"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:20:11 +00:00
parent 4a02c01d43
commit af64c43caa
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3749 additions and 3749 deletions

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "SuSE-SA:2001:12",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2001_012_vim.html"
},
{ {
"name": "CSSA-2001-014.0", "name": "CSSA-2001-014.0",
"refsource": "CALDERA", "refsource": "CALDERA",
@ -66,6 +61,11 @@
"name": "vim-tmp-symlink(6628)", "name": "vim-tmp-symlink(6628)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6628" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6628"
},
{
"name": "SuSE-SA:2001:12",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2001_012_vim.html"
} }
] ]
} }

View File

@ -53,8 +53,8 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20010429 Winamp 2.6x / 2.7x buffer overflow ",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"name": "20010429 Winamp 2.6x / 2.7x buffer overflow",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0518.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0518.html"
} }
] ]

View File

@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "19991108 Interscan VirusWall NT 3.23/3.3 buffer overflow.",
"refsource" : "NTBUGTRAQ",
"url" : "http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9911&L=NTBUGTRAQ&P=R2331"
},
{
"name" : "19991109 InterScan VirusWall 3.23/3.3 Buffer Overflow",
"refsource" : "NTBUGTRAQ",
"url" : "http://marc.info/?l=ntbugtraq&m=94216491202063&w=2"
},
{ {
"name": "19991108 Patch for VirusWall 3.23.", "name": "19991108 Patch for VirusWall 3.23.",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=94204166130782&w=2" "url": "http://marc.info/?l=bugtraq&m=94204166130782&w=2"
}, },
{
"name": "19991108 Interscan VirusWall NT 3.23/3.3 buffer overflow.",
"refsource": "NTBUGTRAQ",
"url": "http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9911&L=NTBUGTRAQ&P=R2331"
},
{ {
"name": "19991108 Patch for VirusWall 3.23.", "name": "19991108 Patch for VirusWall 3.23.",
"refsource": "NTBUGTRAQ", "refsource": "NTBUGTRAQ",
"url": "http://marc.info/?l=ntbugtraq&m=94208143007829&w=2" "url": "http://marc.info/?l=ntbugtraq&m=94208143007829&w=2"
}, },
{
"name": "19991109 InterScan VirusWall 3.23/3.3 Buffer Overflow",
"refsource": "NTBUGTRAQ",
"url": "http://marc.info/?l=ntbugtraq&m=94216491202063&w=2"
},
{ {
"name": "viruswall-helo-bo(3465)", "name": "viruswall-helo-bo(3465)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20010619 SurgeFTP vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/191916"
},
{ {
"name": "http://www.netwinsite.com/surgeftp/manual/updates.htm", "name": "http://www.netwinsite.com/surgeftp/manual/updates.htm",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.netwinsite.com/surgeftp/manual/updates.htm" "url": "http://www.netwinsite.com/surgeftp/manual/updates.htm"
}, },
{ {
"name" : "2892", "name": "20010619 SurgeFTP vulnerabilities",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/2892" "url": "http://www.securityfocus.com/archive/1/191916"
}, },
{ {
"name": "surgeftp-nlist-directory-traversal(6711)", "name": "surgeftp-nlist-directory-traversal(6711)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6711" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6711"
},
{
"name": "2892",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2892"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "2816",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2816"
},
{ {
"name": "20010602 fpf module and packet fragmentation:local/remote DoS.", "name": "20010602 fpf module and packet fragmentation:local/remote DoS.",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -66,11 +71,6 @@
"name": "linux-fpf-kernel-dos(6659)", "name": "linux-fpf-kernel-dos(6659)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6659" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6659"
},
{
"name" : "2816",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2816"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/201715" "url": "http://www.securityfocus.com/archive/1/201715"
}, },
{
"name" : "VU#314347",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/314347"
},
{ {
"name": "3142", "name": "3142",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "phpbb-admin-access(6944)", "name": "phpbb-admin-access(6944)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6944" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6944"
},
{
"name": "VU#314347",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/314347"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20011217 Dangerous information in CentraOne Log files, possible user impersonation", "name": "centraone-log-file-info(7820)",
"refsource" : "VULNWATCH", "refsource": "XF",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2001-q4/0072.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7820"
}, },
{ {
"name": "20011226 Dangerous information in CentraOne log files - VENDOR RESPONSE", "name": "20011226 Dangerous information in CentraOne log files - VENDOR RESPONSE",
"refsource": "NTBUGTRAQ", "refsource": "NTBUGTRAQ",
"url": "http://archives.neohapsis.com/archives/ntbugtraq/2001-q4/0205.html" "url": "http://archives.neohapsis.com/archives/ntbugtraq/2001-q4/0205.html"
}, },
{
"name": "20011217 Dangerous information in CentraOne Log files, possible user impersonation",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2001-q4/0072.html"
