"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:22:13 +00:00
parent 0740b1b3a0
commit 8da99ffdb3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 4277 additions and 4277 deletions

View File

@ -53,35 +53,15 @@
"references": {
"reference_data": [
{
"name" : "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en",
"refsource" : "MISC",
"url" : "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en"
},
{
"name" : "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en",
"refsource" : "MISC",
"url" : "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en"
"name": "dns-improper-request-handling(26081)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26081"
},
{
"name": "VU#955777",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/955777"
},
{
"name" : "17691",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17691"
},
{
"name" : "ADV-2006-1505",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1505"
},
{
"name" : "ADV-2006-1506",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1506"
},
{
"name": "1015991",
"refsource": "SECTRACK",
@ -93,9 +73,29 @@
"url": "http://secunia.com/advisories/19750"
},
{
"name" : "dns-improper-request-handling(26081)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26081"
"name": "ADV-2006-1505",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1505"
},
{
"name": "ADV-2006-1506",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1506"
},
{
"name": "17691",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17691"
},
{
"name": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en",
"refsource": "MISC",
"url": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en"
},
{
"name": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en",
"refsource": "MISC",
"url": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "http://evuln.com/vulns/130/summary.html",
"refsource" : "MISC",
"url" : "http://evuln.com/vulns/130/summary.html"
},
{
"name" : "17762",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17762"
"name": "19882",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19882"
},
{
"name": "ADV-2006-1578",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1578"
},
{
"name": "17762",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17762"
},
{
"name": "25128",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25128"
},
{
"name" : "19882",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19882"
},
{
"name": "propublish-setinc-file-include(26149)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26149"
},
{
"name": "http://evuln.com/vulns/130/summary.html",
"refsource": "MISC",
"url": "http://evuln.com/vulns/130/summary.html"
}
]
}

View File

@ -52,31 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060508 Multiple Vulnerabilities In IdealBB ASP Bulletin Board",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/433248/100/0/threaded"
},
{
"name" : "20060508 Multiple Vulnerabilities In IdealBB ASP Bulletin Board",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/045887.html"
},
{
"name" : "http://www.idealscience.com/ibb/posts.aspx?postID=24415",
"refsource" : "MISC",
"url" : "http://www.idealscience.com/ibb/posts.aspx?postID=24415"
},
{
"name" : "17920",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17920"
},
{
"name" : "ADV-2006-1729",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1729"
},
{
"name": "25456",
"refsource": "OSVDB",
@ -88,14 +63,39 @@
"url": "http://secunia.com/advisories/20035"
},
{
"name" : "871",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/871"
"name": "20060508 Multiple Vulnerabilities In IdealBB ASP Bulletin Board",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/045887.html"
},
{
"name": "ADV-2006-1729",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1729"
},
{
"name": "20060508 Multiple Vulnerabilities In IdealBB ASP Bulletin Board",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/433248/100/0/threaded"
},
{
"name": "17920",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17920"
},
{
"name": "idealbb-asp-file-upload(26353)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26353"
},
{
"name": "871",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/871"
},
{
"name": "http://www.idealscience.com/ibb/posts.aspx?postID=24415",
"refsource": "MISC",
"url": "http://www.idealscience.com/ibb/posts.aspx?postID=24415"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060526 ZH2006-20 SA: CosmicShoppingCart Multiple Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0683.html"
},
{
"name" : "http://www.zone-h.org/advisories/read/id=9058",
"refsource" : "MISC",
"url" : "http://www.zone-h.org/advisories/read/id=9058"
},
{
"name" : "18709",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18709"
},
{
"name" : "ADV-2006-1984",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1984"
"name": "26092",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26092"
},
{
"name": "26091",
@ -78,34 +63,49 @@
"url": "http://www.osvdb.org/26091"
},
{
"name" : "26093",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26093"
"name": "18709",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18709"
},
{
"name" : "26090",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26090"
"name": "cosmicshoppingcart-search-xss(26681)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26681"
},
{
"name" : "26092",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26092"
"name": "http://www.zone-h.org/advisories/read/id=9058",
"refsource": "MISC",
"url": "http://www.zone-h.org/advisories/read/id=9058"
},
{
"name": "1016164",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016164"
},
{
"name": "20060526 ZH2006-20 SA: CosmicShoppingCart Multiple Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0683.html"
},
{
"name": "20272",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20272"
},
{
"name" : "cosmicshoppingcart-search-xss(26681)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26681"
"name": "26093",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26093"
},
{
"name": "ADV-2006-1984",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1984"
},
{
"name": "26090",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26090"
}
]
}

