"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:44:19 +00:00
parent b60581ca93
commit b99a2ab8c3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
55 changed files with 4469 additions and 4469 deletions

View File

@ -53,49 +53,49 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html", "name": "oracle-january2006-update(24321)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24321"
},
{
"name" : "VU#545804",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/545804"
},
{
"name" : "16287",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16287"
},
{
"name" : "ADV-2006-0243",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0243"
},
{
"name" : "ADV-2006-0323",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0323"
},
{
"name" : "1015499",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015499"
}, },
{ {
"name": "18493", "name": "18493",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18493" "url": "http://secunia.com/advisories/18493"
}, },
{
"name": "ADV-2006-0323",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0323"
},
{
"name": "16287",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16287"
},
{
"name": "VU#545804",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/545804"
},
{
"name": "1015499",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015499"
},
{
"name": "ADV-2006-0243",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0243"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html"
},
{ {
"name": "18608", "name": "18608",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18608" "url": "http://secunia.com/advisories/18608"
},
{
"name" : "oracle-january2006-update(24321)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24321"
} }
] ]
} }

View File

@ -53,49 +53,49 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html", "name": "oracle-january2006-update(24321)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24321"
},
{
"name" : "VU#545804",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/545804"
},
{
"name" : "16287",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16287"
},
{
"name" : "ADV-2006-0243",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0243"
},
{
"name" : "ADV-2006-0323",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0323"
},
{
"name" : "1015499",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015499"
}, },
{ {
"name": "18493", "name": "18493",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18493" "url": "http://secunia.com/advisories/18493"
}, },
{
"name": "ADV-2006-0323",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0323"
},
{
"name": "16287",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16287"
},
{
"name": "VU#545804",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/545804"
},
{
"name": "1015499",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015499"
},
{
"name": "ADV-2006-0243",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0243"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html"
},
{ {
"name": "18608", "name": "18608",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18608" "url": "http://secunia.com/advisories/18608"
},
{
"name" : "oracle-january2006-update(24321)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24321"
} }
] ]
} }

View File

@ -52,55 +52,55 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060203 Exchangepop3 rcpt buffer overflow vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-02/0040.html"
},
{ {
"name": "1466", "name": "1466",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1466" "url": "https://www.exploit-db.com/exploits/1466"
}, },
{
"name" : "http://downloads.securityfocus.com/vulnerabilities/exploits/exchangepop3.pl",
"refsource" : "MISC",
"url" : "http://downloads.securityfocus.com/vulnerabilities/exploits/exchangepop3.pl"
},
{
"name" : "16485",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16485"
},
{
"name" : "ADV-2006-0437",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0437"
},
{
"name" : "22907",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22907"
},
{
"name" : "1015580",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015580"
},
{
"name" : "18687",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18687"
},
{ {
"name": "408", "name": "408",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/408" "url": "http://securityreason.com/securityalert/408"
}, },
{
"name": "18687",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18687"
},
{
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/exchangepop3.pl",
"refsource": "MISC",
"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/exchangepop3.pl"
},
{
"name": "ADV-2006-0437",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0437"
},
{
"name": "20060203 Exchangepop3 rcpt buffer overflow vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-02/0040.html"
},
{
"name": "16485",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16485"
},
{
"name": "22907",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22907"
},
{ {
"name": "exchangepop3-rcptto-bo(24477)", "name": "exchangepop3-rcptto-bo(24477)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24477" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24477"
},
{
"name": "1015580",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015580"
} }
] ]
} }