},
{ {
"name": "3704", "name": "3704",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/3704" "url": "http://www.securityfocus.com/bid/3704"
},
{
"name" : "centraone-log-file-info(7820)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7820"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://support.3com.com/infodeli/tools/switches/baseline/3C16486_V1_0_2_0_readme.pdf", "name": "ADV-2006-1510",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://support.3com.com/infodeli/tools/switches/baseline/3C16486_V1_0_2_0_readme.pdf" "url": "http://www.vupen.com/english/advisories/2006/1510"
},
{
"name": "3com-baseline-dhcp-dos(26076)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26076"
}, },
{ {
"name": "17686", "name": "17686",
@ -63,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/17686" "url": "http://www.securityfocus.com/bid/17686"
}, },
{ {
"name" : "ADV-2006-1510", "name": "http://support.3com.com/infodeli/tools/switches/baseline/3C16486_V1_0_2_0_readme.pdf",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2006/1510" "url": "http://support.3com.com/infodeli/tools/switches/baseline/3C16486_V1_0_2_0_readme.pdf"
}, },
{ {
"name": "24942", "name": "24942",
@ -81,11 +86,6 @@
"name": "19756", "name": "19756",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19756" "url": "http://secunia.com/advisories/19756"
},
{
"name" : "3com-baseline-dhcp-dos(26076)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26076"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060428 OpenBB 1.0.8 Full Path Disclosure",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432592/100/0/threaded"
},
{ {
"name": "845", "name": "845",
"refsource": "SREASON", "refsource": "SREASON",
@ -66,6 +61,11 @@
"name": "openbb-multiple-path-disclosure(26193)", "name": "openbb-multiple-path-disclosure(26193)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26193" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26193"
},
{
"name": "20060428 OpenBB 1.0.8 Full Path Disclosure",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432592/100/0/threaded"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060519 Jemscripts Download Control v1.0",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/434533/100/0/threaded"
},
{ {
"name": "18041", "name": "18041",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/18041" "url": "http://www.securityfocus.com/bid/18041"
}, },
{
"name": "25716",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25716"
},
{ {
"name": "ADV-2006-1928", "name": "ADV-2006-1928",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1928" "url": "http://www.vupen.com/english/advisories/2006/1928"
}, },
{ {
"name" : "25716", "name": "20060519 Jemscripts Download Control v1.0",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://www.osvdb.org/25716" "url": "http://www.securityfocus.com/archive/1/434533/100/0/threaded"
}, },
{ {
"name": "943", "name": "943",

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2983" "url": "https://www.exploit-db.com/exploits/2983"
}, },
{
"name" : "21749",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21749"
},
{ {
"name": "b2blog-b2verifauth-file-include(31139)", "name": "b2blog-b2verifauth-file-include(31139)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31139" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31139"
},
{
"name": "21749",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21749"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20081208 DoS attacks on MIME-capable software via complex MIME emails",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/499038/100/0/threaded"
},
{
"name" : "20081209 Re: DoS attacks on MIME-capable software via complex MIME emails",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/499045/100/0/threaded"
},
{ {
"name": "http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro", "name": "http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro",
"refsource": "MISC", "refsource": "MISC",
@ -71,6 +61,16 @@
"name": "4721", "name": "4721",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4721" "url": "http://securityreason.com/securityalert/4721"
},
{
"name": "20081208 DoS attacks on MIME-capable software via complex MIME emails",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499038/100/0/threaded"
},
{
"name": "20081209 Re: DoS attacks on MIME-capable software via complex MIME emails",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499045/100/0/threaded"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "7529",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7529"
},
{ {
"name": "4868", "name": "4868",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4868" "url": "http://securityreason.com/securityalert/4868"
},
{
"name": "7529",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7529"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-2305", "ID": "CVE-2011-2305",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html", "name": "TA11-201A",
"refsource" : "CONFIRM", "refsource": "CERT",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html" "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
}, },
{ {
"name": "GLSA-201204-01", "name": "GLSA-201204-01",
@ -63,9 +63,14 @@
"url": "http://security.gentoo.org/glsa/glsa-201204-01.xml" "url": "http://security.gentoo.org/glsa/glsa-201204-01.xml"