View File

@ -57,16 +57,16 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435279/100/0/threaded"
},
{
"name" : "http://www.nukedx.com/?getxpl=31",
"refsource" : "MISC",
"url" : "http://www.nukedx.com/?getxpl=31"
},
{
"name": "http://www.nukedx.com/?viewdoc=31",
"refsource": "MISC",
"url": "http://www.nukedx.com/?viewdoc=31"
},
{
"name": "http://www.nukedx.com/?getxpl=31",
"refsource": "MISC",
"url": "http://www.nukedx.com/?getxpl=31"
},
{
"name": "1002",
"refsource": "SREASON",

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060605 [MajorSecurity #8]DreamAccount <= 3.1 - Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/435991/100/0/threaded"
},
{
"name" : "20060606 Re: [MajorSecurity #8]DreamAccount <= 3.1 - Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/436134/100/0/threaded"
},
{
"name" : "http://www.majorsecurity.de/advisory/major_rls8.txt",
"refsource" : "MISC",
"url" : "http://www.majorsecurity.de/advisory/major_rls8.txt"
"name": "1062",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1062"
},
{
"name": "1881",
@ -73,24 +63,9 @@
"url": "https://www.exploit-db.com/exploits/1881"
},
{
"name" : "18278",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18278"
},
{
"name" : "ADV-2006-2152",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2152"
},
{
"name" : "26168",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26168"
},
{
"name" : "26169",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26169"
"name": "http://www.majorsecurity.de/advisory/major_rls8.txt",
"refsource": "MISC",
"url": "http://www.majorsecurity.de/advisory/major_rls8.txt"
},
{
"name": "26170",
@ -102,20 +77,45 @@
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016272"
},
{
"name": "dreamaccount-dapath-file-include(26932)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26932"
},
{
"name": "20468",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20468"
},
{
"name" : "1062",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1062"
"name": "26168",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26168"
},
{
"name" : "dreamaccount-dapath-file-include(26932)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26932"
"name": "18278",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18278"
},
{
"name": "20060606 Re: [MajorSecurity #8]DreamAccount <= 3.1 - Remote File Include Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/436134/100/0/threaded"
},
{
"name": "26169",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26169"
},
{
"name": "ADV-2006-2152",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2152"
},
{
"name": "20060605 [MajorSecurity #8]DreamAccount <= 3.1 - Remote File Include Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435991/100/0/threaded"
}
]
}

View File

@ -52,30 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20060611 CS-Forum <= 0.81 Cross Site Scripting, SQL Injection, Full Path Disclosure",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/436789/100/0/threaded"
},
{
"name" : "http://www.acid-root.new.fr/advisories/csforum081.txt",
"refsource" : "MISC",
"url" : "http://www.acid-root.new.fr/advisories/csforum081.txt"
},
{
"name": "http://www.comscripts.com/scripts/php.cs-forum.643.html",
"refsource": "CONFIRM",
"url": "http://www.comscripts.com/scripts/php.cs-forum.643.html"
},
{
"name" : "ADV-2006-2314",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2314"
},
{
"name" : "26379",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26379"
"name": "20534",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20534"
},
{
"name": "26380",
@ -83,9 +68,24 @@
"url": "http://www.osvdb.org/26380"
},
{
"name" : "20534",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20534"
"name": "ADV-2006-2314",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2314"
},
{
"name": "20060611 CS-Forum <= 0.81 Cross Site Scripting, SQL Injection, Full Path Disclosure",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/436789/100/0/threaded"
},
{
"name": "26379",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26379"
},
{
"name": "http://www.acid-root.new.fr/advisories/csforum081.txt",
"refsource": "MISC",
"url": "http://www.acid-root.new.fr/advisories/csforum081.txt"
},
{
"name": "1124",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060625 OpenGuestbook Cross Site Scripting & SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/438381/100/0/threaded"
},
{
"name" : "18666",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18666"
"name": "open-guestbook-view-sql-injection(27400)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27400"
},
{
"name": "ADV-2006-2545",
@ -72,15 +67,20 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20796"
},
{
"name": "18666",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18666"
},
{
"name": "1166",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1166"
},
{
"name" : "open-guestbook-view-sql-injection(27400)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27400"
"name": "20060625 OpenGuestbook Cross Site Scripting & SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/438381/100/0/threaded"
}
]
}

