"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:11:13 +00:00
parent eedd9e9efa
commit aefe4620a0
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
51 changed files with 4085 additions and 4085 deletions

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060117 [ TZO-012006 ] Checkpoint VPN-1 SecureClient insecure usage of CreateProcess()",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/422263/100/0/threaded"
"name": "ADV-2006-0258",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0258"
},
{
"name": "http://secdev.zoller.lu/research/checkpoint.txt",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/16290"
},
{
"name" : "ADV-2006-0258",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0258"
"name": "20060117 [ TZO-012006 ] Checkpoint VPN-1 SecureClient insecure usage of CreateProcess()",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/422263/100/0/threaded"
}
]
}

View File

@ -52,35 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20060202 CAID 33581 - CA Message Queuing Denial of Service Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/423785/100/0/threaded"
},
{
"name" : "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33581",
"refsource" : "MISC",
"url" : "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33581"
},
{
"name": "16475",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16475"
},
{
"name" : "ADV-2006-0414",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0414"
},
{
"name" : "1015571",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015571"
},
{
"name" : "18681",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18681"
"name": "ca-cam-spoofed-message-dos(24449)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24449"
},
{
"name": "404",
@ -88,9 +68,29 @@
"url": "http://securityreason.com/securityalert/404"
},
{
"name" : "ca-cam-spoofed-message-dos(24449)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24449"
"name": "1015571",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015571"
},
{
"name": "ADV-2006-0414",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0414"
},
{
"name": "18681",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18681"
},
{
"name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33581",
"refsource": "MISC",
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33581"
},
{
"name": "20060202 CAID 33581 - CA Message Queuing Denial of Service Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/423785/100/0/threaded"
}
]
}

View File

@ -53,25 +53,20 @@
"references": {
"reference_data": [
{
"name" : "20060207 QNX Neutrino RTOS passwd Command Buffer Overflow",
"refsource" : "IDEFENSE",
"url" : "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=388"
},
{
"name" : "20060207 QNX Neutrino RTOS su Command Buffer Overflow",
"refsource" : "IDEFENSE",
"url" : "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=385"
},
{
"name" : "16539",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16539"
"name": "qnx-su-bo(24554)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24554"
},
{
"name": "ADV-2006-0474",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0474"
},
{
"name": "18750",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18750"
},
{
"name": "22961",
"refsource": "OSVDB",
@ -88,19 +83,24 @@
"url": "http://securitytracker.com/id?1015599"
},
{
"name" : "18750",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18750"
"name": "20060207 QNX Neutrino RTOS passwd Command Buffer Overflow",
"refsource": "IDEFENSE",
"url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=388"
},
{
"name": "20060207 QNX Neutrino RTOS su Command Buffer Overflow",
"refsource": "IDEFENSE",
"url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=385"
},
{
"name": "16539",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16539"
},
{
"name": "qnx-passwd-bo(24551)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24551"
},
{
"name" : "qnx-su-bo(24554)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24554"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf"
},
{
"name" : "16727",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16727"
},
{
"name": "ADV-2006-0668",
"refsource": "VUPEN",
@ -76,6 +66,16 @@
"name": "xerox-workcentre-xss(24806)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24806"
},
{
"name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf",
"refsource": "CONFIRM",
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf"
},
{
"name": "16727",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16727"
}
]
}