}, },
{ {
"name" : "TA11-201A", "name": "48755",
"refsource" : "CERT", "refsource": "SECUNIA",
"url" : "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" "url": "http://secunia.com/advisories/48755"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
}, },
{ {
"name": "oval:org.mitre.oval:def:12983", "name": "oval:org.mitre.oval:def:12983",
@ -76,11 +81,6 @@
"name": "1025805", "name": "1025805",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025805" "url": "http://www.securitytracker.com/id?1025805"
},
{
"name" : "48755",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48755"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-2314", "ID": "CVE-2011-2314",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
},
{ {
"name": "50202", "name": "50202",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/50202" "url": "http://www.securityfocus.com/bid/50202"
}, },
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
},
{ {
"name": "76489", "name": "76489",
"refsource": "OSVDB", "refsource": "OSVDB",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2511", "ID": "CVE-2011-2511",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,80 +52,80 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[libvirt] 20110624 [PATCH 2/2] remote: protect against integer overflow",
"refsource" : "MLIST",
"url" : "https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html"
},
{
"name" : "[oss-security] 20110628 CVE request: libvirt: integer overflow in VirDomainGetVcpus",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/28/9"
},
{ {
"name": "http://libvirt.org/news.html", "name": "http://libvirt.org/news.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://libvirt.org/news.html" "url": "http://libvirt.org/news.html"
}, },
{ {
"name" : "DSA-2280", "name": "libvirt-virdomaingetvcpus-bo(68271)",
"refsource" : "DEBIAN", "refsource": "XF",
"url" : "http://www.debian.org/security/2011/dsa-2280" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68271"
},
{
"name" : "FEDORA-2011-9062",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html"
},
{
"name" : "FEDORA-2011-9091",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html"
},
{
"name" : "RHSA-2011:1019",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1019.html"
},
{
"name" : "RHSA-2011:1197",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1197.html"
},
{
"name" : "SUSE-SU-2011:0837",
"refsource" : "SUSE",
"url" : "https://hermes.opensuse.org/messages/10027908"
},
{
"name" : "USN-1180-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1180-1"
},
{
"name" : "1025822",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025822"
},
{
"name" : "45375",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/45375"
}, },
{ {
"name": "45441", "name": "45441",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45441" "url": "http://secunia.com/advisories/45441"
}, },
{
"name": "FEDORA-2011-9091",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html"
},
{ {
"name": "45446", "name": "45446",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45446" "url": "http://secunia.com/advisories/45446"
}, },
{ {
"name" : "libvirt-virdomaingetvcpus-bo(68271)", "name": "[oss-security] 20110628 CVE request: libvirt: integer overflow in VirDomainGetVcpus",
"refsource" : "XF", "refsource": "MLIST",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68271" "url": "http://www.openwall.com/lists/oss-security/2011/06/28/9"
},
{
"name": "RHSA-2011:1197",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1197.html"
},
{
"name": "RHSA-2011:1019",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1019.html"
},
{
"name": "USN-1180-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1180-1"
},
{
"name": "45375",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45375"
},
{
"name": "[libvirt] 20110624 [PATCH 2/2] remote: protect against integer overflow",
"refsource": "MLIST",
"url": "https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html"
},
{
"name": "1025822",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025822"
},
{
"name": "DSA-2280",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2280"
},
{
"name": "SUSE-SU-2011:0837",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/10027908"
},
{
"name": "FEDORA-2011-9062",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2899", "ID": "CVE-2011-2899",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "45744",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45744"
},
{
"name": "RHSA-2011:1196",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1196.html"
},
{ {
"name": "http://cvs.savannah.gnu.org/viewvc/foomatic-gui/foomatic/pysmb.py?root=foomatic-gui&r1=1.2&r2=1.3&view=patch", "name": "http://cvs.savannah.gnu.org/viewvc/foomatic-gui/foomatic/pysmb.py?root=foomatic-gui&r1=1.2&r2=1.3&view=patch",
"refsource": "MISC", "refsource": "MISC",
"url": "http://cvs.savannah.gnu.org/viewvc/foomatic-gui/foomatic/pysmb.py?root=foomatic-gui&r1=1.2&r2=1.3&view=patch" "url": "http://cvs.savannah.gnu.org/viewvc/foomatic-gui/foomatic/pysmb.py?root=foomatic-gui&r1=1.2&r2=1.3&view=patch"
}, },
{
"name": "1025967",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025967"
},
{ {
"name": "https://bugs.launchpad.net/ubuntu/+source/foomatic-gui/+bug/811119", "name": "https://bugs.launchpad.net/ubuntu/+source/foomatic-gui/+bug/811119",
"refsource": "MISC", "refsource": "MISC",
