"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:17:32 +00:00
parent 0baa0b483b
commit 8013de7dfa
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
52 changed files with 3183 additions and 3183 deletions

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "A021601-1",
"refsource" : "ATSTAKE",
"url" : "http://www.atstake.com/research/advisories/2001/a021601-1.txt"
},
{
"name" : "http://www.vandyke.com/products/vshell/security102.html",
"refsource" : "CONFIRM",
"url" : "http://www.vandyke.com/products/vshell/security102.html"
},
{ {
"name": "vshell-port-forwarding-rule(6148)", "name": "vshell-port-forwarding-rule(6148)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6148" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6148"
}, },
{
"name": "A021601-1",
"refsource": "ATSTAKE",
"url": "http://www.atstake.com/research/advisories/2001/a021601-1.txt"
},
{ {
"name": "2402", "name": "2402",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/2402" "url": "http://www.securityfocus.com/bid/2402"
},
{
"name": "http://www.vandyke.com/products/vshell/security102.html",
"refsource": "CONFIRM",
"url": "http://www.vandyke.com/products/vshell/security102.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20010309 Advisory: Half-life server buffer overflows and formatting vulnerabilities ",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0111.html"
},
{ {
"name": "halflife-map-format-string(6220)", "name": "halflife-map-format-string(6220)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6220" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6220"
},
{
"refsource": "BUGTRAQ",
"name": "20010309 Advisory: Half-life server buffer overflows and formatting vulnerabilities",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0111.html"
} }
] ]
} }

View File

@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "81099",
"refsource": "OSVDB",
"url": "http://osvdb.org/81099"
},
{ {
"name": "20010417 Advisory for GoAhead Webserver v2.1", "name": "20010417 Advisory for GoAhead Webserver v2.1",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0281.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0281.html"
}, },
{
"name": "goahead-aux-dos(6400)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6400"
},
{ {
"name": "http://freecode.com/projects/embedthis-goahead-webserver/releases/343539", "name": "http://freecode.com/projects/embedthis-goahead-webserver/releases/343539",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,16 +81,6 @@
"name": "6664", "name": "6664",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/6664" "url": "http://www.osvdb.org/6664"
},
{
"name" : "81099",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/81099"
},
{
"name" : "goahead-aux-dos(6400)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6400"
} }
] ]
} }

View File

@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20011008 pam_limits.so Bug!!", "name": "utillinux-pamlimits-gain-privileges(7266)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/219175" "url": "http://www.iss.net/security_center/static/7266.php"
},
{
"name" : "RHSA-2001:132",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2001-132.html"
},
{
"name" : "MDKSA-2001:084",
"refsource" : "MANDRAKE",
"url" : "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-084.php3"
},
{
"name" : "SuSE-SA:2001:034",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2001_034_shadow_txt.html"
}, },
{ {
"name": "M-009", "name": "M-009",
"refsource": "CIAC", "refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/m-009.shtml" "url": "http://www.ciac.org/ciac/bulletins/m-009.shtml"
}, },
{
"name": "RHSA-2001:132",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2001-132.html"
},
{
"name": "SuSE-SA:2001:034",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2001_034_shadow_txt.html"
},
{ {
"name": "3415", "name": "3415",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/3415" "url": "http://www.securityfocus.com/bid/3415"
}, },
{ {
"name" : "utillinux-pamlimits-gain-privileges(7266)", "name": "20011008 pam_limits.so Bug!!",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "http://www.iss.net/security_center/static/7266.php" "url": "http://www.securityfocus.com/archive/1/219175"
},
{
"name": "MDKSA-2001:084",
"refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-084.php3"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20011231 IMail Web Service User Aliases / Mailing Lists Admin Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/247786"
},
{
"name" : "http://support.ipswitch.com/kb/IM-20020301-DM02.htm",
"refsource" : "MISC",
"url" : "http://support.ipswitch.com/kb/IM-20020301-DM02.htm"
},
{ {
"name": "http://support.ipswitch.com/kb/IM-20011219-DM01.htm", "name": "http://support.ipswitch.com/kb/IM-20011219-DM01.htm",
"refsource": "MISC", "refsource": "MISC",
@ -72,10 +62,20 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/3766" "url": "http://www.securityfocus.com/bid/3766"
}, },
{
"name": "http://support.ipswitch.com/kb/IM-20020301-DM02.htm",
"refsource": "MISC",
"url": "http://support.ipswitch.com/kb/IM-20020301-DM02.htm"
},
{ {
"name": "imail-admin-domain-change(7752)", "name": "imail-admin-domain-change(7752)",
"refsource": "XF", "refsource": "XF",
"url": "http://www.iss.net/security_center/static/7752.php" "url": "http://www.iss.net/security_center/static/7752.php"
},
{
"name": "20011231 IMail Web Service User Aliases / Mailing Lists Admin Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/247786"
} }
] ]
} }

View File

@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "1795",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1795"
},
{ {
