677",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36677"
},
{
"name" : "ipod-iphone-exchange-security-bypass(53181)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/53181"
"name": "http://support.apple.com/kb/HT3860",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3860"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT3860",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3860"
},
{
"name" : "APPLE-SA-2009-09-09-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html"
"name": "ipod-iphone-password-info-disclosure(53185)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53185"
},
{
"name": "36335",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36335"
},
{
"name": "APPLE-SA-2009-09-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html"
},
{
"name": "36677",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36677"
},
{
"name" : "ipod-iphone-password-info-disclosure(53185)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/53185"
"name": "http://support.apple.com/kb/HT3860",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3860"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-2909",
"STATE": "PUBLIC"
},
@ -52,55 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "[linux-kernel] 20091002 [071/136] net ax25: Fix signed comparison in the sockopt handler",
"refsource" : "MLIST",
"url" : "http://article.gmane.org/gmane.linux.kernel/896907"
},
{
"name" : "[oss-security] 20091007 More kernel CVE info (CVE-2009-2909)",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=125494119617994&w=2"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=b7058842c940ad2c08dd829b21e5c92ebe3b8758",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=b7058842c940ad2c08dd829b21e5c92ebe3b8758"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.2",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=528887",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=528887"
},
{
"name" : "FEDORA-2009-10525",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html"
},
{
"name" : "SUSE-SA:2009:054",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html"
},
{
"name" : "SUSE-SA:2009:056",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html"
},
{
"name": "USN-864-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-864-1"
},
{
"name" : "36635",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/36635"
"name": "37351",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37351"
},
{
"name": "37075",
@ -108,9 +73,44 @@
"url": "http://secunia.com/advisories/37075"
},
{
"name" : "37351",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37351"
"name": "[oss-security] 20091007 More kernel CVE info (CVE-2009-2909)",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=125494119617994&w=2"
},
{
"name": "SUSE-SA:2009:056",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html"
},
{
"name": "[linux-kernel] 20091002 [071/136] net ax25: Fix signed comparison in the sockopt handler",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.linux.kernel/896907"
},
{
"name": "36635",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36635"
},
{
"name": "FEDORA-2009-10525",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.2"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=b7058842c940ad2c08dd829b21e5c92ebe3b8758",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=b7058842c940ad2c08dd829b21e5c92ebe3b8758"
},
{
"name": "SUSE-SA:2009:054",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100128_00",
"refsource" : "CONFIRM",
"url" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100128_00"
"name": "38356",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38356"
},
{
"name": "37953",
@ -67,25 +67,25 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/62010"
},
{
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100128_00",
"refsource": "CONFIRM",
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100128_00"
},
{
"name": "1023521",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023521"
},
{
"name" : "38356",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38356"
"name": "symantec-ans-key-unauth-access(55952)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55952"
},
{
"name": "ADV-2010-0256",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0256"
},
{
"name" : "symantec-ans-key-unauth-access(55952)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55952"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2009-3139",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,16 +57,16 @@
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/3.0.8/"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=515191",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=515191"