View File

@ -34,7 +34,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Cross-site scripting vulnerability in eintrag.php in Gästebuch (Gastebuch) before 1.3.3 allows remote attackers to inject arbitrary web script or HTML via the URL, which is used in the homepage parameter." "value": "Cross-site scripting vulnerability in eintrag.php in G\u00e4stebuch (Gastebuch) before 1.3.3 allows remote attackers to inject arbitrary web script or HTML via the URL, which is used in the homepage parameter."
} }
] ]
}, },
@ -53,14 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060213 XSS vulnerability in guestbook-php-script", "name": "ADV-2006-0566",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://marc.info/?l=bugtraq&m=113986789801121&w=2" "url": "http://www.vupen.com/english/advisories/2006/0566"
}, },
{ {
"name" : "http://www.php4scripte.de/index.php", "name": "gastebuch-homepage-xss(24670)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.php4scripte.de/index.php" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24670"
}, },
{ {
"name": "16615", "name": "16615",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/16615" "url": "http://www.securityfocus.com/bid/16615"
}, },
{ {
"name" : "ADV-2006-0566", "name": "20060213 XSS vulnerability in guestbook-php-script",
"refsource" : "VUPEN", "refsource": "BUGTRAQ",
"url" : "http://www.vupen.com/english/advisories/2006/0566" "url": "http://marc.info/?l=bugtraq&m=113986789801121&w=2"
}, },
{ {
"name": "18849", "name": "18849",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/18849" "url": "http://secunia.com/advisories/18849"
}, },
{ {
"name" : "gastebuch-homepage-xss(24670)", "name": "http://www.php4scripte.de/index.php",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24670" "url": "http://www.php4scripte.de/index.php"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-1740", "ID": "CVE-2006-1740",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,30 +53,60 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2006/mfsa2006-12.html", "name": "USN-275-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "http://www.mozilla.org/security/announce/2006/mfsa2006-12.html" "url": "https://usn.ubuntu.com/275-1/"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=271194", "name": "19902",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=271194" "url": "http://secunia.com/advisories/19902"
},
{
"name": "20060404-01-U",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc"
},
{
"name": "HPSBUX02122",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name": "19941",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19941"
},
{
"name": "RHSA-2006:0328",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0328.html"
},
{
"name": "GLSA-200604-12",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml"
},
{
"name": "21622",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21622"
},
{
"name": "19862",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19862"
},
{
"name": "MDKSA-2006:075",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:075"
}, },
{ {
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm", "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm" "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm"
}, },
{
"name" : "DSA-1044",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1044"
},
{
"name" : "DSA-1046",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1046"
},
{ {
"name": "DSA-1051", "name": "DSA-1051",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -88,89 +118,9 @@
"url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html" "url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html"
}, },
{ {
"name" : "FEDORA-2006-411", "name": "oval:org.mitre.oval:def:1811",
"refsource" : "FEDORA", "refsource": "OVAL",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1811"
},
{
"name" : "FLSA:189137-1",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/436296/100/0/threaded"
},
{
"name" : "FLSA:189137-2",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/436338/100/0/threaded"
},
{
"name" : "GLSA-200604-12",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml"
},
{
"name" : "GLSA-200604-18",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml"
},
{
"name" : "HPSBUX02122",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name" : "SSRT061158",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name" : "MDKSA-2006:075",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:075"
},
{
"name" : "MDKSA-2006:076",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:076"
},
{
"name" : "RHSA-2006:0328",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0328.html"
},
{
"name" : "RHSA-2006:0329",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0329.html"
},
{
"name" : "SCOSA-2006.26",
"refsource" : "SCO",
"url" : "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt"
},
{
"name" : "20060404-01-U",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc"
},
{
"name" : "102550",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1"
},
{
"name" : "228526",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1"
},
{
"name" : "SUSE-SA:2006:021",
"refsource" : "SUSE",
"url" : "http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html"
},
{
"name" : "USN-275-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/275-1/"
}, },
{ {
"name": "USN-271-1", "name": "USN-271-1",
@ -178,39 +128,19 @@
"url": "https://usn.ubuntu.com/271-1/" "url": "https://usn.ubuntu.com/271-1/"
}, },
{ {
"name" : "17516", "name": "19714",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17516"
},
{
"name" : "oval:org.mitre.oval:def:10424",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10424"
},
{
"name" : "ADV-2006-1356",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1356"
},
{
"name" : "oval:org.mitre.oval:def:1811",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1811"
},
{
"name" : "19631",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19631" "url": "http://secunia.com/advisories/19714"
}, },
{ {
"name" : "19759", "name": "RHSA-2006:0329",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/19759" "url": "http://www.redhat.com/support/errata/RHSA-2006-0329.html"
}, },
{ {
"name" : "19794", "name": "GLSA-200604-18",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/19794" "url": "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml"
}, },
{ {
"name": "19811", "name": "19811",
@ -218,39 +148,9 @@
"url": "http://secunia.com/advisories/19811" "url": "http://secunia.com/advisories/19811"
}, },
{ {
"name" : "19852", "name": "19794",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19852" "url": "http://secunia.com/advisories/19794"
},
{
"name" : "19862",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19862"
},
{
"name" : "19863",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19863"
},
{
"name" : "19902",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19902"
},
{
"name" : "19941",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19941"
},
{
"name" : "19714",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19714"
},
{
"name" : "19721",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19721"
}, },
{ {
"name": "19746", "name": "19746",
@ -263,24 +163,124 @@
"url": "http://secunia.com/advisories/21033" "url": "http://secunia.com/advisories/21033"
}, },
{ {
"name" : "21622", "name": "oval:org.mitre.oval:def:10424",
"refsource" : "SECUNIA", "refsource": "OVAL",
"url" : "http://secunia.com/advisories/21622" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10424"
},
{
"name": "102550",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1"
}, },
{ {
"name": "19696", "name": "19696",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19696" "url": "http://secunia.com/advisories/19696"
}, },
{
"name": "19759",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19759"
},
{
"name": "SUSE-SA:2006:021",
"refsource": "SUSE",
"url": "http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html"
},
{
"name": "FLSA:189137-2",
"refsource": "FEDORA",
"url": "http://www.securityfocus.com/archive/1/436338/100/0/threaded"
},
{
"name": "ADV-2006-1356",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1356"
},
{
"name": "SSRT061158",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name": "http://www.mozilla.org/security/announce/2006/mfsa2006-12.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-12.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=271194",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=271194"
},
{ {
"name": "19729", "name": "19729",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19729" "url": "http://secunia.com/advisories/19729"
}, },
{
"name": "19863",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19863"
},
{ {
"name": "mozilla-secure-site-spoofing(25813)", "name": "mozilla-secure-site-spoofing(25813)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25813" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25813"
},
{
"name": "SCOSA-2006.26",
"refsource": "SCO",
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt"
},
{
"name": "FLSA:189137-1",
"refsource": "FEDORA",
"url": "http://www.securityfocus.com/archive/1/436296/100/0/threaded"
},
{
"name": "17516",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17516"
},
{
"name": "228526",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1"
},
{
"name": "FEDORA-2006-411",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html"
},
{
"name": "19852",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19852"
},
{
"name": "19721",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19721"
},
{
"name": "19631",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19631"
},
{
"name": "MDKSA-2006:076",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:076"
},
{
"name": "DSA-1046",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1046"
},
{
"name": "DSA-1044",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1044"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "wonderedit-templatepath-file-include(27536)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27536"
},
{ {
"name": "1982", "name": "1982",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "18821", "name": "18821",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/18821" "url": "http://www.securityfocus.com/bid/18821"
},
{
"name" : "wonderedit-templatepath-file-include(27536)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27536"
} }
] ]
} }

