"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:53:30 +00:00
parent d60b9fb28f
commit a3361a1f5a
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
61 changed files with 3963 additions and 3963 deletions

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "CSSA-2001-021.0",
"refsource" : "CALDERA",
"url" : "http://www.caldera.com/support/security/advisories/CSSA-2001-021.0.txt"
"name": "volution-authentication-failure-access(6672)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6672"
},
{
"name": "2850",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/2850"
},
{
"name" : "volution-authentication-failure-access(6672)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6672"
"name": "CSSA-2001-021.0",
"refsource": "CALDERA",
"url": "http://www.caldera.com/support/security/advisories/CSSA-2001-021.0.txt"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20060423 vbulletin<--3.0.x SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/431901"
},
{
"name": "20060424 Re: vbulletin<--3.0.x SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/431951/30/5370/threaded"
},
{
"name": "20060423 vbulletin<--3.0.x SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/431901"
}
]
}

View File

@ -52,31 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060502 Invision Gallery 2.0.6 ( SQL Injection )",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432731/100/0/threaded"
},
{
"name" : "20060504 Re: Invision Gallery 2.0.6 ( SQL Injection )",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432952/100/0/threaded"
},
{
"name" : "17793",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17793"
},
{
"name" : "ADV-2006-1655",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1655"
},
{
"name" : "25231",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/25231"
},
{
"name": "1016019",
"refsource": "SECTRACK",
@ -88,14 +63,39 @@
"url": "http://secunia.com/advisories/19948"
},
{
"name" : "841",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/841"
"name": "17793",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17793"
},
{
"name": "20060502 Invision Gallery 2.0.6 ( SQL Injection )",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432731/100/0/threaded"
},
{
"name": "25231",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25231"
},
{
"name": "20060504 Re: Invision Gallery 2.0.6 ( SQL Injection )",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432952/100/0/threaded"
},
{
"name": "invisiongallery-album-sql-injection(26224)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26224"
},
{
"name": "841",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/841"
},
{
"name": "ADV-2006-1655",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1655"
}
]
}

View File

@ -52,135 +52,135 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-21.html",
"refsource" : "MISC",
"url" : "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-21.html"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb06-11.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb06-11.html"
},
{
"name" : "APPLE-SA-2006-09-29",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html"
},
{
"name" : "GLSA-200610-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200610-02.xml"
},
{
"name" : "MS06-069",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069"
},
{
"name" : "RHSA-2006:0674",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0674.html"
},
{
"name" : "SUSE-SA:2006:053",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html"
},
{
"name" : "TA06-318A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-318A.html"
},
{
"name" : "18894",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18894"
},
{
"name" : "19980",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19980"
},
{
"name" : "ADV-2006-2702",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2702"
},
{
"name" : "ADV-2006-3577",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3577"
},
{
"name": "ADV-2006-3573",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3573"
},
{
"name" : "ADV-2006-3852",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3852"
},
{
"name" : "ADV-2006-4507",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4507"
},
{
"name" : "28733",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/28733"
},
{
"name" : "oval:org.mitre.oval:def:432",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A432"
},
{
"name" : "1016449",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016449"
},
{
"name" : "1016829",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016829"
},
{
"name" : "21865",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21865"
},
{
"name" : "21901",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21901"
},
{
"name": "22054",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22054"
},
{
"name" : "22187",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22187"
"name": "18894",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18894"
},
{
"name" : "22882",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22882"
"name": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-21.html",
"refsource": "MISC",
"url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-21.html"
},
{
"name": "TA06-318A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-318A.html"
},
{
"name": "1016449",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016449"
},
{
"name": "28733",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28733"
},
{
"name": "22268",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22268"
},
{
"name": "ADV-2006-4507",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4507"
},
{
"name": "19980",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19980"
},
{
"name": "22187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22187"
},
{
"name": "ADV-2006-2702",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2702"
},
{
"name": "ADV-2006-3852",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3852"
},
{
"name": "22882",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22882"
},
{
"name": "21865",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21865"
},
{
"name": "APPLE-SA-2006-09-29",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html"
},
{
"name": "macromedia-swf-dos(27602)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27602"
},
{
"name": "oval:org.mitre.oval:def:432",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A432"
},
{
"name": "SUSE-SA:2006:053",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html"
},
{
"name": "1016829",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016829"
},
{
"name": "21901",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21901"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb06-11.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb06-11.html"
},
{
"name": "RHSA-2006:0674",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0674.html"
},
{
"name": "ADV-2006-3577",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3577"
},
{
"name": "MS06-069",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069"
},
{
"name": "GLSA-200610-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200610-02.xml"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060713 PHORUM 5 arbitrary local inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/439976/100/0/threaded"
},
{
"name" : "http://retrogod.altervista.org/phorum5_local_incl_xpl.html",
"refsource" : "MISC",
"url" : "http://retrogod.altervista.org/phorum5_local_incl_xpl.html"
},
{
"name": "http://www.phorum.org/phorum5/read.php?14,114358",
"refsource": "MISC",
@ -71,6 +61,16 @@
"name": "ADV-2006-2794",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2794"
},
{
"name": "20060713 PHORUM 5 arbitrary local inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/439976/100/0/threaded"
},
{
"name": "http://retrogod.altervista.org/phorum5_local_incl_xpl.html",
"refsource": "MISC",
"url": "http://retrogod.altervista.org/phorum5_local_incl_xpl.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "ADV-2006-4723",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4723"
},
{
"name": "23109",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23109"
},
{
"name": "ADV-2006-4723",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4723"
}
]
}