@ -66,21 +81,6 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=728348", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=728348",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=728348" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728348"
},
{
"name" : "RHSA-2011:1196",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1196.html"
},
{
"name" : "1025967",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025967"
},
{
"name" : "45744",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/45744"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-3214", "ID": "CVE-2011-3214",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT5002",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5002"
},
{ {
"name": "APPLE-SA-2011-10-12-3", "name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
}, },
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{ {
"name": "50085", "name": "50085",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3364", "ID": "CVE-2011-3364",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,16 +57,16 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://xorl.wordpress.com/2011/10/09/cve-2011-3364-gnome-networkmanager-local-privilege-escalation/" "url": "http://xorl.wordpress.com/2011/10/09/cve-2011-3364-gnome-networkmanager-local-privilege-escalation/"
}, },
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=737338",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=737338"
},
{ {
"name": "FEDORA-2011-13425", "name": "FEDORA-2011-13425",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066828.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066828.html"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=737338",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737338"
},
{ {
"name": "MDVSA-2011:171", "name": "MDVSA-2011:171",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-3565", "ID": "CVE-2011-3565",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource" : "MISC",
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
},
{ {
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpfreechat-1.3", "name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpfreechat-1.3",
"refsource": "MISC", "refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpfreechat-1.3" "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpfreechat-1.3"
}, },
{
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{ {
"name": "phpfreechat-stylecss-path-disclsoure(70543)", "name": "phpfreechat-stylecss-path-disclsoure(70543)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70543" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70543"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html",
"refsource" : "MISC",
"url" : "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html"
},
{ {
"name": "plesk-charset-unspecified(72092)", "name": "plesk-charset-unspecified(72092)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72092" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72092"
},
{
"name": "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html",
"refsource": "MISC",
"url": "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-0673", "ID": "CVE-2013-0673",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2013-0912", "ID": "CVE-2013-0912",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157",
"refsource" : "MISC",
"url" : "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157"
},
{ {
"name": "http://labs.mwrinfosecurity.com/blog/2013/03/06/pwn2own-at-cansecwest-2013/", "name": "http://labs.mwrinfosecurity.com/blog/2013/03/06/pwn2own-at-cansecwest-2013/",
"refsource": "MISC", "refsource": "MISC",
@ -67,6 +62,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://twitter.com/thezdi/statuses/309460019131346944" "url": "http://twitter.com/thezdi/statuses/309460019131346944"
}, },
{
"name": "APPLE-SA-2013-03-19-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00004.html"
},
{ {
"name": "http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_7.html", "name": "http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_7.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -82,25 +82,25 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5704" "url": "http://support.apple.com/kb/HT5704"
}, },
{
"name" : "http://support.apple.com/kb/HT5701",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5701"
},
{
"name" : "APPLE-SA-2013-03-19-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Mar/msg00004.html"
},
{ {
"name": "APPLE-SA-2013-04-16-1", "name": "APPLE-SA-2013-04-16-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Apr/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2013/Apr/msg00000.html"
}, },
{
"name": "http://support.apple.com/kb/HT5701",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5701"
},
{ {
"name": "oval:org.mitre.oval:def:16274", "name": "oval:org.mitre.oval:def:16274",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16274" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16274"
},
{
"name": "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157",
"refsource": "MISC",
"url": "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1277", "ID": "CVE-2013-1277",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-1556", "ID": "CVE-2013-1556",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-1674", "ID": "CVE-2013-1674",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-46.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-46.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=860971",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=860971"