View File

@ -52,15 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2006-2935",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2935"
},
{
"name": "20060721 MicroGuestBook Remote XSS Attack",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440855/100/0/threaded"
},
{
"name" : "http://it.security.netsons.org/exploit/MicroGuestBook.txt",
"refsource" : "MISC",
"url" : "http://it.security.netsons.org/exploit/MicroGuestBook.txt"
"name": "28677",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28677"
},
{
"name": "19119",
@ -68,14 +73,9 @@
"url": "http://www.securityfocus.com/bid/19119"
},
{
"name" : "ADV-2006-2935",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2935"
},
{
"name" : "28677",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/28677"
"name": "http://it.security.netsons.org/exploit/MicroGuestBook.txt",
"refsource": "MISC",
"url": "http://it.security.netsons.org/exploit/MicroGuestBook.txt"
},
{
"name": "21155",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20061120 ehomes [multiples injections sql]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/452107/100/100/threaded"
},
{
"name" : "http://s-a-p.ca/index.php?page=OurAdvisories&id=50",
"refsource" : "MISC",
"url" : "http://s-a-p.ca/index.php?page=OurAdvisories&id=50"
"name": "ADV-2006-4643",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4643"
},
{
"name": "21193",
@ -68,24 +63,29 @@
"url": "http://www.securityfocus.com/bid/21193"
},
{
"name" : "ADV-2006-4643",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4643"
"name": "ehomes-multiple-sql-injection(30419)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30419"
},
{
"name": "23016",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23016"
},
{
"name": "20061120 ehomes [multiples injections sql]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/452107/100/100/threaded"
},
{
"name": "1942",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1942"
},
{
"name" : "ehomes-multiple-sql-injection(30419)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30419"
"name": "http://s-a-p.ca/index.php?page=OurAdvisories&id=50",
"refsource": "MISC",
"url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=50"
}
]
}