View File

@ -52,31 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "GLSA-200612-15",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200612-15.xml"
},
{
"name" : "21592",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21592"
},
{
"name" : "ADV-2006-5023",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/5023"
},
{
"name" : "1017385",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017385"
},
{
"name" : "23278",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23278"
},
{
"name": "23429",
"refsource": "SECUNIA",
@ -86,6 +61,31 @@
"name": "mcafee-dtrpath-code-execution(30898)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30898"
},
{
"name": "23278",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23278"
},
{
"name": "1017385",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017385"
},
{
"name": "ADV-2006-5023",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5023"
},
{
"name": "21592",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21592"
},
{
"name": "GLSA-200612-15",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200612-15.xml"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "2979",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2979"
},
{
"name": "21721",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21721"
},
{
"name" : "ADV-2006-5147",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/5147"
"name": "2979",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2979"
},
{
"name": "23477",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23477"
},
{
"name": "ADV-2006-5147",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5147"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-0026",
"STATE": "PUBLIC"
},
@ -53,54 +53,54 @@
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-11-001/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-11-001/"
},
{
"name" : "http://support.avaya.com/css/P8/documents/100124846",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100124846"
},
{
"name" : "MS11-002",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-002"
},
{
"name" : "TA11-011A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA11-011A.html"
"name": "ADV-2011-0075",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0075"
},
{
"name": "45695",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45695"
},
{
"name": "MS11-002",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-002"
},
{
"name": "70443",
"refsource": "OSVDB",
"url": "http://osvdb.org/70443"
},
{
"name" : "oval:org.mitre.oval:def:12333",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12333"
},
{
"name": "1024947",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024947"
},
{
"name": "oval:org.mitre.oval:def:12333",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12333"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-11-001/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-001/"
},
{
"name": "42804",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42804"
},
{
"name" : "ADV-2011-0075",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0075"
"name": "TA11-011A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-011A.html"
},
{
"name": "http://support.avaya.com/css/P8/documents/100124846",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100124846"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0133",
"STATE": "PUBLIC"
},
@ -52,21 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-11-099",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-11-099"
},
{
"name" : "http://support.apple.com/kb/HT4554",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4554"
},
{
"name": "http://support.apple.com/kb/HT4564",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4564"
},
{
"name": "oval:org.mitre.oval:def:17072",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17072"
},
{
"name": "http://support.apple.com/kb/HT4566",
"refsource": "CONFIRM",
@ -82,15 +77,20 @@
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-11-099",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-099"
},
{
"name": "http://support.apple.com/kb/HT4554",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4554"
},
{
"name": "APPLE-SA-2011-03-09-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"name" : "oval:org.mitre.oval:def:17072",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17072"
}
]
}