},
{ {
"name": "DSA-2699", "name": "DSA-2699",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -73,35 +63,60 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:165" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:165"
}, },
{ {
"name" : "RHSA-2013:0820", "name": "openSUSE-SU-2013:0825",
"refsource" : "REDHAT", "refsource": "SUSE",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0820.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=860971",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=860971"
},
{
"name": "USN-1823-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1823-1"
},
{
"name": "oval:org.mitre.oval:def:17147",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17147"
}, },
{ {
"name": "RHSA-2013:0821", "name": "RHSA-2013:0821",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0821.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-0821.html"
}, },
{
"name": "openSUSE-SU-2013:0929",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html"
},
{
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-46.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-46.html"
},
{
"name": "59859",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59859"
},
{ {
"name": "openSUSE-SU-2013:0831", "name": "openSUSE-SU-2013:0831",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html"
}, },
{
"name": "RHSA-2013:0820",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0820.html"
},
{ {
"name": "openSUSE-SU-2013:0834", "name": "openSUSE-SU-2013:0834",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html"
}, },
{
"name" : "openSUSE-SU-2013:0825",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html"
},
{
"name" : "openSUSE-SU-2013:0929",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html"
},
{ {
"name": "openSUSE-SU-2013:0946", "name": "openSUSE-SU-2013:0946",
"refsource": "SUSE", "refsource": "SUSE",
@ -111,21 +126,6 @@
"name": "USN-1822-1", "name": "USN-1822-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1822-1" "url": "http://www.ubuntu.com/usn/USN-1822-1"
},
{
"name" : "USN-1823-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1823-1"
},
{
"name" : "59859",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/59859"
},
{
"name" : "oval:org.mitre.oval:def:17147",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17147"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1900", "ID": "CVE-2013-1900",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,95 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.postgresql.org/about/news/1456/",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/about/news/1456/"
},
{ {
"name": "http://www.postgresql.org/docs/current/static/release-8-4-17.html", "name": "http://www.postgresql.org/docs/current/static/release-8-4-17.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/current/static/release-8-4-17.html" "url": "http://www.postgresql.org/docs/current/static/release-8-4-17.html"
}, },
{
"name" : "http://www.postgresql.org/docs/current/static/release-9-0-13.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/current/static/release-9-0-13.html"
},
{
"name" : "http://www.postgresql.org/docs/current/static/release-9-1-9.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/current/static/release-9-1-9.html"
},
{ {
"name": "http://www.postgresql.org/docs/current/static/release-9-2-4.html", "name": "http://www.postgresql.org/docs/current/static/release-9-2-4.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/current/static/release-9-2-4.html" "url": "http://www.postgresql.org/docs/current/static/release-9-2-4.html"
}, },
{ {
"name" : "http://support.apple.com/kb/HT5880", "name": "http://www.postgresql.org/about/news/1456/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://support.apple.com/kb/HT5880" "url": "http://www.postgresql.org/about/news/1456/"
},
{
"name" : "http://support.apple.com/kb/HT5892",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5892"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name" : "APPLE-SA-2013-09-12-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"name" : "APPLE-SA-2013-09-17-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html"
},
{
"name" : "DSA-2657",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2657"
},
{
"name" : "DSA-2658",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2658"
},
{
"name" : "FEDORA-2013-5000",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html"
},
{
"name" : "FEDORA-2013-6148",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html"
},
{
"name" : "MDVSA-2013:142",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142"
},
{
"name" : "RHSA-2013:1475",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1475.html"
},
{
"name" : "SUSE-SU-2013:0633",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html"
},
{
"name" : "openSUSE-SU-2013:0627",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html"
}, },
{ {
"name": "openSUSE-SU-2013:0628", "name": "openSUSE-SU-2013:0628",
@ -152,10 +77,85 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html"
}, },
{
"name": "DSA-2657",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2657"
},
{
"name": "MDVSA-2013:142",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142"