View File

@ -52,36 +52,36 @@
},
"references": {
"reference_data": [
{
"name" : "APPLE-SA-2006-05-11",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2006/May/msg00003.html"
},
{
"name" : "TA06-132A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-132A.html"
},
{
"name": "17951",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17951"
},
{
"name": "1016078",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016078"
},
{
"name": "ADV-2006-1779",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1779"
},
{
"name": "TA06-132A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-132A.html"
},
{
"name": "APPLE-SA-2006-05-11",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2006/May/msg00003.html"
},
{
"name": "25593",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25593"
},
{
"name" : "1016078",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016078"
},
{
"name": "20077",
"refsource": "SECUNIA",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "17417",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17417"
},
{
"name": "1015878",
"refsource": "SECTRACK",
@ -66,6 +61,11 @@
"name": "19626",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19626"
},
{
"name": "17417",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17417"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "awstats-multiple-xss(25879)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25879"
},
{
"name": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html",
"refsource": "MISC",
@ -67,20 +72,15 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1421"
},
{
"name" : "19725",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19725"
},
{
"name": "22306",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22306"
},
{
"name" : "awstats-multiple-xss(25879)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25879"
"name": "19725",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19725"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "102543",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102543-1"
"name": "1016625",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016625"
},
{
"name": "sunfire-incorrect-signature-verification(28201)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28201"
},
{
"name": "19291",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19291"
},
{
"name" : "ADV-2006-3103",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3103"
},
{
"name" : "1016625",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016625"
},
{
"name": "21279",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21279"
},
{
"name" : "sunfire-incorrect-signature-verification(28201)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28201"
"name": "102543",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102543-1"
},
{
"name": "ADV-2006-3103",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3103"
}
]
}

View File

@ -52,21 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "ADV-2006-3222",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3222"
},
{
"name" : "27863",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27863"
},
{
"name": "27864",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27864"
},
{
"name": "ADV-2006-3222",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3222"
},
{
"name": "27865",
"refsource": "OSVDB",
@ -77,6 +72,11 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27866"
},
{
"name": "27863",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27863"
},
{
"name": "21412",
"refsource": "SECUNIA",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060803 GeheimChaos <= 0.5 Multiple SQL Injection Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/442209/100/100/threaded"
},
{
"name" : "20060803 GeheimChaos <= 0.5 Multiple SQL Injection",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=115464299914573&w=2"
"name": "21355",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21355"
},
{
"name": "19342",
@ -68,14 +63,9 @@
"url": "http://www.securityfocus.com/bid/19342"
},
{
"name" : "ADV-2006-3154",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3154"
},
{
"name" : "21355",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21355"
"name": "20060803 GeheimChaos <= 0.5 Multiple SQL Injection Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/442209/100/100/threaded"
},
{
"name": "1376",
@ -86,6 +76,16 @@
"name": "geheimchaos-gc-registieren-sql-injection(28221)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28221"
},
{
"name": "ADV-2006-3154",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3154"
},
{