"name": "http://www.ezusermanager.com/security.php", "name": "http://www.ezusermanager.com/security.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.ezusermanager.com/security.php" "url": "http://www.ezusermanager.com/security.php"
}, },
{
"name": "1795",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1795"
},
{
"name": "ezusermanager-coreinc-file-include(26470)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26470"
},
{ {
"name": "17998", "name": "17998",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/17998" "url": "http://www.securityfocus.com/bid/17998"
}, },
{
"name" : "ADV-2006-1826",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1826"
},
{ {
"name": "25540", "name": "25540",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -83,9 +83,9 @@
"url": "http://secunia.com/advisories/20103" "url": "http://secunia.com/advisories/20103"
}, },
{ {
"name" : "ezusermanager-coreinc-file-include(26470)", "name": "ADV-2006-1826",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26470" "url": "http://www.vupen.com/english/advisories/2006/1826"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "ADV-2006-1961",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1961"
},
{
"name" : "25735",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/25735"
},
{ {
"name": "20258", "name": "20258",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -71,6 +61,16 @@
"name": "dschat-nickname-file-include(26642)", "name": "dschat-nickname-file-include(26642)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26642" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26642"
},
{
"name": "ADV-2006-1961",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1961"
},
{
"name": "25735",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25735"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-1433", "ID": "CVE-2008-1433",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "7030",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7030"
},
{ {
"name": "32165", "name": "32165",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32165" "url": "http://www.securityfocus.com/bid/32165"
}, },
{ {
"name" : "32613", "name": "7030",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/32613" "url": "https://www.exploit-db.com/exploits/7030"
}, },
{ {
"name": "4589", "name": "4589",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4589" "url": "http://securityreason.com/securityalert/4589"
}, },
{
"name": "32613",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32613"
},
{ {
"name": "pizzascript-index-sql-injection(46416)", "name": "pizzascript-index-sql-injection(46416)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,21 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "JVN#43906021",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN43906021/index.html"
},
{
"name" : "http://www.kent-web.com/cart/mart.html",
"refsource" : "CONFIRM",
"url" : "http://www.kent-web.com/cart/mart.html"
},
{ {
"name": "29436", "name": "29436",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/29436" "url": "http://www.securityfocus.com/bid/29436"
}, },
{
"name": "JVN#43906021",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN43906021/index.html"
},
{ {
"name": "30444", "name": "30444",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -76,6 +71,11 @@
"name": "kentwebmart-unspecified-xss(42743)", "name": "kentwebmart-unspecified-xss(42743)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42743" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42743"
},
{
"name": "http://www.kent-web.com/cart/mart.html",
"refsource": "CONFIRM",
"url": "http://www.kent-web.com/cart/mart.html"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ewebquiz-start-sql-injection(46910)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46910"
},
{ {
"name": "7279", "name": "7279",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "32927", "name": "32927",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32927" "url": "http://secunia.com/advisories/32927"
},
{
"name" : "ewebquiz-start-sql-injection(46910)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46910"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2458", "ID": "CVE-2011-2458",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-28.html", "name": "openSUSE-SU-2011:1240",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-28.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html"
}, },
{ {
"name" : "GLSA-201204-07", "name": "oval:org.mitre.oval:def:14014",
"refsource" : "GENTOO", "refsource": "OVAL",
"url" : "http://security.gentoo.org/glsa/glsa-201204-07.xml" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14014"
}, },
{ {
"name": "SUSE-SA:2011:043", "name": "SUSE-SA:2011:043",
@ -73,14 +73,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html"
}, },
{ {
"name" : "openSUSE-SU-2011:1240", "name": "GLSA-201204-07",
"refsource" : "SUSE", "refsource": "GENTOO",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html" "url": "http://security.gentoo.org/glsa/glsa-201204-07.xml"
}, },
{ {
"name" : "oval:org.mitre.oval:def:14014", "name": "48819",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14014" "url": "http://secunia.com/advisories/48819"
}, },
{ {
"name": "oval:org.mitre.oval:def:16179", "name": "oval:org.mitre.oval:def:16179",
@ -88,9 +88,9 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16179" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16179"
}, },
{ {
"name" : "48819", "name": "http://www.adobe.com/support/security/bulletins/apsb11-28.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/48819" "url": "http://www.adobe.com/support/security/bulletins/apsb11-28.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2483", "ID": "CVE-2011-2483",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,105 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://freshmeat.net/projects/crypt_blowfish",