View File

@ -58,24 +58,9 @@
"url": "http://seclists.org/bugtraq/2011/Feb/36"
},
{
"name" : "20110205 TWSL2011-002:Vulnerabilities in Comcast DOCSIS 3.0 Business Gateways (SMCD3G-CCR)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/516205/100/0/threaded"
},
{
"name" : "16123",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/16123/"
},
{
"name" : "https://www.trustwave.com/spiderlabs/advisories/TWSL2011-002.txt",
"refsource" : "MISC",
"url" : "https://www.trustwave.com/spiderlabs/advisories/TWSL2011-002.txt"
},
{
"name" : "46215",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46215"
"name": "smcd3gccr-interface-csrf(65185)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65185"
},
{
"name": "43199",
@ -88,9 +73,24 @@
"url": "http://securityreason.com/securityalert/8068"
},
{
"name" : "smcd3gccr-interface-csrf(65185)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65185"
"name": "46215",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46215"
},
{
"name": "16123",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/16123/"
},
{
"name": "20110205 TWSL2011-002:Vulnerabilities in Comcast DOCSIS 3.0 Business Gateways (SMCD3G-CCR)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516205/100/0/threaded"
},
{
"name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2011-002.txt",
"refsource": "MISC",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2011-002.txt"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "IC70473",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IC70473"
},
{
"name": "oval:org.mitre.oval:def:14720",
"refsource": "OVAL",
@ -66,6 +61,11 @@
"name": "db2-stmm-dos(71043)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71043"
},
{
"name": "IC70473",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC70473"
}
]
}