"name": "20060803 GeheimChaos <= 0.5 Multiple SQL Injection",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=115464299914573&w=2"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "2270",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2270"
},
{
"name": "19751",
"refsource": "BID",
@ -68,14 +63,19 @@
"url": "http://www.vupen.com/english/advisories/2006/3414"
},
{
"name" : "21687",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21687"
"name": "2270",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2270"
},
{
"name": "phpgroupware-class-file-include(28627)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28627"
},
{
"name": "21687",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21687"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "20060817 Re: discloser 0.0.4 Remote File Inclusion (with Exploit)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443522/100/200/threaded"
},
{
"name": "20060816 discloser 0.0.4 Remote File Inclusion (with Exploit)",
"refsource": "BUGTRAQ",
@ -62,11 +67,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443710/100/100/threaded"
},
{
"name" : "20060817 Re: discloser 0.0.4 Remote File Inclusion (with Exploit)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443522/100/200/threaded"
},
{
"name": "20060819 Re: discloser 0.0.4 Remote File Inclusion (with Exploit)",
"refsource": "BUGTRAQ",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2527",
"STATE": "PUBLIC"
},
@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "[freetype] 20100712 FreeType 2.4.0 has been released",
"refsource" : "MLIST",
"url" : "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
},
{
"name" : "[oss-security] 20100714 Re: Multiple bugs in freetype",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=127912955808467&w=2"
},
{
"name" : "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec",
"refsource" : "CONFIRM",
"url" : "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec"
},
{
"name" : "http://savannah.nongnu.org/bugs/?30054",
"refsource" : "CONFIRM",
"url" : "http://savannah.nongnu.org/bugs/?30054"
"name": "USN-963-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-963-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=614557",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=614557"
},
{
"name": "[freetype] 20100712 FreeType 2.4.0 has been released",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
},
{
"name": "DSA-2070",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2070"
},
{
"name" : "RHSA-2010:0577",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0577.html"
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec"
},
{
"name": "1024266",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024266"
},
{
"name": "[oss-security] 20100714 Re: Multiple bugs in freetype",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127912955808467&w=2"
},
{
"name": "RHSA-2010:0578",
@ -93,14 +93,14 @@
"url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
},
{
"name" : "USN-963-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-963-1"
"name": "RHSA-2010:0577",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html"
},
{
"name" : "1024266",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1024266"
"name": "http://savannah.nongnu.org/bugs/?30054",
"refsource": "CONFIRM",
"url": "http://savannah.nongnu.org/bugs/?30054"
},
{
"name": "48951",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-2551",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "MS10-054",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-054"
},
{
"name": "TA10-222A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-222A.html"
},
{
"name": "MS10-054",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-054"
},
{
"name": "oval:org.mitre.oval:def:12015",
"refsource": "OVAL",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3085",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20100909 CVE request: mednafen stack manipulation",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/09/09/8"
},
{
"name": "[oss-security] 20100910 Re: CVE request: mednafen stack manipulation",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/09/11/3"
},
{
"name": "[oss-security] 20100909 CVE request: mednafen stack manipulation",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/09/09/8"
},
{
"name": "http://sourceforge.net/news/?group_id=150840&id=287363",
"refsource": "CONFIRM",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=51670",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=51670"
},
{
"name": "http://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=51670",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=51670"
},
{
"name": "oval:org.mitre.oval:def:11865",
"refsource": "OVAL",