},
{
"name": "http://support.apple.com/kb/HT5892",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5892"
},
{
"name": "http://www.postgresql.org/docs/current/static/release-9-0-13.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/current/static/release-9-0-13.html"
},
{ {
"name": "USN-1789-1", "name": "USN-1789-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1789-1" "url": "http://www.ubuntu.com/usn/USN-1789-1"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "APPLE-SA-2013-09-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"name": "FEDORA-2013-6148",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html"
},
{
"name": "APPLE-SA-2013-09-17-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html"
},
{
"name": "http://www.postgresql.org/docs/current/static/release-9-1-9.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/current/static/release-9-1-9.html"
},
{
"name": "SUSE-SU-2013:0633",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html"
},
{
"name": "RHSA-2013:1475",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1475.html"
},
{
"name": "DSA-2658",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2658"
},
{
"name": "openSUSE-SU-2013:0627",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html"
},
{
"name": "FEDORA-2013-5000",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html"
},
{
"name": "http://support.apple.com/kb/HT5880",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5880"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1990", "ID": "CVE-2013-1990",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "openSUSE-SU-2013:1025",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html"
},
{
"name": "USN-1868-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1868-1"
},
{ {
"name": "[oss-security] 20130523 Fwd: [ANNOUNCE] X.Org Security Advisory: Protocol handling issues in X Window System client libraries", "name": "[oss-security] 20130523 Fwd: [ANNOUNCE] X.Org Security Advisory: Protocol handling issues in X Window System client libraries",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3"
}, },
{
"name" : "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23",
"refsource" : "CONFIRM",
"url" : "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"
},
{ {
"name": "DSA-2675", "name": "DSA-2675",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -73,14 +78,9 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html"
}, },
{ {
"name" : "openSUSE-SU-2013:1025", "name": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html" "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"
},
{
"name" : "USN-1868-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1868-1"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html"
},
{ {
"name": "http://www.youtube.com/watch?v=CPlT09ZIj48", "name": "http://www.youtube.com/watch?v=CPlT09ZIj48",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.youtube.com/watch?v=CPlT09ZIj48" "url": "http://www.youtube.com/watch?v=CPlT09ZIj48"
},
{
"name": "http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "41619", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0045",
"refsource" : "EXPLOIT-DB", "refsource": "CONFIRM",
"url" : "https://www.exploit-db.com/exploits/41619/" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0045"
}, },
{ {
"name": "http://hyp3rlinx.altervista.org/advisories/MICROSOFT-DVD-MAKER-XML-EXTERNAL-ENTITY-FILE-DISCLOSURE.txt", "name": "http://hyp3rlinx.altervista.org/advisories/MICROSOFT-DVD-MAKER-XML-EXTERNAL-ENTITY-FILE-DISCLOSURE.txt",
@ -63,19 +63,19 @@
"url": "http://hyp3rlinx.altervista.org/advisories/MICROSOFT-DVD-MAKER-XML-EXTERNAL-ENTITY-FILE-DISCLOSURE.txt" "url": "http://hyp3rlinx.altervista.org/advisories/MICROSOFT-DVD-MAKER-XML-EXTERNAL-ENTITY-FILE-DISCLOSURE.txt"
}, },
{ {
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0045", "name": "1038015",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0045" "url": "http://www.securitytracker.com/id/1038015"
},
{
"name": "41619",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41619/"
}, },
{ {
"name": "96103", "name": "96103",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/96103" "url": "http://www.securityfocus.com/bid/96103"
},
{
"name" : "1038015",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038015"
} }
] ]
} }

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0085" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0085"
}, },
{
"name" : "96652",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96652"
},
{ {
"name": "1037992", "name": "1037992",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037992" "url": "http://www.securitytracker.com/id/1037992"
},
{
"name": "96652",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96652"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "42009",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/42009/"
},
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0220",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0220"
},
{ {
"name": "98111", "name": "98111",
"refsource": "BID", "refsource": "BID",
@ -71,6 +61,16 @@
"name": "1038445", "name": "1038445",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038445" "url": "http://www.securitytracker.com/id/1038445"
},
{