"refsource" : "MISC",
"url" : "http://freshmeat.net/projects/crypt_blowfish"
},
{
"name" : "http://php.net/security/crypt_blowfish",
"refsource" : "CONFIRM",
"url" : "http://php.net/security/crypt_blowfish"
},
{ {
"name": "http://www.openwall.com/crypt/", "name": "http://www.openwall.com/crypt/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.openwall.com/crypt/" "url": "http://www.openwall.com/crypt/"
}, },
{
"name" : "http://www.php.net/ChangeLog-5.php#5.3.7",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php#5.3.7"
},
{
"name" : "http://www.php.net/archive/2011.php#id2011-08-18-1",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/archive/2011.php#id2011-08-18-1"
},
{
"name" : "http://www.postgresql.org/docs/8.4/static/release-8-4-9.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/8.4/static/release-8-4-9.html"
},
{
"name" : "http://support.apple.com/kb/HT5130",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5130"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name" : "APPLE-SA-2012-02-01-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name" : "DSA-2340",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2340"
},
{
"name" : "DSA-2399",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2399"
},
{ {
"name": "MDVSA-2011:180", "name": "MDVSA-2011:180",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:180" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:180"
}, },
{ {
"name" : "MDVSA-2011:165", "name": "php-cryptblowfish-info-disclosure(69319)",
"refsource" : "MANDRIVA", "refsource": "XF",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:165" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69319"
}, },
{ {
"name" : "MDVSA-2011:178", "name": "http://support.apple.com/kb/HT5130",
"refsource" : "MANDRIVA", "refsource": "CONFIRM",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178" "url": "http://support.apple.com/kb/HT5130"
}, },
{ {
"name" : "MDVSA-2011:179", "name": "http://php.net/security/crypt_blowfish",
"refsource" : "MANDRIVA", "refsource": "CONFIRM",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179" "url": "http://php.net/security/crypt_blowfish"
},
{
"name" : "RHSA-2011:1377",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1377.html"
},
{
"name" : "RHSA-2011:1378",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1378.html"
},
{
"name" : "RHSA-2011:1423",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1423.html"
},
{
"name" : "SUSE-SA:2011:035",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00015.html"
},
{
"name" : "USN-1229-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1229-1"
}, },
{ {
"name": "49241", "name": "49241",
@ -158,9 +83,84 @@
"url": "http://www.securityfocus.com/bid/49241" "url": "http://www.securityfocus.com/bid/49241"
}, },
{ {
"name" : "php-cryptblowfish-info-disclosure(69319)", "name": "MDVSA-2011:165",
"refsource" : "XF", "refsource": "MANDRIVA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69319" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:165"
},
{
"name": "DSA-2399",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2399"
},
{
"name": "DSA-2340",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2340"
},
{
"name": "RHSA-2011:1378",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1378.html"
},
{
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-9.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-9.html"
},
{
"name": "APPLE-SA-2012-02-01-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name": "SUSE-SA:2011:035",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00015.html"
},
{
"name": "MDVSA-2011:178",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"
},
{
"name": "RHSA-2011:1377",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1377.html"
},
{
"name": "RHSA-2011:1423",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1423.html"
},
{
"name": "http://www.php.net/ChangeLog-5.php#5.3.7",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php#5.3.7"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "http://www.php.net/archive/2011.php#id2011-08-18-1",
"refsource": "CONFIRM",
"url": "http://www.php.net/archive/2011.php#id2011-08-18-1"
},
{
"name": "MDVSA-2011:179",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"
},
{
"name": "http://freshmeat.net/projects/crypt_blowfish",
"refsource": "MISC",
"url": "http://freshmeat.net/projects/crypt_blowfish"
},
{
"name": "USN-1229-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1229-1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2011-2741", "ID": "CVE-2011-2741",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20111212 ESA-2011-036: RSA, The Security Division of EMC, announces the release of a Security Fix for RSA(r) Adaptive Authentication (On-Premise)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/520850"
},
{ {
"name": "1026420", "name": "1026420",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026420" "url": "http://www.securitytracker.com/id?1026420"
},
{
"name": "20111212 ESA-2011-036: RSA, The Security Division of EMC, announces the release of a Security Fix for RSA(r) Adaptive Authentication (On-Premise)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520850"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-3452", "ID": "CVE-2011-3452",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://aluigi.altervista.org/adv/scadapro_1-adv.txt", "name": "8382",
"refsource" : "MISC", "refsource": "SREASON",