View File

@ -62,11 +62,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/19023" "url": "http://www.securityfocus.com/bid/19023"
}, },
{
"name" : "ADV-2006-2822",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2822"
},
{ {
"name": "21090", "name": "21090",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -76,6 +71,11 @@
"name": "flushcms-classpath-file-include(27751)", "name": "flushcms-classpath-file-include(27751)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27751" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27751"
},
{
"name": "ADV-2006-2822",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2822"
} }
] ]
} }

View File

@ -52,31 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "DSA-1175",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1175"
},
{ {
"name": "[3.8] 20060825 013: SECURITY FIX: August 25, 2006", "name": "[3.8] 20060825 013: SECURITY FIX: August 25, 2006",
"refsource": "OPENBSD", "refsource": "OPENBSD",
"url": "http://www.openbsd.org/errata38.html#isakmpd" "url": "http://www.openbsd.org/errata38.html#isakmpd"
}, },
{
"name" : "[3.9] 20060825 008: SECURITY FIX: August 25, 2006",
"refsource" : "OPENBSD",
"url" : "http://www.openbsd.org/errata.html#isakmpd"
},
{
"name" : "19712",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19712"
},
{ {
"name": "28194", "name": "28194",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/28194" "url": "http://www.osvdb.org/28194"
}, },
{
"name": "openbsd-isakmpd-security-bypass(28645)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28645"
},
{ {
"name": "1016757", "name": "1016757",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -87,15 +77,25 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21652" "url": "http://secunia.com/advisories/21652"
}, },
{
"name": "DSA-1175",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1175"
},
{
"name": "19712",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19712"
},
{ {
"name": "21905", "name": "21905",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21905" "url": "http://secunia.com/advisories/21905"
}, },
{ {
"name" : "openbsd-isakmpd-security-bypass(28645)", "name": "[3.9] 20060825 008: SECURITY FIX: August 25, 2006",
"refsource" : "XF", "refsource": "OPENBSD",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28645" "url": "http://www.openbsd.org/errata.html#isakmpd"
} }
] ]
} }

View File

@ -52,11 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "21774",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21774"
},
{
"name": "phpdownload-index-file-include(28751)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28751"
},
{ {
"name": "20060902 php download local file include", "name": "20060902 php download local file include",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/445269/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/445269/100/0/threaded"
}, },
{
"name": "1528",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1528"
},
{ {
"name": "19872", "name": "19872",
"refsource": "BID", "refsource": "BID",
@ -66,21 +81,6 @@
"name": "ADV-2006-3479", "name": "ADV-2006-3479",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3479" "url": "http://www.vupen.com/english/advisories/2006/3479"
},
{
"name" : "21774",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21774"
},
{
"name" : "1528",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1528"
},
{
"name" : "phpdownload-index-file-include(28751)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28751"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "2350", "name": "p4cms-abfjs-file-include(28880)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/2350" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28880"
}, },
{ {
"name": "19971", "name": "19971",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/19971" "url": "http://www.securityfocus.com/bid/19971"
}, },
{
"name" : "ADV-2006-3590",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3590"
},
{ {
"name": "21891", "name": "21891",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21891" "url": "http://secunia.com/advisories/21891"
}, },
{ {
"name" : "p4cms-abfjs-file-include(28880)", "name": "2350",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28880" "url": "https://www.exploit-db.com/exploits/2350"
},
{
"name": "ADV-2006-3590",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3590"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2076", "ID": "CVE-2010-2076",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[cxf-users] 20100616 Important - Apache CXF security advisory CVE-2010-2076", "name": "42492",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.listware.net/201006/cxf-users/60160-important-apache-cxf-security-advisory-cve-2010-2076.html" "url": "http://www.securityfocus.com/bid/42492"
}, },
{ {
"name": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html", "name": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html",
@ -63,9 +63,14 @@
"url": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html" "url": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html"
}, },
{ {
"name" : "http://geronimo.apache.org/21x-security-report.html", "name": "http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://geronimo.apache.org/21x-security-report.html" "url": "http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf"
},
{
"name": "41025",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41025"
}, },
{ {
"name": "http://geronimo.apache.org/22x-security-report.html", "name": "http://geronimo.apache.org/22x-security-report.html",
@ -73,9 +78,9 @@
"url": "http://geronimo.apache.org/22x-security-report.html" "url": "http://geronimo.apache.org/22x-security-report.html"
}, },
{ {
"name" : "http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf", "name": "41016",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf" "url": "http://secunia.com/advisories/41016"
}, },
{ {
"name": "https://issues.apache.org/jira/browse/GERONIMO-5383", "name": "https://issues.apache.org/jira/browse/GERONIMO-5383",
@ -83,24 +88,19 @@
"url": "https://issues.apache.org/jira/browse/GERONIMO-5383" "url": "https://issues.apache.org/jira/browse/GERONIMO-5383"
}, },
{ {
"name" : "42492", "name": "[cxf-users] 20100616 Important - Apache CXF security advisory CVE-2010-2076",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/42492" "url": "http://www.listware.net/201006/cxf-users/60160-important-apache-cxf-security-advisory-cve-2010-2076.html"
},
{
"name": "http://geronimo.apache.org/21x-security-report.html",
"refsource": "CONFIRM",
"url": "http://geronimo.apache.org/21x-security-report.html"
}, },
{ {
"name": "40969", "name": "40969",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40969" "url": "http://secunia.com/advisories/40969"
},
{
"name" : "41016",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41016"
},
{
"name" : "41025",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41025"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2937", "ID": "CVE-2010-2937",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -72,15 +72,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/42386" "url": "http://www.securityfocus.com/bid/42386"
}, },
{
"name" : "oval:org.mitre.oval:def:14676",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14676"
},
{ {
"name": "ADV-2010-2087", "name": "ADV-2010-2087",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2087" "url": "http://www.vupen.com/english/advisories/2010/2087"
},
{
"name": "oval:org.mitre.oval:def:14676",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14676"
} }
] ]
} }

View File

@ -52,11 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "43241",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43241"
},
{
"name": "ADV-2011-0392",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0392"
},
{ {
"name": "20110210 CORE-2011-0103 - ZOHO ManageEngine ADSelfService multiple vulnerabilities", "name": "20110210 CORE-2011-0103 - ZOHO ManageEngine ADSelfService multiple vulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516396/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/516396/100/0/threaded"
}, },
{
"name": "8089",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8089"
},
{
"name": "adselfservice-pwr-weak-security(65350)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65350"
},
{ {
"name": "http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities", "name": "http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities",
"refsource": "MISC", "refsource": "MISC",
@ -71,26 +91,6 @@
"name": "70870", "name": "70870",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/70870" "url": "http://www.osvdb.org/70870"
},
{
"name" : "43241",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43241"
},
{
"name" : "8089",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/8089"
},
{
"name" : "ADV-2011-0392",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0392"
},
{
"name" : "adselfservice-pwr-weak-security(65350)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65350"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3433", "ID": "CVE-2010-3433",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,105 +52,105 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.postgresql.org/about/news.1244",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/about/news.1244"
},
{
"name" : "http://www.postgresql.org/docs/9.0/static/release-9-0-1.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/9.0/static/release-9-0-1.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=639371",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=639371"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name" : "DSA-2120",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2120"
},
{
"name" : "FEDORA-2010-15954",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049591.html"
},
{ {
"name": "FEDORA-2010-15960", "name": "FEDORA-2010-15960",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049592.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049592.html"
}, },
{
"name" : "HPSBMU02781",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=134124585221119&w=2"
},
{
"name" : "SSRT100617",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=134124585221119&w=2"
},
{
"name" : "MDVSA-2010:197",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:197"
},
{
"name" : "RHSA-2010:0742",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0742.html"
},
{
"name" : "RHSA-2010:0908",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0908.html"
},
{
"name" : "SUSE-SR:2010:020",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html"
},
{
"name" : "SUSE-SR:2010:019",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name" : "USN-1002-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1002-1"
},
{
"name" : "USN-1002-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1002-2"
},
{
"name" : "43747",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/43747"
},
{ {
"name": "oval:org.mitre.oval:def:7291", "name": "oval:org.mitre.oval:def:7291",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7291" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7291"
}, },
{ {
"name" : "42325", "name": "SUSE-SR:2010:020",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/42325" "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html"
},
{
"name": "HPSBMU02781",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134124585221119&w=2"
},
{
"name": "USN-1002-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1002-2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=639371",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=639371"
},
{
"name": "FEDORA-2010-15954",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049591.html"
}, },
{ {
"name": "ADV-2010-3051", "name": "ADV-2010-3051",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3051" "url": "http://www.vupen.com/english/advisories/2010/3051"
},
{
"name": "RHSA-2010:0742",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0742.html"
},
{
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-1.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-1.html"
},
{
"name": "USN-1002-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1002-1"
},
{
"name": "MDVSA-2010:197",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:197"
},
{
"name": "42325",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42325"
},
{
"name": "RHSA-2010:0908",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0908.html"
},
{
"name": "DSA-2120",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2120"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "SUSE-SR:2010:019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name": "43747",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43747"
},
{
"name": "SSRT100617",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134124585221119&w=2"
},
{
"name": "http://www.postgresql.org/about/news.1244",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/about/news.1244"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-0599", "ID": "CVE-2011-0599",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "46220",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46220"
},
{
"name": "ADV-2011-0492",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0492"
},
{
"name": "43470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43470"
},
{
"name": "oval:org.mitre.oval:def:12424",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12424"
},
{ {
"name": "20110208 ZDI-11-072: Adobe Reader BMP ColorData Remote Code Execution Vulnerability", "name": "20110208 ZDI-11-072: Adobe Reader BMP ColorData Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -62,45 +82,25 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-072/" "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-072/"
}, },
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
},
{ {
"name": "RHSA-2011:0301", "name": "RHSA-2011:0301",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0301.html" "url": "http://www.redhat.com/support/errata/RHSA-2011-0301.html"
}, },
{
"name" : "46220",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46220"
},
{
"name" : "oval:org.mitre.oval:def:12424",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12424"
},
{
"name" : "1025033",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025033"
},
{
"name" : "43470",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43470"
},
{ {
"name": "ADV-2011-0337", "name": "ADV-2011-0337",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0337" "url": "http://www.vupen.com/english/advisories/2011/0337"
}, },
{ {
"name" : "ADV-2011-0492", "name": "1025033",
"refsource" : "VUPEN", "refsource": "SECTRACK",
"url" : "http://www.vupen.com/english/advisories/2011/0492" "url": "http://www.securitytracker.com/id?1025033"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-0878", "ID": "CVE-2011-0878",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1148", "ID": "CVE-2011-1148",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,34 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20110313 CVE request: PHP substr_replace() use-after-free", "name": "HPSBOV02763",
"refsource" : "MLIST", "refsource": "HP",
"url" : "http://openwall.com/lists/oss-security/2011/03/13/2" "url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{
"name" : "[oss-security] 20110313 Re: CVE request: PHP substr_replace() use-after-free",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/13/3"
},
{
"name" : "[oss-security] 20110313 Re: CVE request: PHP substr_replace() use-after-free",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/13/9"
},
{
"name" : "http://bugs.php.net/bug.php?id=54238",
"refsource" : "CONFIRM",
"url" : "http://bugs.php.net/bug.php?id=54238"
},
{
"name" : "http://www.php.net/ChangeLog-5.php#5.3.7",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php#5.3.7"
},
{
"name" : "http://www.php.net/archive/2011.php#id2011-08-18-1",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/archive/2011.php#id2011-08-18-1"
}, },
{ {
"name": "http://support.apple.com/kb/HT5130", "name": "http://support.apple.com/kb/HT5130",
@ -88,44 +63,69 @@
"url": "http://support.apple.com/kb/HT5130" "url": "http://support.apple.com/kb/HT5130"
}, },
{ {
"name" : "APPLE-SA-2012-02-01-1", "name": "49241",
"refsource" : "APPLE", "refsource": "BID",
"url" : "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" "url": "http://www.securityfocus.com/bid/49241"
}, },
{ {
"name" : "HPSBOV02763", "name": "[oss-security] 20110313 CVE request: PHP substr_replace() use-after-free",
"refsource" : "HP", "refsource": "MLIST",
"url" : "http://marc.info/?l=bugtraq&m=133469208622507&w=2" "url": "http://openwall.com/lists/oss-security/2011/03/13/2"
},
{
"name" : "SSRT100826",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
}, },
{ {
"name": "MDVSA-2011:165", "name": "MDVSA-2011:165",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:165" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:165"
}, },
{
"name": "[oss-security] 20110313 Re: CVE request: PHP substr_replace() use-after-free",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/13/9"
},
{
"name": "APPLE-SA-2012-02-01-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name": "[oss-security] 20110313 Re: CVE request: PHP substr_replace() use-after-free",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/13/3"
},
{
"name": "http://bugs.php.net/bug.php?id=54238",
"refsource": "CONFIRM",
"url": "http://bugs.php.net/bug.php?id=54238"
},
{
"name": "SSRT100826",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
},
{ {
"name": "RHSA-2011:1423", "name": "RHSA-2011:1423",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1423.html" "url": "http://www.redhat.com/support/errata/RHSA-2011-1423.html"
}, },
{
"name": "http://www.php.net/ChangeLog-5.php#5.3.7",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php#5.3.7"
},
{
"name": "php-substrreplace-code-exec(66080)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66080"
},
{ {
"name": "46843", "name": "46843",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/46843" "url": "http://www.securityfocus.com/bid/46843"
}, },
{ {
"name" : "49241", "name": "http://www.php.net/archive/2011.php#id2011-08-18-1",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/49241" "url": "http://www.php.net/archive/2011.php#id2011-08-18-1"
},
{
"name" : "php-substrreplace-code-exec(66080)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66080"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1585", "ID": "CVE-2011-1585",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,20 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20110415 Re: CVE Request: cifs session reuse",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/04/15/8"
},
{ {
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36", "name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36" "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"
}, },
{ {
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ff67b720c02c36e54d55b88c2931879b7db1cd2", "name": "[oss-security] 20110415 Re: CVE Request: cifs session reuse",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ff67b720c02c36e54d55b88c2931879b7db1cd2" "url": "http://www.openwall.com/lists/oss-security/2011/04/15/8"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=697394", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=697394",
@ -77,6 +72,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/4ff67b720c02c36e54d55b88c2931879b7db1cd2" "url": "https://github.com/torvalds/linux/commit/4ff67b720c02c36e54d55b88c2931879b7db1cd2"
}, },
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ff67b720c02c36e54d55b88c2931879b7db1cd2",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ff67b720c02c36e54d55b88c2931879b7db1cd2"
},
{ {
"name": "SUSE-SU-2015:0812", "name": "SUSE-SU-2015:0812",
"refsource": "SUSE", "refsource": "SUSE",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1651", "ID": "CVE-2011-1651",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20110525 Cisco XR 12000 Series Shared Port Adapters Interface Processor Vulnerability",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f191.shtml"
},
{ {
"name": "1025567", "name": "1025567",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025567" "url": "http://www.securitytracker.com/id?1025567"
},
{
"name": "20110525 Cisco XR 12000 Series Shared Port Adapters Interface Processor Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f191.shtml"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3289", "ID": "CVE-2014-3289",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20140609 Cisco AsyncOS Cross-Site Scripting Vulnerability CVE-2014-3289", "name": "1030407",
"refsource" : "FULLDISC", "refsource": "SECTRACK",
"url" : "http://seclists.org/fulldisclosure/2014/Jun/57" "url": "http://www.securitytracker.com/id/1030407"
},
{
"name" : "http://packetstormsecurity.com/files/127004/Cisco-Ironport-Email-Security-Virtual-Appliance-8.0.0-671-XSS.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/127004/Cisco-Ironport-Email-Security-Virtual-Appliance-8.0.0-671-XSS.html"
},
{
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=34569",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=34569"
},
{
"name" : "20140609 Cisco AsyncOS Cross-Site Scripting Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3289"
}, },
{ {
"name": "VU#613308", "name": "VU#613308",
@ -78,19 +63,34 @@
"url": "http://www.kb.cert.org/vuls/id/613308" "url": "http://www.kb.cert.org/vuls/id/613308"
}, },
{ {
"name" : "67943", "name": "http://packetstormsecurity.com/files/127004/Cisco-Ironport-Email-Security-Virtual-Appliance-8.0.0-671-XSS.html",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/67943" "url": "http://packetstormsecurity.com/files/127004/Cisco-Ironport-Email-Security-Virtual-Appliance-8.0.0-671-XSS.html"
}, },
{ {
"name" : "1030407", "name": "20140609 Cisco AsyncOS Cross-Site Scripting Vulnerability CVE-2014-3289",
"refsource" : "SECTRACK", "refsource": "FULLDISC",
"url" : "http://www.securitytracker.com/id/1030407" "url": "http://seclists.org/fulldisclosure/2014/Jun/57"
},
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34569",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34569"
}, },
{ {
"name": "58296", "name": "58296",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58296" "url": "http://secunia.com/advisories/58296"
},
{
"name": "20140609 Cisco AsyncOS Cross-Site Scripting Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3289"
},
{
"name": "67943",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67943"
} }
] ]
} }

View File

@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20150424 Incorrect handling of self signed certificates in OpenFire XMPP Server",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/535363/100/1100/threaded"
},
{ {
"name": "[oss-security] 20150423 Incorrect handling of self signed certificates in OpenFire XMPP Server", "name": "[oss-security] 20150423 Incorrect handling of self signed certificates in OpenFire XMPP Server",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/23/16" "url": "http://www.openwall.com/lists/oss-security/2015/04/23/16"
}, },
{ {
"name" : "http://packetstormsecurity.com/files/131614/OpenFire-XMPP-3.9.3-Certificate-Handling.html", "name": "20150424 Incorrect handling of self signed certificates in OpenFire XMPP Server",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://packetstormsecurity.com/files/131614/OpenFire-XMPP-3.9.3-Certificate-Handling.html" "url": "http://www.securityfocus.com/archive/1/535363/100/1100/threaded"
}, },
{ {
"name": "https://community.igniterealtime.org/blogs/ignite/2015/04/22/openfire-3100-released", "name": "https://community.igniterealtime.org/blogs/ignite/2015/04/22/openfire-3100-released",
"refsource": "MISC", "refsource": "MISC",
"url": "https://community.igniterealtime.org/blogs/ignite/2015/04/22/openfire-3100-released" "url": "https://community.igniterealtime.org/blogs/ignite/2015/04/22/openfire-3100-released"
}, },
{
"name": "http://packetstormsecurity.com/files/131614/OpenFire-XMPP-3.9.3-Certificate-Handling.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/131614/OpenFire-XMPP-3.9.3-Certificate-Handling.html"
},
{ {
"name": "74305", "name": "74305",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3537", "ID": "CVE-2014-3537",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,45 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.cups.org/blog.php?L724",
"refsource" : "CONFIRM",
"url" : "http://www.cups.org/blog.php?L724"
},
{
"name" : "http://www.cups.org/str.php?L4450",
"refsource" : "CONFIRM",
"url" : "http://www.cups.org/str.php?L4450"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1115576",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1115576"
},
{
"name" : "https://support.apple.com/kb/HT6535",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT6535"
},
{
"name" : "http://advisories.mageia.org/MGASA-2014-0313.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2014-0313.html"
},
{
"name" : "APPLE-SA-2014-10-16-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{ {
"name": "FEDORA-2014-8351", "name": "FEDORA-2014-8351",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html"
}, },
{ {
"name" : "MDVSA-2015:108", "name": "60273",
"refsource" : "MANDRIVA", "refsource": "SECUNIA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" "url": "http://secunia.com/advisories/60273"
},
{
"name": "http://www.cups.org/blog.php?L724",
"refsource": "CONFIRM",
"url": "http://www.cups.org/blog.php?L724"
}, },
{ {
"name": "RHSA-2014:1388", "name": "RHSA-2014:1388",
@ -102,30 +77,55 @@
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2293-1" "url": "http://www.ubuntu.com/usn/USN-2293-1"
}, },
{
"name": "APPLE-SA-2014-10-16-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{ {
"name": "68788", "name": "68788",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/68788" "url": "http://www.securityfocus.com/bid/68788"
}, },
{
"name" : "1030611",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030611"
},
{
"name" : "59945",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59945"
},
{ {
"name": "60787", "name": "60787",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60787" "url": "http://secunia.com/advisories/60787"
}, },
{ {
"name" : "60273", "name": "http://www.cups.org/str.php?L4450",
"refsource": "CONFIRM",
"url": "http://www.cups.org/str.php?L4450"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1115576",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115576"
},
{
"name": "59945",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/60273" "url": "http://secunia.com/advisories/59945"
},
{
"name": "https://support.apple.com/kb/HT6535",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6535"
},
{
"name": "1030611",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030611"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0313.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0313.html"
},
{
"name": "MDVSA-2015:108",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3692", "ID": "CVE-2014-3692",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "RHSA-2015:0028",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0028.html"
},
{ {
"name": "62255", "name": "62255",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62255" "url": "http://secunia.com/advisories/62255"
},
{
"name": "RHSA-2015:0028",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0028.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-6469", "ID": "CVE-2014-6469",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,15 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", "name": "62073",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" "url": "http://secunia.com/advisories/62073"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
}, },
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name" : "GLSA-201411-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201411-02.xml"
},
{ {
"name": "SUSE-SU-2015:0743", "name": "SUSE-SU-2015:0743",
"refsource": "SUSE", "refsource": "SUSE",
@ -82,15 +72,25 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/70446" "url": "http://www.securityfocus.com/bid/70446"
}, },
{
"name": "GLSA-201411-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201411-02.xml"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{ {
"name": "61579", "name": "61579",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61579" "url": "http://secunia.com/advisories/61579"
}, },
{ {
"name" : "62073", "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/62073" "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6747", "ID": "CVE-2014-6747",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#439497", "name": "VU#439497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6757", "ID": "CVE-2014-6757",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#910385",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/910385"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#910385", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/910385" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7405", "ID": "CVE-2014-7405",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#708865", "name": "VU#708865",
"refsource": "CERT-VN", "refsource": "CERT-VN",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7406", "ID": "CVE-2014-7406",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#615057",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/615057"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#615057", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/615057" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2014-7919", "ID": "CVE-2014-7919",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://android.googlesource.com/platform/frameworks/native/+/ae33effd43a615183f089f0a216b5965e8104842%5E%21/#F0",
"refsource" : "CONFIRM",
"url" : "https://android.googlesource.com/platform/frameworks/native/+/ae33effd43a615183f089f0a216b5965e8104842%5E%21/#F0"
},
{ {
"name": "https://github.com/alexpark07/Bookmark/blob/master/BugHunting.md", "name": "https://github.com/alexpark07/Bookmark/blob/master/BugHunting.md",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "99014", "name": "99014",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/99014" "url": "http://www.securityfocus.com/bid/99014"
},
{
"name": "https://android.googlesource.com/platform/frameworks/native/+/ae33effd43a615183f089f0a216b5965e8104842%5E%21/#F0",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/native/+/ae33effd43a615183f089f0a216b5965e8104842%5E%21/#F0"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-7990", "ID": "CVE-2014-7990",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "20141106 Cisco IOS XE Challenge/Response Bypass Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7990"
},
{ {
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36351", "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36351",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36351" "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36351"
}, },
{ {
"name" : "20141106 Cisco IOS XE Challenge/Response Bypass Vulnerability", "name": "ciscoiosxe-cve20147990-sec-bypass(98529)",
"refsource" : "CISCO", "refsource": "XF",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7990" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98529"
}, },
{ {
"name": "70968", "name": "70968",
@ -71,11 +76,6 @@
"name": "1031179", "name": "1031179",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031179" "url": "http://www.securitytracker.com/id/1031179"
},
{
"name" : "ciscoiosxe-cve20147990-sec-bypass(98529)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98529"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-8099", "ID": "CVE-2014-8099",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "DSA-3095",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3095"
},
{ {
"name": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", "name": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,25 +67,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0532.html" "url": "http://advisories.mageia.org/MGASA-2014-0532.html"
}, },
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"name" : "DSA-3095",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-3095"
},
{ {
"name": "GLSA-201504-06", "name": "GLSA-201504-06",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-06" "url": "https://security.gentoo.org/glsa/201504-06"
}, },
{ {
"name" : "MDVSA-2015:119", "name": "62292",
"refsource" : "MANDRIVA", "refsource": "SECUNIA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119" "url": "http://secunia.com/advisories/62292"
}, },
{ {
"name": "71600", "name": "71600",
@ -88,9 +83,14 @@
"url": "http://www.securityfocus.com/bid/71600" "url": "http://www.securityfocus.com/bid/71600"
}, },
{ {
"name" : "62292", "name": "MDVSA-2015:119",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/62292" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
}, },
{ {
"name": "61947", "name": "61947",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-8114", "ID": "CVE-2014-8114",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/uberfire/uberfire/commit/21ec50eb15",
"refsource" : "CONFIRM",
"url" : "https://github.com/uberfire/uberfire/commit/21ec50eb15"
},
{ {
"name": "RHSA-2015:0234", "name": "RHSA-2015:0234",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -66,6 +61,11 @@
"name": "RHSA-2015:0235", "name": "RHSA-2015:0235",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0235.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-0235.html"
},
{
"name": "https://github.com/uberfire/uberfire/commit/21ec50eb15",
"refsource": "CONFIRM",
"url": "https://github.com/uberfire/uberfire/commit/21ec50eb15"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8204", "ID": "CVE-2014-8204",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-8927", "ID": "CVE-2014-8927",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2014-9886", "ID": "CVE-2014-9886",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -62,11 +62,6 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://marc.info/?l=botan-devel&m=145449001708138&w=2" "url": "http://marc.info/?l=botan-devel&m=145449001708138&w=2"
}, },
{
"name" : "http://botan.randombit.net/security.html",
"refsource" : "CONFIRM",
"url" : "http://botan.randombit.net/security.html"
},
{ {
"name": "DSA-3565", "name": "DSA-3565",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -76,6 +71,11 @@
"name": "GLSA-201612-38", "name": "GLSA-201612-38",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-38" "url": "https://security.gentoo.org/glsa/201612-38"
},
{
"name": "http://botan.randombit.net/security.html",
"refsource": "CONFIRM",
"url": "http://botan.randombit.net/security.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-2808", "ID": "CVE-2016-2808",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,54 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-47.html", "name": "openSUSE-SU-2016:1211",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-47.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1246061",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1246061"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
}, },
{
"name" : "DSA-3559",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3559"
},
{
"name" : "GLSA-201701-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-15"
},
{ {
"name": "RHSA-2016:0695", "name": "RHSA-2016:0695",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0695.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-0695.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1211", "name": "1035692",
"refsource" : "SUSE", "refsource": "SECTRACK",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" "url": "http://www.securitytracker.com/id/1035692"
},
{
"name" : "SUSE-SU-2016:1258",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html"
},
{
"name" : "openSUSE-SU-2016:1251",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html"
},
{
"name" : "SUSE-SU-2016:1352",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html"
}, },
{ {
"name": "SUSE-SU-2016:1374", "name": "SUSE-SU-2016:1374",
@ -108,24 +78,54 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html"
}, },
{ {
"name" : "USN-2936-1", "name": "openSUSE-SU-2016:1251",
"refsource" : "UBUNTU", "refsource": "SUSE",
"url" : "http://www.ubuntu.com/usn/USN-2936-1" "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html"
}, },
{ {
"name": "USN-2936-2", "name": "USN-2936-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2936-2" "url": "http://www.ubuntu.com/usn/USN-2936-2"
}, },
{
"name": "SUSE-SU-2016:1352",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html"
},
{
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-47.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-47.html"
},
{
"name": "GLSA-201701-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-15"
},
{
"name": "DSA-3559",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3559"
},
{
"name": "USN-2936-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2936-1"
},
{ {
"name": "USN-2936-3", "name": "USN-2936-3",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2936-3" "url": "http://www.ubuntu.com/usn/USN-2936-3"
}, },
{ {
"name" : "1035692", "name": "SUSE-SU-2016:1258",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1035692" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1246061",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1246061"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2016-2963", "ID": "CVE-2016-2963",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21991867",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21991867"
},
{ {
"name": "IV89797", "name": "IV89797",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV89797" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV89797"
}, },
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21991867",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991867"
},
{ {
"name": "94596", "name": "94596",
"refsource": "BID", "refsource": "BID",