View File

@ -58,19 +58,9 @@
"url": "http://www.exploit-db.com/exploits/17127"
},
{
"name" : "http://www.autosectools.com/Advisories/eyeOS.2.3_Reflected.Cross-site.Scripting_172.html",
"refsource" : "MISC",
"url" : "http://www.autosectools.com/Advisories/eyeOS.2.3_Reflected.Cross-site.Scripting_172.html"
},
{
"name" : "http://blog.eyeos.org/en/2011/04/07/about-some-eyeos-security-issues/",
"refsource" : "CONFIRM",
"url" : "http://blog.eyeos.org/en/2011/04/07/about-some-eyeos-security-issues/"
},
{
"name" : "47184",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/47184"
"name": "71720",
"refsource": "OSVDB",
"url": "http://osvdb.org/71720"
},
{
"name": "71718",
@ -78,14 +68,19 @@
"url": "http://osvdb.org/71718"
},
{
"name" : "71720",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/71720"
"name": "47184",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47184"
},
{
"name" : "43818",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43818"
"name": "http://blog.eyeos.org/en/2011/04/07/about-some-eyeos-security-issues/",
"refsource": "CONFIRM",
"url": "http://blog.eyeos.org/en/2011/04/07/about-some-eyeos-security-issues/"
},
{
"name": "eyeos-jsonpprimitive-xss(66574)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66574"
},
{
"name": "43997",
@ -93,9 +88,14 @@
"url": "http://secunia.com/advisories/43997"
},
{
"name" : "eyeos-jsonpprimitive-xss(66574)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66574"
"name": "43818",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43818"
},
{
"name": "http://www.autosectools.com/Advisories/eyeOS.2.3_Reflected.Cross-site.Scripting_172.html",
"refsource": "MISC",
"url": "http://www.autosectools.com/Advisories/eyeOS.2.3_Reflected.Cross-site.Scripting_172.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2415",
"STATE": "PUBLIC"
},
@ -52,30 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
},
{
"name" : "RHSA-2011:1144",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1144.html"
},
{
"name": "SUSE-SA:2011:033",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html"
},
{
"name" : "SUSE-SU-2011:0894",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html"
},
{
"name" : "openSUSE-SU-2011:0897",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html"
"name": "48308",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48308"
},
{
"name": "TA11-222A",
@ -83,9 +68,9 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html"
},
{
"name" : "49077",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/49077"
"name": "oval:org.mitre.oval:def:16070",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16070"
},
{
"name": "oval:org.mitre.oval:def:13940",
@ -93,14 +78,29 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13940"
},
{
"name" : "oval:org.mitre.oval:def:16070",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16070"
"name": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
},
{
"name" : "48308",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48308"
"name": "49077",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49077"
},
{
"name": "SUSE-SU-2011:0894",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html"
},
{
"name": "RHSA-2011:1144",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1144.html"
},
{
"name": "openSUSE-SU-2011:0897",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-3237",
"STATE": "PUBLIC"
},
@ -58,25 +58,15 @@
"url": "http://support.apple.com/kb/HT4981"
},
{
"name" : "http://support.apple.com/kb/HT4999",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4999"
},
{
"name" : "http://support.apple.com/kb/HT5000",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5000"
"name": "APPLE-SA-2011-10-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"name": "APPLE-SA-2011-10-11-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html"
},
{
"name" : "APPLE-SA-2011-10-12-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"name": "APPLE-SA-2011-10-12-4",
"refsource": "APPLE",
@ -88,9 +78,9 @@
"url": "http://www.securityfocus.com/bid/50066"
},
{
"name" : "76351",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/76351"
"name": "http://support.apple.com/kb/HT4999",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4999"
},
{
"name": "oval:org.mitre.oval:def:17207",
@ -101,6 +91,16 @@
"name": "apple-itunes-mem-cor-ce(70514)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70514"
},
{
"name": "http://support.apple.com/kb/HT5000",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5000"
},
{
"name": "76351",
"refsource": "OSVDB",
"url": "http://osvdb.org/76351"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-3996",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.controlsystemworks.com/ProductHistory.aspx",
"refsource" : "CONFIRM",
"url" : "http://www.controlsystemworks.com/ProductHistory.aspx"
"name": "JVNDB-2011-000095",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000095"
},
{
"name": "http://www.controlsystemworks.com/blogengine/post/CSWorks-2041151-security-release.aspx",
@ -68,24 +68,24 @@
"url": "http://jvn.jp/en/jp/JVN98649286/index.html"
},
{
"name" : "JVNDB-2011-000095",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000095"
"name": "csworks-tcp-dos(71079)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71079"
},
{
"name": "50458",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50458"
},
{
"name": "http://www.controlsystemworks.com/ProductHistory.aspx",
"refsource": "CONFIRM",
"url": "http://www.controlsystemworks.com/ProductHistory.aspx"
},
{
"name": "46625",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46625"
},
{
"name" : "csworks-tcp-dos(71079)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71079"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4299",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://git.moodle.org/gw?p=moodle.git;a=commit;h=a459fd90625ae44d7b3ac10b65da2dc631a418e7",
"refsource" : "CONFIRM",
"url" : "http://git.moodle.org/gw?p=moodle.git;a=commit;h=a459fd90625ae44d7b3ac10b65da2dc631a418e7"
},
{
"name": "http://moodle.org/mod/forum/discuss.php?d=188310",
"refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=188310"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=a459fd90625ae44d7b3ac10b65da2dc631a418e7",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=a459fd90625ae44d7b3ac10b65da2dc631a418e7"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444",
"refsource": "CONFIRM",