"url" : "http://aluigi.altervista.org/adv/scadapro_1-adv.txt" "url": "http://securityreason.com/securityalert/8382"
}, },
{ {
"name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-04.pdf", "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-04.pdf",
@ -63,9 +63,9 @@
"url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-04.pdf" "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-04.pdf"
}, },
{ {
"name" : "8382", "name": "http://aluigi.altervista.org/adv/scadapro_1-adv.txt",
"refsource" : "SREASON", "refsource": "MISC",
"url" : "http://securityreason.com/securityalert/8382" "url": "http://aluigi.altervista.org/adv/scadapro_1-adv.txt"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-0672", "ID": "CVE-2013-0672",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-0676", "ID": "CVE-2013-0676",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf",
"refsource" : "MISC",
"url" : "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf"
},
{ {
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf", "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf"
},
{
"name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-0712", "ID": "CVE-2013-0712",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://jvn.jp/en/jp/JVN01611135/995359/index.html",
"refsource" : "MISC",
"url" : "http://jvn.jp/en/jp/JVN01611135/995359/index.html"
},
{ {
"name": "JVN#01611135", "name": "JVN#01611135",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN01611135/index.html" "url": "http://jvn.jp/en/jp/JVN01611135/index.html"
}, },
{
"name": "http://jvn.jp/en/jp/JVN01611135/995359/index.html",
"refsource": "MISC",
"url": "http://jvn.jp/en/jp/JVN01611135/995359/index.html"
},
{ {
"name": "JVNDB-2013-000019", "name": "JVNDB-2013-000019",
"refsource": "JVNDB", "refsource": "JVNDB",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-0778", "ID": "CVE-2013-0778",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-28.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-28.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=798867",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=798867"
},
{
"name" : "openSUSE-SU-2013:0323",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html"
},
{
"name" : "openSUSE-SU-2013:0324",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html"
},
{ {
"name": "USN-1729-1", "name": "USN-1729-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -87,10 +67,30 @@
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1748-1" "url": "http://www.ubuntu.com/usn/USN-1748-1"
}, },
{
"name": "openSUSE-SU-2013:0324",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html"
},
{
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-28.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-28.html"
},
{ {
"name": "oval:org.mitre.oval:def:16619", "name": "oval:org.mitre.oval:def:16619",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16619" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16619"
},
{
"name": "openSUSE-SU-2013:0323",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=798867",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=798867"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-0782", "ID": "CVE-2013-0782",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,46 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-28.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-28.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=827070",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=827070"
},
{ {
"name": "DSA-2699", "name": "DSA-2699",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2699" "url": "http://www.debian.org/security/2013/dsa-2699"
}, },
{
"name" : "RHSA-2013:0271",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0271.html"
},
{
"name" : "RHSA-2013:0272",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0272.html"
},
{
"name" : "openSUSE-SU-2013:0323",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html"
},
{
"name" : "openSUSE-SU-2013:0324",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html"
},
{ {
"name": "USN-1729-1", "name": "USN-1729-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1729-1" "url": "http://www.ubuntu.com/usn/USN-1729-1"
}, },
{
"name": "oval:org.mitre.oval:def:16906",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16906"
},
{ {
"name": "USN-1729-2", "name": "USN-1729-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -103,9 +78,34 @@
"url": "http://www.ubuntu.com/usn/USN-1748-1" "url": "http://www.ubuntu.com/usn/USN-1748-1"
}, },
{ {
"name" : "oval:org.mitre.oval:def:16906", "name": "openSUSE-SU-2013:0324",
"refsource" : "OVAL", "refsource": "SUSE",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16906" "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html"
},
{
"name": "RHSA-2013:0271",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0271.html"
},
{
"name": "RHSA-2013:0272",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0272.html"
},
{
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-28.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-28.html"
},
{
"name": "openSUSE-SU-2013:0323",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=827070",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=827070"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1228", "ID": "CVE-2013-1228",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1919", "ID": "CVE-2013-1919",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20130418 Xen Security Advisory 46 (CVE-2013-1919) - Several access permission issues with IRQs for unprivileged guests", "name": "55082",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://www.openwall.com/lists/oss-security/2013/04/18/6" "url": "http://secunia.com/advisories/55082"