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2010-2171",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2171"
},
{
"name": "41110",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41110"
},
{
"name": "14740",
"refsource": "EXPLOIT-DB",
@ -61,16 +71,6 @@
"name": "oval:org.mitre.oval:def:12035",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12035"
},
{
"name" : "41110",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41110"
},
{
"name" : "ADV-2010-2171",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2171"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3451",
"STATE": "PUBLIC"
},
@ -53,59 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.cs.brown.edu/people/drosenbe/research.html",
"refsource" : "MISC",
"url" : "http://www.cs.brown.edu/people/drosenbe/research.html"
},
{
"name" : "http://www.vsecurity.com/resources/advisory/20110126-1",
"refsource" : "MISC",
"url" : "http://www.vsecurity.com/resources/advisory/20110126-1"
},
{
"name" : "http://www.openoffice.org/security/cves/CVE-2010-3451_CVE-2010-3452.html",
"refsource" : "CONFIRM",
"url" : "http://www.openoffice.org/security/cves/CVE-2010-3451_CVE-2010-3452.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=641282",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=641282"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"
},
{
"name" : "DSA-2151",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2151"
},
{
"name" : "GLSA-201408-19",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
},
{
"name" : "MDVSA-2011:027",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:027"
},
{
"name" : "RHSA-2011:0181",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0181.html"
},
{
"name" : "RHSA-2011:0182",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0182.html"
},
{
"name" : "USN-1056-1",
"refsource" : "UBUNTU",
"url" : "http://ubuntu.com/usn/usn-1056-1"
"name": "40775",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40775"
},
{
"name": "46031",
@ -113,34 +63,9 @@
"url": "http://www.securityfocus.com/bid/46031"
},
{
"name" : "70712",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/70712"
},
{
"name" : "1025002",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025002"
},
{
"name" : "43065",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43065"
},
{
"name" : "42999",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42999"
},
{
"name" : "43105",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43105"
},
{
"name" : "43118",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43118"
"name": "DSA-2151",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2151"
},
{
"name": "60799",
@ -148,29 +73,104 @@
"url": "http://secunia.com/advisories/60799"
},
{
"name" : "40775",
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"
},
{
"name": "GLSA-201408-19",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
},
{
"name": "43118",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/40775"
"url": "http://secunia.com/advisories/43118"
},
{
"name": "43065",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43065"
},
{
"name": "ADV-2011-0230",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0230"
},
{
"name": "70712",
"refsource": "OSVDB",
"url": "http://osvdb.org/70712"
},
{
"name": "ooo-rtf-ce(65030)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65030"
},
{
"name": "1025002",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025002"
},
{
"name": "http://www.openoffice.org/security/cves/CVE-2010-3451_CVE-2010-3452.html",
"refsource": "CONFIRM",
"url": "http://www.openoffice.org/security/cves/CVE-2010-3451_CVE-2010-3452.html"
},
{
"name": "ADV-2011-0232",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0232"
},
{
"name": "RHSA-2011:0182",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0182.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=641282",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=641282"
},
{
"name": "USN-1056-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1056-1"
},
{
"name": "RHSA-2011:0181",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0181.html"
},
{
"name": "ADV-2011-0279",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0279"
},
{
"name" : "ooo-rtf-ce(65030)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65030"
"name": "43105",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43105"
},
{
"name": "MDVSA-2011:027",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:027"
},
{
"name": "http://www.vsecurity.com/resources/advisory/20110126-1",
"refsource": "MISC",
"url": "http://www.vsecurity.com/resources/advisory/20110126-1"
},
{
"name": "http://www.cs.brown.edu/people/drosenbe/research.html",
"refsource": "MISC",
"url": "http://www.cs.brown.edu/people/drosenbe/research.html"
},
{
"name": "42999",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42999"
}
]
}