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-ise" "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-ise"
}, },
{
"name" : "93897",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/93897"
},
{ {
"name": "1037109", "name": "1037109",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037109" "url": "http://www.securitytracker.com/id/1037109"
},
{
"name": "93897",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93897"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-6967", "ID": "CVE-2016-6967",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html", "name": "1036986",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html" "url": "http://www.securitytracker.com/id/1036986"
}, },
{ {
"name": "93491", "name": "93491",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/93491" "url": "http://www.securityfocus.com/bid/93491"
}, },
{ {
"name" : "1036986", "name": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1036986" "url": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html"
} }
] ]
} }

View File

@ -52,21 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html",
"refsource" : "MISC",
"url" : "https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html"
},
{ {
"name": "https://crbug.com/747847", "name": "https://crbug.com/747847",
"refsource": "MISC", "refsource": "MISC",
"url": "https://crbug.com/747847" "url": "https://crbug.com/747847"
}, },
{
"name" : "DSA-3985",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3985"
},
{ {
"name": "GLSA-201709-15", "name": "GLSA-201709-15",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -77,15 +67,25 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2676" "url": "https://access.redhat.com/errata/RHSA-2017:2676"
}, },
{
"name": "1039291",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039291"
},
{ {
"name": "100610", "name": "100610",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/100610" "url": "http://www.securityfocus.com/bid/100610"
}, },
{ {
"name" : "1039291", "name": "DSA-3985",
"refsource" : "SECTRACK", "refsource": "DEBIAN",
"url" : "http://www.securitytracker.com/id/1039291" "url": "http://www.debian.org/security/2017/dsa-3985"
},
{
"name": "https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html"
} }
] ]
} }

View File

@ -69,25 +69,25 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1319370" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1319370"
}, },
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-05/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-05/"
},
{ {
"name": "https://www.mozilla.org/security/advisories/mfsa2017-09/", "name": "https://www.mozilla.org/security/advisories/mfsa2017-09/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-09/" "url": "https://www.mozilla.org/security/advisories/mfsa2017-09/"
}, },
{ {
"name" : "96692", "name": "https://www.mozilla.org/security/advisories/mfsa2017-05/",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/96692" "url": "https://www.mozilla.org/security/advisories/mfsa2017-05/"
}, },
{ {
"name": "1037966", "name": "1037966",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037966" "url": "http://www.securitytracker.com/id/1037966"
},
{
"name": "96692",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96692"
} }
] ]
} }

View File

@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/c4e490cf148e85ead0d1b1c2caaba833f1d5b29f",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/c4e490cf148e85ead0d1b1c2caaba833f1d5b29f"
},
{ {
"name": "[oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernel", "name": "[oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernel",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/01/21/3" "url": "http://www.openwall.com/lists/oss-security/2017/01/21/3"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1415733",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415733"
},
{ {
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4e490cf148e85ead0d1b1c2caaba833f1d5b29f", "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4e490cf148e85ead0d1b1c2caaba833f1d5b29f",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,16 +77,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5" "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5"
}, },
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1415733",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1415733"
},
{
"name" : "https://github.com/torvalds/linux/commit/c4e490cf148e85ead0d1b1c2caaba833f1d5b29f",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/c4e490cf148e85ead0d1b1c2caaba833f1d5b29f"
},
{ {
"name": "95711", "name": "95711",
"refsource": "BID", "refsource": "BID",

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03721en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03721en_us"
},
{ {
"name": "97412", "name": "97412",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/97412" "url": "http://www.securityfocus.com/bid/97412"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03721en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03721en_us"
} }
] ]
} }