},
{
"name" : "DSA-2662",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2662"
},
{
"name" : "FEDORA-2013-6641",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104538.html"
},
{
"name" : "FEDORA-2013-6723",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html"
}, },
{ {
"name": "GLSA-201309-24", "name": "GLSA-201309-24",
@ -82,20 +67,35 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html"
}, },
{
"name": "DSA-2662",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2662"
},
{ {
"name": "SUSE-SU-2014:0446", "name": "SUSE-SU-2014:0446",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
}, },
{
"name": "FEDORA-2013-6723",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html"
},
{
"name": "[oss-security] 20130418 Xen Security Advisory 46 (CVE-2013-1919) - Several access permission issues with IRQs for unprivileged guests",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/18/6"
},
{ {
"name": "59292", "name": "59292",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/59292" "url": "http://www.securityfocus.com/bid/59292"
}, },
{ {
"name" : "55082", "name": "FEDORA-2013-6641",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/55082" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104538.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1973", "ID": "CVE-2013-1973",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://drupal.org/node/1972976", "name": "52996",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "https://drupal.org/node/1972976" "url": "http://secunia.com/advisories/52996"
}, },
{ {
"name": "https://drupal.org/node/1971848", "name": "https://drupal.org/node/1971848",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://drupal.org/node/1971848" "url": "https://drupal.org/node/1971848"
}, },
{
"name" : "https://drupal.org/node/1971856",
"refsource" : "CONFIRM",
"url" : "https://drupal.org/node/1971856"
},
{ {
"name": "92532", "name": "92532",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/92532" "url": "http://osvdb.org/92532"
}, },
{ {
"name" : "52996", "name": "https://drupal.org/node/1972976",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/52996" "url": "https://drupal.org/node/1972976"
},
{
"name": "https://drupal.org/node/1971856",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/1971856"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4393", "ID": "CVE-2013-4393",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "GLSA-201612-34",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-34"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357"
},
{ {
"name": "[oss-security] 20131001 Re: [CVE request] systemd", "name": "[oss-security] 20131001 Re: [CVE request] systemd",
"refsource": "MLIST", "refsource": "MLIST",
@ -61,16 +71,6 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=859104", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=859104",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=859104" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859104"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357"
},
{
"name" : "GLSA-201612-34",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201612-34"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5809", "ID": "CVE-2013-5809",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,114 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html", "name": "RHSA-2014:0414",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" "url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "http://support.apple.com/kb/HT5982",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5982"
},
{
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1019113",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1019113"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21660987",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21660987"
},
{
"name" : "APPLE-SA-2013-10-15-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
}, },
{ {
"name": "GLSA-201406-32", "name": "GLSA-201406-32",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
}, },
{
"name" : "HPSBUX02943",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
},
{
"name" : "HPSBUX02944",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name" : "RHSA-2013:1440",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{ {
"name": "RHSA-2013:1447", "name": "RHSA-2013:1447",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
}, },
{ {
"name" : "RHSA-2013:1451", "name": "RHSA-2013:1440",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1451.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"name" : "RHSA-2013:1505",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"name" : "RHSA-2013:1507",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"name" : "RHSA-2013:1508",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"name" : "RHSA-2013:1509",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1509.html"
},
{
"name" : "RHSA-2013:1793",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name" : "RHSA-2014:0414",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "SUSE-SU-2013:1666",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name" : "SUSE-SU-2013:1677",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"name" : "openSUSE-SU-2013:1663",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
}, },
{ {
"name": "USN-2033-1", "name": "USN-2033-1",
@ -172,25 +82,115 @@
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2089-1" "url": "http://www.ubuntu.com/usn/USN-2089-1"
}, },
{
"name": "oval:org.mitre.oval:def:18504",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18504"