View File

@ -52,105 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/09/28/10"
},
{
"name" : "http://bugs.mysql.com/bug.php?id=54007",
"refsource" : "CONFIRM",
"url" : "http://bugs.mysql.com/bug.php?id=54007"
},
{
"name" : "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
"refsource" : "CONFIRM",
"url" : "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
},
{
"name" : "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html",
"refsource" : "CONFIRM",
"url" : "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=628680",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628680"
},
{
"name" : "DSA-2143",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2143"
},
{
"name" : "MDVSA-2010:155",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
},
{
"name" : "MDVSA-2010:222",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
},
{
"name" : "MDVSA-2011:012",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
},
{
"name" : "RHSA-2010:0824",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
},
{
"name" : "RHSA-2010:0825",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
},
{
"name" : "RHSA-2011:0164",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
},
{
"name" : "SUSE-SR:2010:019",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name" : "SUSE-SR:2010:021",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
},
{
"name" : "TLSA-2011-3",
"refsource" : "TURBO",
"url" : "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
},
{
"name" : "USN-1017-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1017-1"
},
{
"name": "USN-1397-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1397-1"
},
{
"name" : "42633",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/42633"
},
{
"name": "42875",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42875"
},
{
"name" : "42936",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42936"
"name": "RHSA-2010:0824",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
},
{
"name": "USN-1017-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1017-1"
},
{
"name": "TLSA-2011-3",
"refsource": "TURBO",
"url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
},
{
"name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html"
},
{
"name": "MDVSA-2011:012",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
},
{
"name": "mysql-handler-interface-dos(64685)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64685"
},
{
"name": "ADV-2011-0105",
@ -158,24 +103,79 @@
"url": "http://www.vupen.com/english/advisories/2011/0105"
},
{
"name" : "ADV-2011-0133",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0133"
"name": "MDVSA-2010:222",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
},
{
"name": "RHSA-2011:0164",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
},
{
"name": "ADV-2011-0170",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0170"
},
{
"name": "ADV-2011-0133",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0133"
},
{
"name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
},
{
"name": "http://bugs.mysql.com/bug.php?id=54007",
"refsource": "CONFIRM",
"url": "http://bugs.mysql.com/bug.php?id=54007"
},
{
"name": "DSA-2143",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2143"
},
{
"name": "ADV-2011-0345",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0345"
},
{
"name" : "mysql-handler-interface-dos(64685)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64685"
"name": "MDVSA-2010:155",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
},
{
"name": "42936",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42936"
},
{
"name": "SUSE-SR:2010:021",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
},
{
"name": "RHSA-2010:0825",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
},
{
"name": "SUSE-SR:2010:019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name": "42633",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42633"
},
{
"name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf"
},
{
"name": "45766",
"refsource": "BID",
@ -67,15 +62,20 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024963"
},
{
"name" : "42942",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42942"
},
{
"name": "asa-multicast-dos(64600)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64600"
},
{
"name": "http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf"
},
{
"name": "42942",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42942"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://yuilibrary.com/forum/viewtopic.php?p=12923",
"refsource" : "MISC",
"url" : "http://yuilibrary.com/forum/viewtopic.php?p=12923"
"name": "http://yuilibrary.com/projects/yui2/ticket/2529231",
"refsource": "CONFIRM",
"url": "http://yuilibrary.com/projects/yui2/ticket/2529231"
},
{
"name": "http://yuilibrary.com/projects/yui2/ticket/2529228",
"refsource": "MISC",
"url": "http://yuilibrary.com/projects/yui2/ticket/2529228"
},
{
"name" : "http://yuilibrary.com/projects/yui2/ticket/2529231",
"refsource" : "CONFIRM",
"url" : "http://yuilibrary.com/projects/yui2/ticket/2529231"
},
{
"name": "yui-additem-xss(65180)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65180"
},
{
"name": "http://yuilibrary.com/forum/viewtopic.php?p=12923",
"refsource": "MISC",
"url": "http://yuilibrary.com/forum/viewtopic.php?p=12923"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-0598",
"STATE": "PUBLIC"
},
@ -53,59 +53,59 @@
"references": {
"reference_data": [
{
"name" : "20110208 ZDI-11-073: Adobe Reader ICC Parsing Remote Code Execution Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/516315/100/0/threaded"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-11-073/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-11-073/"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
},
{
"name" : "RHSA-2011:0301",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0301.html"
},
{
"name" : "46219",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46219"
},
{
"name" : "oval:org.mitre.oval:def:12081",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12081"
},
{
"name" : "1025033",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025033"
"name": "ADV-2011-0492",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0492"
},
{
"name": "43470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43470"
},
{
"name": "adobe-reader-ace-bo(65302)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65302"
},
{
"name": "RHSA-2011:0301",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0301.html"
},
{
"name": "20110208 ZDI-11-073: Adobe Reader ICC Parsing Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516315/100/0/threaded"
},
{
"name": "ADV-2011-0337",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0337"
},
{
"name" : "ADV-2011-0492",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0492"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-11-073/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-073/"
},
{
"name" : "adobe-reader-ace-bo(65302)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65302"
"name": "1025033",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025033"
},
{
"name": "oval:org.mitre.oval:def:12081",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12081"
},
{
"name": "46219",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46219"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46537"
},
{
"name" : "43483",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43483"
},
{
"name": "ADV-2011-0476",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0476"
},
{
"name": "43483",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43483"
}
]
}