View File

@ -52,11 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "23293",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23293"
},
{
"name": "awrate-search-file-include(30708)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30708"
},
{
"name": "2884",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2884"
},
{
"name": "ADV-2006-4839",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4839"
},
{
"name": "20061206 awrate 1.0 search.php RFI - source verify, small wrinkle",
"refsource": "VIM",
@ -66,21 +81,6 @@
"name": "21407",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21407"
},
{
"name" : "ADV-2006-4839",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4839"
},
{
"name" : "23293",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23293"
},
{
"name" : "awrate-search-file-include(30708)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30708"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "NetBSD-SA2006-026",
"refsource" : "NETBSD",
"url" : "ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2006-026.txt.asc"
},
{
"name": "1017293",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017293"
},
{
"name": "NetBSD-SA2006-026",
"refsource": "NETBSD",
"url": "ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2006-026.txt.asc"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-016_e/01-e.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-016_e/01-e.html"
},
{
"name": "ADV-2006-5114",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5114"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS06-016_e/01-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-016_e/01-e.html"
},
{
"name": "23399",
"refsource": "SECUNIA",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "26591",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26591"
},
{
"name": "http://www.team509.com/modules.php?name=News&file=article&sid=38",
"refsource": "MISC",
@ -62,11 +67,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25437"
},
{
"name" : "26591",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26591"
},
{
"name": "mediaplayerclassic-fli-bo(36242)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-0670",
"STATE": "PUBLIC"
},
@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
"refsource" : "MISC",
"url" : "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
},
{
"name" : "http://support.avaya.com/css/P8/documents/100133352",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100133352"
},
{
"name" : "MS11-034",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
},
{
"name": "TA11-102A",
"refsource": "CERT",
@ -77,35 +62,50 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47205"
},
{
"name": "MS11-034",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
},
{
"name": "mswin-win32k-var5-priv-escalation(66399)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66399"
},
{
"name": "71744",
"refsource": "OSVDB",
"url": "http://osvdb.org/71744"
},
{
"name" : "oval:org.mitre.oval:def:12337",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12337"
},
{
"name" : "1025345",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025345"
},
{
"name" : "44156",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44156"
},
{
"name": "ADV-2011-0952",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0952"
},
{
"name" : "mswin-win32k-var5-priv-escalation(66399)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66399"
"name": "http://support.avaya.com/css/P8/documents/100133352",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100133352"
},
{
"name": "44156",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44156"
},
{
"name": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
"refsource": "MISC",
"url": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
},
{
"name": "1025345",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025345"
},
{
"name": "oval:org.mitre.oval:def:12337",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12337"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1083",
"STATE": "PUBLIC"
},
@ -52,80 +52,80 @@
},
"references": {
"reference_data": [
{
"name" : "[linux-kernel] 20110225 [PATCH] optimize epoll loop detection",
"refsource" : "MLIST",
"url" : "http://article.gmane.org/gmane.linux.kernel/1105744"
},
{
"name": "[linux-kernel] 20110226 Re: [PATCH] optimize epoll loop detection",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.linux.kernel/1105888"
},
{
"name" : "[linux-kernel] 20110228 Re: [PATCH] optimize epoll loop detection",
"refsource" : "MLIST",
"url" : "http://article.gmane.org/gmane.linux.kernel/1106686"
},
{
"name" : "[oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/02/1"
},
{
"name" : "[oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/02/2"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=681578",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=681578"
},
{
"name" : "RHSA-2012:0862",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0862.html"
},
{
"name" : "SUSE-SU-2012:0554",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html"
},
{
"name" : "SUSE-SU-2012:0616",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html"
},
{
"name" : "71265",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/71265"
},
{
"name": "43522",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43522"
},
{
"name": "SUSE-SU-2012:0554",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html"
},
{
"name": "[oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/02/2"
},
{
"name": "[linux-kernel] 20110228 Re: [PATCH] optimize epoll loop detection",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.linux.kernel/1106686"
},
{
"name": "48898",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48898"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681578",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681578"
},
{
"name": "48410",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48410"
},
{
"name": "[linux-kernel] 20110225 [PATCH] optimize epoll loop detection",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.linux.kernel/1105744"
},
{
"name": "48964",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48964"
},
{
"name": "[oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/02/1"
},
{
"name": "SUSE-SU-2012:0616",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html"
},
{
"name": "48115",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48115"
},
{
"name" : "48410",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48410"
"name": "RHSA-2012:0862",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0862.html"
},
{
"name": "71265",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/71265"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-3234",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "http://code.google.com/p/chromium/issues/detail?id=89991"
},
{
"name" : "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
"name": "75550",
"refsource": "OSVDB",
"url": "http://osvdb.org/75550"
},
{
"name": "http://support.apple.com/kb/HT4981",
@ -68,14 +68,9 @@
"url": "http://support.apple.com/kb/HT4981"
},
{
"name" : "http://support.apple.com/kb/HT4999",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4999"
},
{
"name" : "http://support.apple.com/kb/HT5000",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5000"
"name": "APPLE-SA-2011-10-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"name": "APPLE-SA-2011-10-11-1",
@ -83,9 +78,9 @@
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html"
},
{
"name" : "APPLE-SA-2011-10-12-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
"name": "oval:org.mitre.oval:def:14224",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14224"
},
{
"name": "APPLE-SA-2011-10-12-4",
@ -93,19 +88,24 @@
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.html"
},
{
"name" : "75550",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/75550"
"name": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"name" : "oval:org.mitre.oval:def:14224",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14224"
"name": "http://support.apple.com/kb/HT4999",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4999"
},
{
"name": "chrome-box-code-execution(69876)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69876"
},
{
"name": "http://support.apple.com/kb/HT5000",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5000"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2011-3827",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20120917 Secunia Research: Novell GroupWise iCalendar Date/Time Parsing Denial of Service",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-09/0075.html"
"name": "http://www.novell.com/support/kb/doc.php?id=7010767",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/kb/doc.php?id=7010767"
},
{
"name": "http://secunia.com/secunia_research/2012-30/",
@ -63,9 +63,9 @@
"url": "http://secunia.com/secunia_research/2012-30/"
},
{
"name" : "http://www.novell.com/support/kb/doc.php?id=7010767",
"refsource" : "CONFIRM",
"url" : "http://www.novell.com/support/kb/doc.php?id=7010767"
"name": "20120917 Secunia Research: Novell GroupWise iCalendar Date/Time Parsing Denial of Service",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0075.html"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=733887",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-3887",
"STATE": "PUBLIC"
},
@ -53,49 +53,49 @@
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=98407",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=98407"
},
{
"name" : "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"name" : "APPLE-SA-2012-03-07-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html"
},
{
"name" : "APPLE-SA-2012-03-12-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
},
{
"name" : "oval:org.mitre.oval:def:13179",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13179"
"name": "google-chrome-uri-sec-bypass(70965)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70965"
},
{
"name": "1026774",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026774"
},
{
"name" : "48288",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48288"
},
{
"name": "48377",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48377"
},
{
"name" : "google-chrome-uri-sec-bypass(70965)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/70965"
"name": "oval:org.mitre.oval:def:13179",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13179"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=98407",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=98407"
},
{
"name": "APPLE-SA-2012-03-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"name": "48288",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48288"
},
{
"name": "APPLE-SA-2012-03-07-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-3905",
"STATE": "PUBLIC"
},
@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=95465",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=95465"
},
{
"name" : "http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html"
},
{
"name" : "DSA-2394",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2394"
},
{
"name" : "MDVSA-2011:188",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:188"
"name": "oval:org.mitre.oval:def:14761",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14761"
},
{
"name": "RHSA-2013:0217",
@ -78,9 +63,24 @@
"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
},
{
"name" : "oval:org.mitre.oval:def:14761",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14761"
"name": "MDVSA-2011:188",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:188"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=95465",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=95465"
},
{
"name": "DSA-2394",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2394"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-4402",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,15 +57,15 @@
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM41190"
},
{
"name" : "1026278",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1026278"
},
{
"name": "46487",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46487"
},
{
"name": "1026278",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026278"
}
]
}