},
{
"name": "36373",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36373"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=515191",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515191"
},
{
"name": "36718",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-3618",
"STATE": "PUBLIC"
},
@ -53,14 +53,14 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20091016 Re: viewvc: CVE request: XSS and illegal characters while printing name-value pairs",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2009/10/16/10"
"name": "ADV-2009-2257",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2257"
},
{
"name" : "http://viewvc.tigris.org/source/browse/*checkout*/viewvc/tags/1.1.2/CHANGES?revision=2235&pathrev=HEAD",
"refsource" : "CONFIRM",
"url" : "http://viewvc.tigris.org/source/browse/*checkout*/viewvc/tags/1.1.2/CHANGES?revision=2235&pathrev=HEAD"
"name": "36292",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36292"
},
{
"name": "FEDORA-2009-8501",
@ -72,35 +72,35 @@
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00566.html"
},
{
"name" : "SUSE-SR:2009:017",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"
},
{
"name": "56997",
"refsource": "OSVDB",
"url": "http://osvdb.org/56997"
},
{
"name" : "36292",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36292"
"name": "[oss-security] 20091016 Re: viewvc: CVE request: XSS and illegal characters while printing name-value pairs",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/10/16/10"
},
{
"name": "36311",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36311"
},
{
"name" : "ADV-2009-2257",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/2257"
},
{
"name": "viewvc-view-xss(52430)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52430"
},
{
"name": "http://viewvc.tigris.org/source/browse/*checkout*/viewvc/tags/1.1.2/CHANGES?revision=2235&pathrev=HEAD",
"refsource": "CONFIRM",
"url": "http://viewvc.tigris.org/source/browse/*checkout*/viewvc/tags/1.1.2/CHANGES?revision=2235&pathrev=HEAD"
},
{
"name": "SUSE-SR:2009:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-0445",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-0492",
"STATE": "PUBLIC"
},
@ -52,26 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2015:0857",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html"
},
{
"name": "SUSE-SU-2015:0833",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"
},
{
"name": "1032120",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032120"
},
{
"name": "GLSA-201603-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-11"
},
{
"name" : "RHSA-2015:0854",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0854.html"
},
{
"name" : "RHSA-2015:0857",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0857.html"
},
{
"name": "openSUSE-SU-2015:0773",
"refsource": "SUSE",
@ -83,19 +88,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html"
},
{
"name" : "SUSE-SU-2015:0833",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html"
"name": "RHSA-2015:0854",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html"
},
{
"name": "74129",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74129"
},
{
"name" : "1032120",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032120"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-0775",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20150610 Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280"
},
{
"name": "1032561",
"refsource": "SECTRACK",
@ -66,6 +61,11 @@
"name": "1032562",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032562"
},
{
"name": "20150610 Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2015-0838",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150322 Dulwich security issue",
"refsource" : "MLIST",
"url" : "https://lists.launchpad.net/dulwich-users/msg00829.html"
},
{
"name": "DSA-3206",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3206"
},
{
"name": "[oss-security] 20150322 Dulwich security issue",
"refsource": "MLIST",
"url": "https://lists.launchpad.net/dulwich-users/msg00829.html"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/535615/100/0/threaded"
},
{
"name": "74846",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74846"
},
{
"name": "37132",
"refsource": "EXPLOIT-DB",
@ -66,11 +71,6 @@
"name": "http://packetstormsecurity.com/files/132062/WordPress-Free-Counter-1.1-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132062/WordPress-Free-Counter-1.1-Cross-Site-Scripting.html"
},
{
"name" : "74846",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/74846"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2015-4540",
"STATE": "PUBLIC"
},