"name": "42009",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42009/"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0220",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0220"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2017-0651", "ID": "CVE-2017-0651",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-05-06T20:43:28.330025", "DATE_ASSIGNED": "2017-05-06T20:43:28.330025",
"ID": "CVE-2017-1000080", "ID": "CVE-2017-1000080",
"REQUESTER": "mathias.morbitzer@aisec.fraunhofer.de", "REQUESTER": "mathias.morbitzer@aisec.fraunhofer.de",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "ONOS", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "1.8, 1.9.0 and latest" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Linux foundation" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Insecure Permissions" "value": "n/a"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-11-17", "DATE_ASSIGNED": "2017-11-17",
"ID": "CVE-2017-1000396", "ID": "CVE-2017-1000396",
"REQUESTER": "ml@beckweb.net", "REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Jenkins", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "2.73.1 and earlier, 2.83 and earlier" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Jenkins" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Missing SSL Certificate Validation" "value": "n/a"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29", "DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000431", "ID": "CVE-2017-1000431",
"REQUESTER": "gunnstein.lye@ez.no", "REQUESTER": "gunnstein.lye@ez.no",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "eZ Publish", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "5.4.0 to 5.4.9, 5.3.12 and older" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "eZ Systems" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-79" "value": "n/a"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-01"
},
{ {
"name": "102493", "name": "102493",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102493" "url": "http://www.securityfocus.com/bid/102493"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-01"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4123", "ID": "CVE-2017-4123",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4193", "ID": "CVE-2017-4193",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -68,15 +68,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html" "url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html"
}, },
{
"name" : "101887",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101887"
},
{ {
"name": "1039835", "name": "1039835",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039835" "url": "http://www.securitytracker.com/id/1039835"
},
{
"name": "101887",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101887"
} }
] ]
} }

View File

@ -61,25 +61,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://blogs.cisco.com/security/great-cipher-but-where-did-you-get-that-key",
"refsource" : "MISC",
"url" : "https://blogs.cisco.com/security/great-cipher-but-where-did-you-get-that-key"
},
{ {
"name": "https://web-in-security.blogspot.com/2018/08/practical-dictionary-attack-on-ipsec-ike.html", "name": "https://web-in-security.blogspot.com/2018/08/practical-dictionary-attack-on-ipsec-ike.html",
"refsource": "MISC", "refsource": "MISC",
"url": "https://web-in-security.blogspot.com/2018/08/practical-dictionary-attack-on-ipsec-ike.html" "url": "https://web-in-security.blogspot.com/2018/08/practical-dictionary-attack-on-ipsec-ike.html"
}, },
{
"name": "VU#857035",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/857035"
},
{ {
"name": "https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf", "name": "https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf" "url": "https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf"
}, },
{ {
"name" : "VU#857035", "name": "https://blogs.cisco.com/security/great-cipher-but-where-did-you-get-that-key",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "https://www.kb.cert.org/vuls/id/857035" "url": "https://blogs.cisco.com/security/great-cipher-but-where-did-you-get-that-key"
} }
] ]
}, },

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[debian-lts-announce] 20180116 [SECURITY] [DLA 1245-1] graphicsmagick security update", "name": "https://sourceforge.net/p/graphicsmagick/bugs/541/",
"refsource" : "MLIST", "refsource": "MISC",
"url" : "https://lists.debian.org/debian-lts-announce/2018/01/msg00018.html" "url": "https://sourceforge.net/p/graphicsmagick/bugs/541/"
},
{
"name" : "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html"
}, },
{ {
"name": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/52a91ddb1aa6", "name": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/52a91ddb1aa6",
@ -68,14 +63,19 @@
"url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/52a91ddb1aa6" "url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/52a91ddb1aa6"
}, },
{ {
"name" : "https://sourceforge.net/p/graphicsmagick/bugs/541/", "name": "[debian-lts-announce] 20180116 [SECURITY] [DLA 1245-1] graphicsmagick security update",
"refsource" : "MISC", "refsource": "MLIST",
"url" : "https://sourceforge.net/p/graphicsmagick/bugs/541/" "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00018.html"
}, },
{ {
"name": "DSA-4321", "name": "DSA-4321",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4321" "url": "https://www.debian.org/security/2018/dsa-4321"
},
{
"name": "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html"
} }
] ]
} }