View File

@ -62,16 +62,16 @@
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2011/Oct/224"
},
{
"name" : "http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_blind_sqlin",
"refsource" : "MISC",
"url" : "http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_blind_sqlin"
},
{
"name": "49948",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49948"
},
{
"name": "http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_blind_sqlin",
"refsource": "MISC",
"url": "http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_blind_sqlin"
},
{
"name": "76138",
"refsource": "OSVDB",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-4998",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-5070",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-5398",
"STATE": "PUBLIC"
},

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[Openswan Users] 20140221 Openswan 2.6.41 released",
"refsource" : "MLIST",
"url" : "https://lists.openswan.org/pipermail/users/2014-February/022898.html"
},
{
"name": "[oss-security] 20140217 Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/02/18/1"
},
{
"name": "[Openswan Users] 20140221 Openswan 2.6.41 released",
"refsource": "MLIST",
"url": "https://lists.openswan.org/pipermail/users/2014-February/022898.html"
},
{
"name": "[oss-security] 20140220 Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40",
"refsource": "MLIST",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2115",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=33643",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=33643"
},
{
"name": "20140403 Cisco Emergency Responder Cross-Site Request Forgery Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2115"
},
{
"name" : "66631",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/66631"
},
{
"name": "1030019",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030019"
},
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33643",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33643"
},
{
"name": "66631",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66631"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://iw.mapandroute.de/MapAPI-1.0/releaseHistory.jsp",
"name": "http://www.christian-schneider.net/advisories/CVE-2014-2232.txt",
"refsource": "MISC",
"url" : "http://iw.mapandroute.de/MapAPI-1.0/releaseHistory.jsp"
"url": "http://www.christian-schneider.net/advisories/CVE-2014-2232.txt"
},
{
"name": "http://iw.mapandroute.de/MapAPI-1.1/releaseHistory.jsp",
@ -63,9 +63,9 @@
"url": "http://iw.mapandroute.de/MapAPI-1.1/releaseHistory.jsp"
},
{
"name" : "http://www.christian-schneider.net/advisories/CVE-2014-2232.txt",
"name": "http://iw.mapandroute.de/MapAPI-1.0/releaseHistory.jsp",
"refsource": "MISC",
"url" : "http://www.christian-schneider.net/advisories/CVE-2014-2232.txt"
"url": "http://iw.mapandroute.de/MapAPI-1.0/releaseHistory.jsp"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-2421",
"STATE": "PUBLIC"
},
@ -53,24 +53,19 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
"name": "USN-2187-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2187-1"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21672080",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21672080"
"name": "RHSA-2014:0675",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0675.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676746",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676746"
},
{
"name" : "DSA-2912",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2912"
"name": "RHSA-2014:0414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name": "GLSA-201406-32",
@ -78,74 +73,79 @@
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "GLSA-201502-12",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201502-12.xml"
"name": "USN-2191-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2191-1"
},
{
"name": "HPSBUX03091",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21672080",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21672080"
},
{
"name": "RHSA-2014:0413",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0413"
},
{
"name": "59058",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59058"
},
{
"name": "SSRT101667",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
},
{
"name": "HPSBUX03092",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2"
},
{
"name" : "SSRT101667",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
},
{
"name" : "SSRT101668",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140852974709252&w=2"
},
{
"name" : "RHSA-2014:0675",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0675.html"
},
{
"name": "RHSA-2014:0685",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0685.html"
},
{
"name" : "RHSA-2014:0413",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2014:0413"
},
{
"name" : "RHSA-2014:0414",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "USN-2191-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2191-1"
},
{
"name" : "USN-2187-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2187-1"
},
{
"name": "66881",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66881"
},
{
"name": "DSA-2912",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2912"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
},
{
"name": "58415",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58415"
},
{
"name" : "59058",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59058"
"name": "SSRT101668",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676746",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676746"
},
{
"name": "GLSA-201502-12",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-2425",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-2481",
"STATE": "PUBLIC"
},
@ -53,14 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
@ -68,9 +68,9 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-6111",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-6181",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21693381",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21693381"
"name": "ibm-wsrr-cve20146181-sec-bypass(98517)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98517"
},
{
"name": "IV25285",
@ -63,9 +63,9 @@
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV25285"
},
{
"name" : "ibm-wsrr-cve20146181-sec-bypass(98517)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98517"
"name": "http://www.ibm.com/support/docview.wss?uid=swg21693381",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21693381"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6880",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#648673",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/648673"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#648673",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/648673"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7505",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#244401",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7611",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#600713",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/600713"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#600713",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/600713"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0507",
"STATE": "PUBLIC"
},
@ -60,15 +60,15 @@
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01"
},
{
"name" : "96952",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96952"
},
{
"name": "1037968",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037968"
},
{
"name": "96952",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96952"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0568",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-05-06T20:43:28.322671",
"ID": "CVE-2017-1000072",
"REQUESTER": "robin.williams@rsmus.com",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Gravity",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Creolabs"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Double Free"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000482",
"REQUESTER": "security@plone.org",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Plone",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.5-5.1rc1"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Plone Foundation"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-79"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000493",
"REQUESTER": "security@rocket.chat",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Rocket.Chat Server",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "0.59"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Rocket.Chat"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "NoSQL Injection"
"value": "n/a"
}
]
}