View File

@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20110330 VMSA-2011-0006 VMware vmrun utility local privilege escalation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/517240/100/0/threaded"
},
{
"name" : "[security-announce] 20110330 UPDATED VMSA-2011-0006.1 VMware vmrun utility local privilege escalation",
"refsource" : "MLIST",
"url" : "http://lists.vmware.com/pipermail/security-announce/2011/000131.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0006.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0006.html"
},
{
"name" : "47094",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/47094"
},
{
"name": "1025270",
"refsource": "SECTRACK",
@ -82,16 +62,6 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43885"
},
{
"name" : "43943",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43943"
},
{
"name" : "8173",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/8173"
},
{
"name": "ADV-2011-0816",
"refsource": "VUPEN",
@ -101,6 +71,36 @@
"name": "vmware-vmrun-privilege-escalation(66472)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66472"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0006.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0006.html"
},
{
"name": "[security-announce] 20110330 UPDATED VMSA-2011-0006.1 VMware vmrun utility local privilege escalation",
"refsource": "MLIST",
"url": "http://lists.vmware.com/pipermail/security-announce/2011/000131.html"
},
{
"name": "20110330 VMSA-2011-0006 VMware vmrun utility local privilege escalation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/517240/100/0/threaded"
},
{
"name": "43943",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43943"
},
{
"name": "47094",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47094"
},
{
"name": "8173",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8173"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1479",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2011/04/11/1"
},
{
"name" : "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"name": "https://github.com/torvalds/linux/commit/d0de4dc584ec6aa3b26fffea320a8457827768fc",
"refsource": "CONFIRM",
"url" : "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
"url": "https://github.com/torvalds/linux/commit/d0de4dc584ec6aa3b26fffea320a8457827768fc"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d0de4dc584ec6aa3b26fffea320a8457827768fc",
@ -73,9 +73,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=691793"
},
{
"name" : "https://github.com/torvalds/linux/commit/d0de4dc584ec6aa3b26fffea320a8457827768fc",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/d0de4dc584ec6aa3b26fffea320a8457827768fc"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1752",
"STATE": "PUBLIC"
},
@ -52,71 +52,91 @@
},
"references": {
"reference_data": [
{
"name" : "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt",
"refsource" : "CONFIRM",
"url" : "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt"
},
{
"name" : "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=709111",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=709111"
},
{
"name" : "http://support.apple.com/kb/HT5130",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5130"
},
{
"name" : "APPLE-SA-2012-02-01-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name": "DSA-2251",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2251"
},
{
"name" : "FEDORA-2011-8341",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html"
},
{
"name" : "FEDORA-2011-8352",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html"
},
{
"name" : "MDVSA-2011:106",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106"
},
{
"name" : "RHSA-2011:0861",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0861.html"
},
{
"name" : "RHSA-2011:0862",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0862.html"
},
{
"name": "USN-1144-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1144-1"
},
{
"name": "http://support.apple.com/kb/HT5130",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5130"
},
{
"name": "MDVSA-2011:106",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106"
},
{
"name": "44849",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44849"
},
{
"name": "RHSA-2011:0862",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html"
},
{
"name": "FEDORA-2011-8341",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html"
},
{
"name": "44888",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44888"
},
{
"name": "APPLE-SA-2012-02-01-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name": "45162",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45162"
},
{
"name": "44681",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44681"
},
{
"name": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt",
"refsource": "CONFIRM",
"url": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt"
},
{
"name": "44879",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44879"
},
{
"name": "48091",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48091"
},
{
"name": "FEDORA-2011-8352",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=709111",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111"
},
{
"name": "44633",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44633"
},
{
"name": "oval:org.mitre.oval:def:18922",
"refsource": "OVAL",
@ -128,34 +148,14 @@
"url": "http://www.securitytracker.com/id?1025617"
},
{
"name" : "44633",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44633"
"name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES"
},
{
"name" : "44681",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44681"
},
{
"name" : "45162",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/45162"
},
{
"name" : "44849",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44849"
},
{
"name" : "44879",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44879"
},
{
"name" : "44888",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44888"
"name": "RHSA-2011:0861",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0861.html"
}
]
}

View File

@ -52,11 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "sit-multiple-file-upload(71651)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71651"
},
{
"name": "VU#576355",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/576355"
},
{
"name": "45437",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45437"
},
{
"name": "50896",
"refsource": "BID",
@ -66,16 +76,6 @@
"name": "77653",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/77653"
},
{
"name" : "45437",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/45437"
},
{
"name" : "sit-multiple-file-upload(71651)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71651"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-3106",
"STATE": "PUBLIC"
},