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.com/files/132220/Joomla-EQ-Event-Calendar-SQL-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/132220/Joomla-EQ-Event-Calendar-SQL-Injection.html"
},
{
"name": "75261",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75261"
},
{
"name": "http://packetstormsecurity.com/files/132220/Joomla-EQ-Event-Calendar-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132220/Joomla-EQ-Event-Calendar-SQL-Injection.html"
}
]
}

View File

@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2015-47.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2015-47.html"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794"
},
{
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=338da1c0ea0b2f8595d3a7b6d6c9548f7da3e27b",
"refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=338da1c0ea0b2f8595d3a7b6d6c9548f7da3e27b"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
"name": "79382",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/79382"
},
{
"name": "DSA-3505",
@ -83,9 +73,19 @@
"url": "https://security.gentoo.org/glsa/201604-05"
},
{
"name" : "79382",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/79382"
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2015-47.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2015-47.html"
},
{
"name": "1034551",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2015-8964",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc"
},
{
"name": "http://source.android.com/security/bulletin/2016-11-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-11-01.html"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc"
},
{
"name": "https://github.com/torvalds/linux/commit/dd42bf1197144ede075a9d4793123f7689e164bc",
"refsource": "CONFIRM",

View File

@ -52,61 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160623 Re: CVE for PHP 5.5.37 issues",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/23/4"
},
{
"name": "http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1",
"refsource": "CONFIRM",
"url": "http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1"
},
{
"name" : "http://php.net/ChangeLog-5.php",
"refsource" : "CONFIRM",
"url" : "http://php.net/ChangeLog-5.php"
},
{
"name" : "http://php.net/ChangeLog-7.php",
"refsource" : "CONFIRM",
"url" : "http://php.net/ChangeLog-7.php"
},
{
"name" : "https://bugs.php.net/bug.php?id=72340",
"refsource" : "CONFIRM",
"url" : "https://bugs.php.net/bug.php?id=72340"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
},
{
"name" : "https://support.apple.com/HT207170",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207170"
},
{
"name": "APPLE-SA-2016-09-20",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
},
{
"name" : "DSA-3618",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3618"
},
{
"name" : "RHSA-2016:2750",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
},
{
"name" : "SUSE-SU-2016:2013",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html"
},
{
"name": "openSUSE-SU-2016:1761",
"refsource": "SUSE",
@ -117,10 +72,55 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"
},
{
"name": "RHSA-2016:2750",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
},
{
"name": "http://php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://php.net/ChangeLog-5.php"
},
{
"name": "https://bugs.php.net/bug.php?id=72340",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=72340"
},
{
"name": "[oss-security] 20160623 Re: CVE for PHP 5.5.37 issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/23/4"
},
{
"name": "DSA-3618",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3618"
},
{
"name": "http://php.net/ChangeLog-7.php",
"refsource": "CONFIRM",
"url": "http://php.net/ChangeLog-7.php"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
},
{
"name": "https://support.apple.com/HT207170",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207170"
},
{
"name": "91398",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91398"
},
{
"name": "SUSE-SU-2016:2013",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2186",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -58,15 +58,15 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name" : "102664",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102664"
},
{
"name": "1040214",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040214"
},
{
"name": "102664",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102664"
}
]
}

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "104828",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104828"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
}
]
}

View File

@ -69,11 +69,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name": "105630",
"refsource": "BID",
@ -83,6 +78,11 @@
"name": "1041897",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041897"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com",
"ASSIGNER": "security@google.com",
"ID": "CVE-2018-6081",
"STATE": "PUBLIC"
},
@ -53,20 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://crbug.com/797525",
"refsource" : "MISC",
"url" : "https://crbug.com/797525"
},
{
"name": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html"
},
{
"name" : "DSA-4182",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4182"
"name": "103297",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103297"
},
{
"name": "RHSA-2018:0484",
@ -74,9 +69,14 @@
"url": "https://access.redhat.com/errata/RHSA-2018:0484"
},
{
"name" : "103297",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/103297"
"name": "https://crbug.com/797525",
"refsource": "MISC",
"url": "https://crbug.com/797525"
},
{
"name": "DSA-4182",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4182"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2018:0546",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0546"
},
{
"name": "https://github.com/ceph/ceph/pull/20488",
"refsource": "CONFIRM",
"url": "https://github.com/ceph/ceph/pull/20488"
},
{
"name": "http://tracker.ceph.com/issues/23039",
"refsource": "CONFIRM",
@ -63,24 +73,14 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546611"
},
{
"name" : "https://github.com/ceph/ceph/pull/20488",
"refsource" : "CONFIRM",
"url" : "https://github.com/ceph/ceph/pull/20488"
"name": "RHSA-2018:0548",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0548"
},
{
"name": "FEDORA-2018-ed907ef9a0",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74VI6EPZ6LD2O4JJXJBTYQ4U4VUO2ZDO/"
},
{
"name" : "RHSA-2018:0546",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0546"
},
{
"name" : "RHSA-2018:0548",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0548"
}
]
}

View File

@ -57,16 +57,16 @@
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14428"
},
{
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66",
"refsource" : "CONFIRM",
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66"
},
{
"name": "https://www.wireshark.org/security/wnpa-sec-2018-06.html",
"refsource": "CONFIRM",
"url": "https://www.wireshark.org/security/wnpa-sec-2018-06.html"
},
{
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66",
"refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66"
},
{
"name": "103158",
"refsource": "BID",

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-135-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-135-01"
},
{
"name": "104190",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104190"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-135-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-135-01"
}
]
}