},
{
"name": "RHSA-2013:1508",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"name": "SUSE-SU-2013:1677",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21660987",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660987"
},
{
"name": "HPSBUX02944",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name": "RHSA-2013:1505",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name": "HPSBUX02943",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
},
{ {
"name": "63118", "name": "63118",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/63118" "url": "http://www.securityfocus.com/bid/63118"
}, },
{ {
"name" : "oval:org.mitre.oval:def:18504", "name": "openSUSE-SU-2013:1663",
"refsource" : "OVAL", "refsource": "SUSE",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18504" "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name": "RHSA-2013:1793",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name": "RHSA-2013:1509",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1509.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "APPLE-SA-2013-10-15-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"name": "RHSA-2013:1507",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1019113",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019113"
}, },
{ {
"name": "56249", "name": "56249",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56249" "url": "http://secunia.com/advisories/56249"
}, },
{
"name": "http://support.apple.com/kb/HT5982",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5982"
},
{ {
"name": "56338", "name": "56338",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56338" "url": "http://secunia.com/advisories/56338"
},
{
"name": "RHSA-2013:1451",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5821", "ID": "CVE-2013-5821",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "name": "102051",
"refsource" : "CONFIRM", "refsource": "OSVDB",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" "url": "http://osvdb.org/102051"
}, },
{ {
"name" : "64758", "name": "oracle-cpujan2014-cve20135821(90361)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/64758" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90361"
}, },
{ {
"name": "64856", "name": "64856",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/64856" "url": "http://www.securityfocus.com/bid/64856"
}, },
{
"name" : "102051",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/102051"
},
{ {
"name": "56488", "name": "56488",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56488" "url": "http://secunia.com/advisories/56488"
}, },
{ {
"name" : "oracle-cpujan2014-cve20135821(90361)", "name": "64758",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90361" "url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.333826", "DATE_ASSIGNED": "2017-08-22T17:29:33.333826",
"ID": "CVE-2017-1000122", "ID": "CVE-2017-1000122",
"REQUESTER": "mcatanzaro@igalia.com", "REQUESTER": "mcatanzaro@igalia.com",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "WebKit", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "WebKitGTK+ prior to 2.16.3" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "WebKit" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Insufficient input validation" "value": "n/a"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.467605", "DATE_ASSIGNED": "2017-08-22T17:29:33.467605",
"ID": "CVE-2017-1000238", "ID": "CVE-2017-1000238",
"REQUESTER": "j.singh@sec-consult.com", "REQUESTER": "j.singh@sec-consult.com",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "InvoicePlane", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "1.4.10" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "InvoicePlane" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Arbitrary File Upload" "value": "n/a"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-243-04",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-243-04"
},
{ {
"name": "100563", "name": "100563",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/100563" "url": "http://www.securityfocus.com/bid/100563"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-243-04",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-243-04"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/",
"refsource" : "CONFIRM",
"url" : "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/"
},
{ {
"name": "USN-3559-1", "name": "USN-3559-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -71,6 +66,11 @@
"name": "1039264", "name": "1039264",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039264" "url": "http://www.securitytracker.com/id/1039264"
},
{
"name": "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/",
"refsource": "CONFIRM",
"url": "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/"
} }
] ]
} }

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90",
"refsource" : "MISC",
"url" : "https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90"
},
{ {
"name": "https://nodesecurity.io/advisories/304", "name": "https://nodesecurity.io/advisories/304",
"refsource": "MISC", "refsource": "MISC",
"url": "https://nodesecurity.io/advisories/304" "url": "https://nodesecurity.io/advisories/304"
},
{
"name": "https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90",
"refsource": "MISC",
"url": "https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4155", "ID": "CVE-2017-4155",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4235", "ID": "CVE-2017-4235",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4395", "ID": "CVE-2017-4395",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4581", "ID": "CVE-2017-4581",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {