"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:18:03 +00:00
parent 193e4e0b43
commit ba01e4646e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
51 changed files with 3799 additions and 3799 deletions

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20060104 Rockliffe Mailsite User Enumeration Flaw",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/040970.html"
},
{
"name": "http://zur.homelinux.com/Advisories/RockliffeMailsiteUserEnum.txt",
"refsource": "MISC",
"url": "http://zur.homelinux.com/Advisories/RockliffeMailsiteUserEnum.txt"
},
{
"name": "20060104 Rockliffe Mailsite User Enumeration Flaw",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/040970.html"
}
]
}

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html"
},
{
"name" : "VU#545804",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/545804"
},
{
"name" : "16287",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16287"
},
{
"name" : "ADV-2006-0243",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0243"
"name": "18493",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18493"
},
{
"name": "ADV-2006-0323",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0323"
},
{
"name": "16287",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16287"
},
{
"name": "VU#545804",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/545804"
},
{
"name": "1015499",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015499"
},
{
"name" : "18493",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18493"
"name": "ADV-2006-0243",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0243"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html"
},
{
"name": "18608",

View File

@ -57,16 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/424955/100/0/threaded"
},
{
"name" : "http://www.deltascripts.com/board/viewtopic.php?id=7234",
"refsource" : "CONFIRM",
"url" : "http://www.deltascripts.com/board/viewtopic.php?id=7234"
},
{
"name" : "16642",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16642"
},
{
"name": "ADV-2006-0600",
"refsource": "VUPEN",
@ -81,6 +71,16 @@
"name": "424",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/424"
},
{
"name": "16642",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16642"
},
{
"name": "http://www.deltascripts.com/board/viewtopic.php?id=7234",
"refsource": "CONFIRM",
"url": "http://www.deltascripts.com/board/viewtopic.php?id=7234"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060413 ZDI-06-008: Novell GroupWise Messenger Accept-Language Buffer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/430911/100/0/threaded"
"name": "http://metasploit.blogspot.com/2006/04/exploit-development-groupwise_14.html",
"refsource": "MISC",
"url": "http://metasploit.blogspot.com/2006/04/exploit-development-groupwise_14.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-008.html",
@ -63,29 +63,9 @@
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-008.html"
},
{
"name" : "http://cirt.dk/advisories/cirt-42-advisory.txt",
"refsource" : "MISC",
"url" : "http://cirt.dk/advisories/cirt-42-advisory.txt"
},
{
"name" : "http://metasploit.blogspot.com/2006/04/exploit-development-groupwise_14.html",
"refsource" : "MISC",
"url" : "http://metasploit.blogspot.com/2006/04/exploit-development-groupwise_14.html"
},
{
"name" : "1679",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1679"
},
{
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?10100861.htm",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?10100861.htm"
},
{
"name" : "17503",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17503"
"name": "24617",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24617"
},
{
"name": "ADV-2006-1355",
@ -93,14 +73,9 @@
"url": "http://www.vupen.com/english/advisories/2006/1355"
},
{
"name" : "24617",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24617"
},
{
"name" : "1015911",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015911"
"name": "groupwise-accept-language-bo(25828)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25828"
},
{
"name": "19663",
@ -108,9 +83,34 @@
"url": "http://secunia.com/advisories/19663"
},
{
"name" : "groupwise-accept-language-bo(25828)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25828"
"name": "20060413 ZDI-06-008: Novell GroupWise Messenger Accept-Language Buffer Overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/430911/100/0/threaded"
},
{
"name": "1679",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1679"
},
{
"name": "1015911",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015911"
},
{
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?10100861.htm",
"refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?10100861.htm"
},
{
"name": "http://cirt.dk/advisories/cirt-42-advisory.txt",
"refsource": "MISC",
"url": "http://cirt.dk/advisories/cirt-42-advisory.txt"
},
{
"name": "17503",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17503"
}
]
}

View File

@ -52,65 +52,65 @@
},
"references": {
"reference_data": [
{
"name" : "20060324 [eVuln] DSPoll Multiple SQL Injection Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/428663/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/96/summary.html",
"refsource" : "MISC",
"url" : "http://evuln.com/vulns/96/summary.html"
},
{
"name" : "17103",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17103"
},
{
"name" : "ADV-2006-0932",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0932"
},
{
"name" : "23879",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23879"
},
{
"name" : "23880",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23880"
},
{
"name": "23881",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23881"
},
{
"name" : "1015758",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015758"
},
{
"name": "19209",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19209"
},
{
"name": "1015758",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015758"
},
{
"name": "23879",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23879"
},
{
"name": "17103",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17103"
},
{
"name": "23880",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23880"
},
{
"name": "dspoll-pollid-sql-injection(25192)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25192"
},
{
"name": "620",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/620"
},
{
"name": "20060324 [eVuln] DSPoll Multiple SQL Injection Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/428663/100/0/threaded"
},
{
"name": "622",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/622"
},
{
"name" : "dspoll-pollid-sql-injection(25192)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25192"
"name": "ADV-2006-0932",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0932"
},
{
"name": "http://evuln.com/vulns/96/summary.html",
"refsource": "MISC",
"url": "http://evuln.com/vulns/96/summary.html"
}
]
}

View File

@ -52,6 +52,56 @@
},
"references": {
"reference_data": [
{
"name": "20060322 Re: [SPAM:] - ASPPortal <= 3.1.1 Multiple Remote SQL Injection Vulnerabilities - Email has different SMTP TO: and MIME TO: fields in the email addresses",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1431.html"
},
{
"name": "24091",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24091"
},
{
"name": "19286",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19286"
},
{
"name": "24092",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24092"
},
{
"name": "24090",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24090"
},
{
"name": "http://www.nukedx.com/?viewdoc=21",
"refsource": "MISC",
"url": "http://www.nukedx.com/?viewdoc=21"
},
{
"name": "24086",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24086"
},
{
"name": "aspportal-multiple-aspscripts-sql-injection(25346)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25346"
},
{
"name": "608",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/608"
},
{
"name": "24085",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24085"
},
{
"name": "20060321 ASPPortal <= 3.1.1 Multiple Remote SQL Injection Vulnerabilities",
"refsource": "BUGTRAQ",
@ -63,24 +113,9 @@
"url": "http://www.securityfocus.com/archive/1/428615/100/0/threaded"
},
{
"name" : "20060321 ASPPortal <= 3.1.1 Multiple Remote SQL Injection Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1402.html"
},
{
"name" : "20060322 Re: [SPAM:] - ASPPortal <= 3.1.1 Multiple Remote SQL Injection Vulnerabilities - Email has different SMTP TO: and MIME TO: fields in the email addresses",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1431.html"
},
{
"name" : "http://www.nukedx.com/?viewdoc=21",
"refsource" : "MISC",
"url" : "http://www.nukedx.com/?viewdoc=21"
},
{
"name" : "1597",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1597"
"name": "24084",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24084"
},
{
"name": "17174",
@ -97,21 +132,6 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24020"
},
{
"name" : "24084",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24084"
},
{
"name" : "24085",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24085"
},
{
"name" : "24086",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24086"
},
{
"name": "24087",
"refsource": "OSVDB",
@ -128,34 +148,14 @@
"url": "http://www.osvdb.org/24089"
},
{
"name" : "24090",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24090"
"name": "1597",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1597"
},
{
"name" : "24091",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24091"
},
{
"name" : "24092",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24092"
},
{
"name" : "19286",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19286"
},
{
"name" : "608",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/608"
},
{
"name" : "aspportal-multiple-aspscripts-sql-injection(25346)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25346"
"name": "20060321 ASPPortal <= 3.1.1 Multiple Remote SQL Injection Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1402.html"
}
]
}

View File

@ -53,20 +53,35 @@
"references": {
"reference_data": [
{
"name" : "20060512 Apple QuickDraw/QuickTime Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/433831/100/0/threaded"
"name": "20069",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20069"
},
{
"name": "APPLE-SA-2006-05-11",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2006/May/msg00002.html"
},
{
"name": "1016067",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016067"
},
{
"name": "TA06-132B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-132B.html"
},
{
"name": "quicktime-mov-overflow(26392)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26392"
},
{
"name": "887",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/887"
},
{
"name": "17953",
"refsource": "BID",
@ -78,24 +93,9 @@
"url": "http://www.vupen.com/english/advisories/2006/1778"
},
{
"name" : "1016067",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016067"
},
{
"name" : "20069",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20069"
},
{
"name" : "887",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/887"
},
{
"name" : "quicktime-mov-overflow(26392)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26392"
"name": "20060512 Apple QuickDraw/QuickTime Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/433831/100/0/threaded"
}
]
}

View File

@ -53,59 +53,39 @@
"references": {
"reference_data": [
{
"name" : "20061005 rPSA-2006-0182-1 php php-mysql php-pgsql",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/447866/100/0/threaded"
},
{
"name" : "http://www.hardened-php.net/hphp/changelog.html#hardening_patch_0.4.14",
"refsource" : "MISC",
"url" : "http://www.hardened-php.net/hphp/changelog.html#hardening_patch_0.4.14"
},
{
"name" : "http://www.php.net/ChangeLog-5.php#5.1.6",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php#5.1.6"
},
{
"name" : "http://www.php.net/release_5_1_6.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/release_5_1_6.php"
"name": "1016984",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016984"
},
{
"name": "https://issues.rpath.com/browse/RPL-683",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-683"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm"
},
{
"name" : "DSA-1331",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1331"
},
{
"name": "RHSA-2006:0669",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0669.html"
},
{
"name" : "RHSA-2006:0682",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0682.html"
"name": "oval:org.mitre.oval:def:11086",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11086"
},
{
"name": "22487",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22487"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm"
},
{
"name": "TLSA-2006-38",
"refsource": "TURBO",
"url": "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt"
},
{
"name": "RHSA-2006:0688",
@ -113,19 +93,9 @@
"url": "http://rhn.redhat.com/errata/RHSA-2006-0688.html"
},
{
"name" : "20061001-01-P",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc"
},
{
"name" : "SUSE-SA:2006:052",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_52_php.html"
},
{
"name" : "TLSA-2006-38",
"refsource" : "TURBO",
"url" : "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt"
"name": "http://www.hardened-php.net/hphp/changelog.html#hardening_patch_0.4.14",
"refsource": "MISC",
"url": "http://www.hardened-php.net/hphp/changelog.html#hardening_patch_0.4.14"
},
{
"name": "USN-362-1",
@ -138,14 +108,29 @@
"url": "http://www.securityfocus.com/bid/19582"
},
{
"name" : "oval:org.mitre.oval:def:11086",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11086"
"name": "http://www.php.net/ChangeLog-5.php#5.1.6",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php#5.1.6"
},
{
"name" : "1016984",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016984"
"name": "22004",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22004"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm"
},
{
"name": "22538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22538"
},
{
"name": "RHSA-2006:0682",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0682.html"
},
{
"name": "21546",
@ -153,9 +138,19 @@
"url": "http://secunia.com/advisories/21546"
},
{
"name" : "22004",
"name": "22440",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/22004"
"url": "http://secunia.com/advisories/22440"
},
{
"name": "20061005 rPSA-2006-0182-1 php php-mysql php-pgsql",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/447866/100/0/threaded"
},
{
"name": "DSA-1331",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1331"
},
{
"name": "22069",
@ -168,19 +163,14 @@
"url": "http://secunia.com/advisories/22225"
},
{
"name" : "22440",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22440"
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm"
},
{
"name" : "22538",
"name": "25945",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/22538"
},
{
"name" : "22487",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22487"
"url": "http://secunia.com/advisories/25945"
},
{
"name": "22331",
@ -188,9 +178,19 @@
"url": "http://secunia.com/advisories/22331"
},
{
"name" : "25945",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25945"
"name": "http://www.php.net/release_5_1_6.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/release_5_1_6.php"
},
{
"name": "20061001-01-P",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc"
},
{
"name": "SUSE-SA:2006:052",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_52_php.html"
}
]
}

View File

@ -53,14 +53,14 @@
"references": {
"reference_data": [
{
"name" : "2445",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2445"
"name": "22124",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22124"
},
{
"name" : "VU#693992",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/693992"
"name": "navicopa-http-get-bo(29221)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29221"
},
{
"name": "20250",
@ -73,14 +73,14 @@
"url": "http://www.vupen.com/english/advisories/2006/3819"
},
{
"name" : "22124",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22124"
"name": "2445",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2445"
},
{
"name" : "navicopa-http-get-bo(29221)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29221"
"name": "VU#693992",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/693992"
}
]
}

View File

@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "20061013 SYMSA-2006-010: Directory Traversal in IronWebMail",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/448779/100/0/threaded"
},
{
"name": "https://supportcenter.ciphertrust.com/vulnerability/IWM501-01.html",
"refsource": "MISC",
"url": "https://supportcenter.ciphertrust.com/vulnerability/IWM501-01.html"
},
{
"name" : "http://www.symantec.com/enterprise/research/SYMSA-2006-010.txt",
"refsource" : "MISC",
"url" : "http://www.symantec.com/enterprise/research/SYMSA-2006-010.txt"
},
{
"name" : "20436",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20436"
},
{
"name" : "ADV-2006-4055",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4055"
},
{
"name": "1017069",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017069"
},
{
"name": "ADV-2006-4055",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4055"
},
{
"name": "20436",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20436"
},
{
"name": "22406",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22406"
},
{
"name": "ironwebmail-url-directory-traversal(29620)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29620"
},
{
"name": "20061013 SYMSA-2006-010: Directory Traversal in IronWebMail",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/448779/100/0/threaded"
},
{
"name": "1726",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1726"
},
{
"name" : "ironwebmail-url-directory-traversal(29620)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29620"
"name": "http://www.symantec.com/enterprise/research/SYMSA-2006-010.txt",
"refsource": "MISC",
"url": "http://www.symantec.com/enterprise/research/SYMSA-2006-010.txt"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2878",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "1024361",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024361"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html"
},
{
"name": "20100824 TPTI-10-10: Adobe Shockwave tSAC Chunk Invalid Seek Memory Corruption Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
@ -62,21 +72,11 @@
"refsource": "MISC",
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-20.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-20.html"
},
{
"name": "oval:org.mitre.oval:def:11883",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883"
},
{
"name" : "1024361",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024361"
},
{
"name": "ADV-2010-2176",
"refsource": "VUPEN",