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg24031456",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg24031456"
},
{
"name" : "IZ94277",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1IZ94277"
},
{
"name": "50864",
"refsource": "BID",
@ -77,6 +67,16 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46999"
},
{
"name": "IZ94277",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=swg1IZ94277"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg24031456",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24031456"
},
{
"name": "tivnetcoolreporter-script-cmd-execution(71663)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-5058",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-5151",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT5934",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5934"
},
{
"name" : "APPLE-SA-2013-09-18-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
},
{
"name": "1029054",
"refsource": "SECTRACK",
@ -71,6 +61,16 @@
"name": "54886",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54886"
},
{
"name": "http://support.apple.com/kb/HT5934",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5934"
},
{
"name": "APPLE-SA-2013-09-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-5543",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-2479",
"STATE": "PUBLIC"
},
@ -53,14 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
@ -68,9 +68,9 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.tibco.com/mk/advisory.jsp",
"refsource" : "CONFIRM",
"url" : "http://www.tibco.com/mk/advisory.jsp"
},
{
"name": "http://www.tibco.com/multimedia/rendezvous_advisory_20140408_tcm8-20763.txt",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/multimedia/rendezvous_advisory_20140408_tcm8-20763.txt"
},
{
"name": "http://www.tibco.com/mk/advisory.jsp",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/mk/advisory.jsp"
},
{
"name": "1030070",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-2782",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MS14-035",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
"name": "1030370",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030370"
},
{
"name": "68101",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/68101"
},
{
"name" : "1030370",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030370"
"name": "MS14-035",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[linux-kernel] 20140411 net: ipv4: current group_info should be put after using.",
"refsource" : "MLIST",
"url" : "https://lkml.org/lkml/2014/4/10/736"
},
{
"name" : "[oss-security] 20140411 Re: CVE request -- Linux kernel: net: ping: refcount issue in ping_init_sock() function",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/04/11/4"
"name": "https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=b04c46190219a4f845e46a459e3102137b7f6cac",
"refsource": "CONFIRM",
"url": "https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=b04c46190219a4f845e46a459e3102137b7f6cac"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1086730",
@ -68,9 +63,24 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1086730"
},
{
"name" : "https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=b04c46190219a4f845e46a459e3102137b7f6cac",
"refsource" : "CONFIRM",
"url" : "https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=b04c46190219a4f845e46a459e3102137b7f6cac"
"name": "1030769",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030769"
},
{
"name": "59386",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59386"
},
{
"name": "[linux-kernel] 20140411 net: ipv4: current group_info should be put after using.",
"refsource": "MLIST",
"url": "https://lkml.org/lkml/2014/4/10/736"
},
{
"name": "59599",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59599"
},
{
"name": "DSA-2926",
@ -83,19 +93,9 @@
"url": "http://www.securityfocus.com/bid/66779"
},
{
"name" : "1030769",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030769"
},
{
"name" : "59599",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59599"
},
{
"name" : "59386",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59386"
"name": "[oss-security] 20140411 Re: CVE request -- Linux kernel: net: ping: refcount issue in ping_init_sock() function",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/04/11/4"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-6153",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21693379",
"name": "http://www.ibm.com/support/docview.wss?uid=swg21693389",
"refsource": "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21693379"
},
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21693381",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21693381"
"url": "http://www.ibm.com/support/docview.wss?uid=swg21693389"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21693384",
@ -68,14 +63,9 @@
"url": "http://www.ibm.com/support/docview.wss?uid=swg21693384"
},
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21693387",
"name": "http://www.ibm.com/support/docview.wss?uid=swg21693379",
"refsource": "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21693387"
},
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21693389",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21693389"
"url": "http://www.ibm.com/support/docview.wss?uid=swg21693379"
},
{
"name": "IV64010",
@ -86,6 +76,16 @@
"name": "ibm-wsrr-cve20146153-cookie(97622)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97622"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21693381",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21693381"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21693387",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21693387"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-6184",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21695878",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21695878"
},
{
"name": "IT05707",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05707"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21695878",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695878"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-6336",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6890",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#367777",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6897",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#970665",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/970665"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#970665",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/970665"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7364",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#680793",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/680793"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#680793",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/680793"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7568",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#746705",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/746705"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#746705",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/746705"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7693",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#510777",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1038002",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038002"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0073",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "96637",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96637"