View File

@ -52,11 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "https://www.elastic.co/blog/logstash-1-4-3-released",
"refsource": "CONFIRM",
"url": "https://www.elastic.co/blog/logstash-1-4-3-released"
},
{
"name": "33370",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/33370"
},
{
"name": "67731",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67731"
},
{
"name": "106949",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/106949"
},
{
"name": "http://bouk.co/blog/elasticsearch-rce/",
"refsource": "MISC",
@ -72,25 +87,10 @@
"refsource": "MISC",
"url": "https://www.found.no/foundation/elasticsearch-security/#staying-safe-while-developing-with-elasticsearch"
},
{
"name" : "https://www.elastic.co/blog/logstash-1-4-3-released",
"refsource" : "CONFIRM",
"url" : "https://www.elastic.co/blog/logstash-1-4-3-released"
},
{
"name": "https://www.elastic.co/community/security/",
"refsource": "CONFIRM",
"url": "https://www.elastic.co/community/security/"
},
{
"name" : "67731",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/67731"
},
{
"name" : "106949",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/106949"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3544",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "34169",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/34169"
},
{
"name": "[oss-security] 20140721 Moodle security notifications public",
"refsource": "MLIST",
@ -67,15 +62,30 @@
"refsource": "MISC",
"url": "http://osandamalith.wordpress.com/2014/07/25/moodle-2-7-persistent-xss/"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45683",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45683"
},
{
"name": "http://packetstormsecurity.com/files/127624/Moodle-2.7-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127624/Moodle-2.7-Cross-Site-Scripting.html"
},
{
"name" : "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45683",
"refsource" : "CONFIRM",
"url" : "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45683"
"name": "34169",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/34169"
},
{
"name": "109337",
"refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/109337"
},
{
"name": "68756",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68756"
},
{
"name": "https://github.com/moodle/moodle/commit/ce5a785b0962c3c94c7a7b0d36176482d21db95d",
@ -86,16 +96,6 @@
"name": "https://moodle.org/mod/forum/discuss.php?d=264265",
"refsource": "CONFIRM",
"url": "https://moodle.org/mod/forum/discuss.php?d=264265"
},
{
"name" : "68756",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68756"
},
{
"name" : "109337",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/show/osvdb/109337"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6970",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#795545",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/795545"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#795545",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/795545"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7329",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#908273",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/908273"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#908273",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/908273"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-7400",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-7673",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20141107 Open-Xchange Security Advisory 2014-11-07",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/533936/100/0/threaded"
},
{
"name": "http://packetstormsecurity.com/files/129020/OX-App-Suite-7.6.0-SQL-Injection.html",
"refsource": "MISC",
@ -67,6 +62,11 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70982"
},
{
"name": "20141107 Open-Xchange Security Advisory 2014-11-07",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533936/100/0/threaded"
},
{
"name": "oxappsuite-cve20147871-sql-injection(98563)",
"refsource": "XF",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8292",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,41 @@
},
"references": {
"reference_data": [
{
"name": "70749",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70749"
},
{
"name": "SUSE-SU-2015:0736",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"
},
{
"name": "[linux-kernel] 20141024 [PATCH 13/14] kvm: fix excessive pages un-pinning in kvm_iommu_map error path.",
"refsource": "MLIST",
"url": "https://lkml.org/lkml/2014/10/24/460"
},
{
"name": "DSA-3093",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3093"
},
{
"name": "62326",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62326"
},
{
"name": "SUSE-SU-2015:0481",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"
},
{
"name": "openSUSE-SU-2015:0566",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"name": "[oss-security] 20141024 CVE-2014-8369 - Linux kernel iommu.c excessive unpinning",
"refsource": "MLIST",
@ -73,39 +103,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1156518"
},
{
"name" : "https://github.com/torvalds/linux/commit/3d32e4dbe71374a6780eaf51d719d76f9a9bf22f",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/3d32e4dbe71374a6780eaf51d719d76f9a9bf22f"
},
{
"name" : "DSA-3093",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-3093"
},
{
"name" : "RHSA-2015:0674",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0674.html"
},
{
"name" : "SUSE-SU-2015:0481",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"
},
{
"name" : "openSUSE-SU-2015:0566",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"name" : "SUSE-SU-2015:0736",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"
},
{
"name" : "70749",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70749"
"name": "62336",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62336"
},
{
"name": "70747",
@ -113,14 +113,14 @@
"url": "http://www.securityfocus.com/bid/70747"
},
{
"name" : "62326",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62326"
"name": "https://github.com/torvalds/linux/commit/3d32e4dbe71374a6780eaf51d719d76f9a9bf22f",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/3d32e4dbe71374a6780eaf51d719d76f9a9bf22f"
},
{
"name" : "62336",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62336"
"name": "RHSA-2015:0674",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0674.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8444",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20141210 Multiple vulnerabilities in InfiniteWP Admin Panel",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/43"
},
{
"name": "https://lifeforms.nl/20141210/infinitewp-vulnerabilities/",
"refsource": "MISC",
"url": "https://lifeforms.nl/20141210/infinitewp-vulnerabilities/"
},
{
"name": "20141210 Multiple vulnerabilities in InfiniteWP Admin Panel",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/43"
}
]
}