View File

@ -214,6 +214,11 @@
},
"references": {
"reference_data": [
{
"name": "1037748",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037748"
},
{
"name": "http://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc",
"refsource": "CONFIRM",
@ -223,11 +228,6 @@
"name": "95891",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95891"
},
{
"name" : "1037748",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037748"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/129577",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/129577"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006941",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22006941"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/129577",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/129577"
}
]
}

View File

@ -147,15 +147,15 @@
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg22012345&myns=swgws&mynp=OCSSEQTP&mync=R&cm_sp=swgws-_-OCSSEQTP-_-R"
},
{
"name" : "102911",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102911"
},
{
"name": "1040356",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040356"
},
{
"name": "102911",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102911"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4168",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -58,9 +58,9 @@
"url": "https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html"
},
{
"name" : "https://crbug.com/668724",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/668724"
"name": "GLSA-201704-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201704-02"
},
{
"name": "DSA-3810",
@ -68,9 +68,9 @@
"url": "http://www.debian.org/security/2017/dsa-3810"
},
{
"name" : "GLSA-201704-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201704-02"
"name": "96767",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96767"
},
{
"name": "RHSA-2017:0499",
@ -78,9 +78,9 @@
"url": "http://rhn.redhat.com/errata/RHSA-2017-0499.html"
},
{
"name" : "96767",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96767"
"name": "https://crbug.com/668724",
"refsource": "CONFIRM",
"url": "https://crbug.com/668724"
}
]
}

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "20170710 [SECURITY] CVE-2017-5652 Apache Impala (incubating) Information Disclosure",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/540831/100/0/threaded"
},
{
"name": "[dev] 20170710 [SECURITY] CVE-2017-5652 Apache Impala (incubating) Information Disclosure",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/5bab4424f23aebefc8108a0e30273c2a543a289df8113c461f930143@%3Cdev.impala.apache.org%3E"
},
{
"name": "20170710 [SECURITY] CVE-2017-5652 Apache Impala (incubating) Information Disclosure",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/540831/100/0/threaded"
}
]
}