},
{
"name" : "1038002",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038002"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0094",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0094"
},
{
"name": "96682",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96682"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0094",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0094"
},
{
"name": "1038006",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0428",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-02-01.html",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-02-01.html"
},
{
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
"refsource" : "CONFIRM",
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
"name": "1037798",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037798"
},
{
"name": "96070",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/96070"
},
{
"name" : "1037798",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037798"
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
},
{
"name": "https://source.android.com/security/bulletin/2017-02-01.html",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-02-01.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0553",
"STATE": "PUBLIC"
},
@ -67,16 +67,6 @@
},
"references": {
"reference_data": [
{
"name" : "[libnl] 20170503 ANN: libnl 3.3.0 released",
"refsource" : "MLIST",
"url" : "http://lists.infradead.org/pipermail/libnl/2017-May/002313.html"
},
{
"name" : "https://source.android.com/security/bulletin/2017-04-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-04-01"
},
{
"name": "http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb",
"refsource": "CONFIRM",
@ -88,9 +78,14 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KIHASXRQO2YTQPKVP4VGIB2XHPANG6YX/"
},
{
"name" : "FEDORA-2017-7a5363b41d",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VCF5KS6HOJZLFIY2ZSXSVSDQX65A2PU/"
"name": "https://source.android.com/security/bulletin/2017-04-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-04-01"
},
{
"name": "[libnl] 20170503 ANN: libnl 3.3.0 released",
"refsource": "MLIST",
"url": "http://lists.infradead.org/pipermail/libnl/2017-May/002313.html"
},
{
"name": "RHSA-2017:2299",
@ -98,9 +93,9 @@
"url": "https://access.redhat.com/errata/RHSA-2017:2299"
},
{
"name" : "USN-3311-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/usn/usn-3311-1/"
"name": "97340",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97340"
},
{
"name": "USN-3311-2",
@ -108,9 +103,14 @@
"url": "http://www.ubuntu.com/usn/USN-3311-2"
},
{
"name" : "97340",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97340"
"name": "FEDORA-2017-7a5363b41d",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VCF5KS6HOJZLFIY2ZSXSVSDQX65A2PU/"
},
{
"name": "USN-3311-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-3311-1/"
},
{
"name": "1038201",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-01-02T00:00:00",
"ID": "CVE-2017-0855",
"STATE": "PUBLIC"
@ -76,15 +76,15 @@
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2018-01-01"
},
{
"name" : "102414",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102414"
},
{
"name": "1040106",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040106"
},
{
"name": "102414",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102414"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-05-06T20:43:28.285993",
"ID": "CVE-2017-1000037",
"REQUESTER": "justin@justinsteven.com",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "RVM",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1.28.0 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "RVM"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-20"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.348607",
"ID": "CVE-2017-1000136",
"REQUESTER": "info@mahara.org",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Mahara",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "<1.8.6, <1.9.4, <1.10.1, <15.04.0"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Mahara"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Incorrect Access Control"
"value": "n/a"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1835",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1915",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4142",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,21 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "95792",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95792"
},
{
"name": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
},
{
"name" : "https://crbug.com/663620",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/663620"
},
{
"name" : "DSA-3776",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3776"
},
{
"name": "GLSA-201701-66",
"refsource": "GENTOO",
@ -78,14 +73,19 @@
"url": "http://rhn.redhat.com/errata/RHSA-2017-0206.html"
},
{
"name" : "95792",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95792"
"name": "https://crbug.com/663620",
"refsource": "CONFIRM",
"url": "https://crbug.com/663620"
},
{
"name": "1037718",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037718"
},
{
"name": "DSA-3776",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3776"
}
]
}

View File

@ -52,21 +52,26 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernel",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/01/21/3"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=497de07d89c1410d76a15bec2bb41f24a2a89f31",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=497de07d89c1410d76a15bec2bb41f24a2a89f31"
},
{
"name": "[oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernel",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/01/21/3"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6"
},
{
"name": "95717",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95717"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1416126",
"refsource": "CONFIRM",
@ -82,11 +87,6 @@
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3791"
},
{
"name" : "95717",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95717"
},
{
"name": "1038053",
"refsource": "SECTRACK",