View File

@ -52,11 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "FEDORA-2016-20cc04ac50",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html"
},
{
"name": "89417",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/89417"
},
{
"name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.8.16 released",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA@mail.gmail.com%3E"
},
{
"name": "SSA:2016-121-01",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496"
},
{
"name": "openSUSE-SU-2016:1264",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html"
},
{
"name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.9.4 released",
"refsource": "MLIST",
@ -67,45 +87,25 @@
"refsource": "CONFIRM",
"url": "http://subversion.apache.org/security/CVE-2016-2167-advisory.txt"
},
{
"name" : "DSA-3561",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3561"
},
{
"name" : "FEDORA-2016-20cc04ac50",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html"
},
{
"name" : "GLSA-201610-05",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201610-05"
},
{
"name" : "SSA:2016-121-01",
"refsource" : "SLACKWARE",
"url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496"
},
{
"name": "openSUSE-SU-2016:1263",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html"
},
{
"name" : "openSUSE-SU-2016:1264",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html"
},
{
"name" : "89417",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/89417"
"name": "DSA-3561",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3561"
},
{
"name": "1035706",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035706"
},
{
"name": "GLSA-201610-05",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-05"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2553",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2016-6023",
"STATE": "PUBLIC"
},

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-cbr-8",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-cbr-8"
"name": "1037003",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037003"
},
{
"name": "93518",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/93518"
},
{
"name" : "1037003",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037003"
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-cbr-8",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-cbr-8"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-6829",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "https://www.suse.com/security/cve//CVE-2016-6829.html",
"refsource": "CONFIRM",
"url": "https://www.suse.com/security/cve//CVE-2016-6829.html"
},
{
"name": "[oss-security] 20160816 CVE Request: Default password in openstack / crowbar trove",
"refsource": "MLIST",
@ -67,20 +72,15 @@
"refsource": "CONFIRM",
"url": "https://github.com/crowbar/barclamp-trove/commit/932298f250365fed6963700870e52db3a7a32daa"
},
{
"name" : "https://github.com/crowbar/crowbar-openstack/commit/208230bdfbcb19d062149d083b1a66b429516a69",
"refsource" : "CONFIRM",
"url" : "https://github.com/crowbar/crowbar-openstack/commit/208230bdfbcb19d062149d083b1a66b429516a69"
},
{
"name" : "https://www.suse.com/security/cve//CVE-2016-6829.html",
"refsource" : "CONFIRM",
"url" : "https://www.suse.com/security/cve//CVE-2016-6829.html"
},
{
"name": "92476",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92476"
},
{
"name": "https://github.com/crowbar/crowbar-openstack/commit/208230bdfbcb19d062149d083b1a66b429516a69",
"refsource": "CONFIRM",
"url": "https://github.com/crowbar/crowbar-openstack/commit/208230bdfbcb19d062149d083b1a66b429516a69"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products",
"refsource" : "CONFIRM",
"url" : "https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products"
},
{
"name": "96956",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96956"
},
{
"name": "https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products",
"refsource": "CONFIRM",
"url": "https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products"
}
]
}

View File

@ -80,74 +80,74 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1336622",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1336622"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-05/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-05/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-06/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-06/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-07/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-07/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-09/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-09/"
},
{
"name" : "DSA-3805",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2017/dsa-3805"
},
{
"name" : "DSA-3832",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2017/dsa-3832"
},
{
"name" : "GLSA-201705-06",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201705-06"
},
{
"name" : "GLSA-201705-07",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201705-07"
"name": "96693",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96693"
},
{
"name": "RHSA-2017:0459",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0459.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1336622",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1336622"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-09/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-09/"
},
{
"name": "DSA-3832",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3832"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-07/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-07/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-05/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-05/"
},
{
"name": "1037966",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037966"
},
{
"name": "GLSA-201705-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201705-06"
},
{
"name": "RHSA-2017:0461",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0461.html"
},
{
"name": "DSA-3805",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3805"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-06/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-06/"
},
{
"name": "RHSA-2017:0498",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0498.html"
},
{
"name" : "96693",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96693"
},
{
"name" : "1037966",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037966"
"name": "GLSA-201705-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201705-07"
}
]
}