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=52682"
},
{
"name" : "http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html"
},
{
"name": "oval:org.mitre.oval:def:12133",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12133"
},
{
"name": "http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-3504",
"STATE": "PUBLIC"
},

View File

@ -53,65 +53,40 @@
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-264/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-264/"
},
{
"name" : "http://www.mozilla.org/security/announce/2010/mfsa2010-80.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2010/mfsa2010-80.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=590771",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=590771"
},
{
"name" : "http://support.avaya.com/css/P8/documents/100124650",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100124650"
},
{
"name" : "FEDORA-2010-18773",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052032.html"
"name": "SUSE-SA:2011:003",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html"
},
{
"name": "FEDORA-2010-18775",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052022.html"
},
{
"name" : "FEDORA-2010-18890",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052502.html"
},
{
"name" : "FEDORA-2010-18920",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052504.html"
},
{
"name": "MDVSA-2010:251",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:251"
},
{
"name": "http://support.avaya.com/css/P8/documents/100124650",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100124650"
},
{
"name": "RHSA-2010:0966",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0966.html"
},
{
"name" : "SUSE-SA:2011:003",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html"
},
{
"name": "USN-1019-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1019-1"
},
{
"name": "42818",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42818"
},
{
"name": "45326",
"refsource": "BID",
@ -122,25 +97,50 @@
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12649"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-264/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-264/"
},
{
"name": "1024848",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024848"
},
{
"name": "FEDORA-2010-18920",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052504.html"
},
{
"name": "ADV-2011-0030",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0030"
},
{
"name": "FEDORA-2010-18890",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052502.html"
},
{
"name": "http://www.mozilla.org/security/announce/2010/mfsa2010-80.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2010/mfsa2010-80.html"
},
{
"name": "42716",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42716"
},
{
"name" : "42818",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42818"
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=590771",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=590771"
},
{
"name" : "ADV-2011-0030",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0030"
"name": "FEDORA-2010-18773",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052032.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2010-4140",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "15646",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/15646"
"name": "http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226",
"refsource": "CONFIRM",
"url": "http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226"
},
{
"name": "http://packetstormsecurity.org/files/view/96230/dynpg-lfisqldisclose.txt",
@ -68,9 +68,9 @@
"url": "http://www.htbridge.ch/advisory/path_disclosure_in_dynpg.html"
},
{
"name" : "http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226",
"refsource" : "CONFIRM",
"url" : "http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226"
"name": "15646",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15646"
},
{
"name": "69632",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4523",
"STATE": "PUBLIC"
},
@ -52,90 +52,65 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20101221 CVE request: opensc buffer overflow",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/21/2"
},
{
"name" : "[oss-security] 20101222 Re: CVE request: opensc buffer overflow",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/12/22/3"
},
{
"name" : "http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf",
"refsource" : "MISC",
"url" : "http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf"
},
{
"name": "http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html",
"refsource": "MISC",
"url": "http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427"
},
{
"name" : "https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=664831",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=664831"
},
{
"name" : "https://www.opensc-project.org/opensc/changeset/4913",
"refsource" : "CONFIRM",
"url" : "https://www.opensc-project.org/opensc/changeset/4913"
},
{
"name" : "FEDORA-2010-19192",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052796.html"
},
{
"name" : "FEDORA-2010-19193",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052777.html"
},
{
"name" : "MDVSA-2011:011",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:011"
},
{
"name" : "SUSE-SR:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name" : "45435",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/45435"
},
{
"name" : "42658",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42658"
},
{
"name" : "42807",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42807"
},
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name" : "ADV-2011-0009",
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0009"
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "[oss-security] 20101222 Re: CVE request: opensc buffer overflow",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/22/3"
},
{
"name": "https://www.opensc-project.org/opensc/changeset/4913",
"refsource": "CONFIRM",
"url": "https://www.opensc-project.org/opensc/changeset/4913"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427"
},
{
"name": "MDVSA-2011:011",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:011"
},
{
"name": "FEDORA-2010-19193",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052777.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=664831",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664831"
},
{
"name": "42807",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42807"
},
{
"name": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf",
"refsource": "MISC",
"url": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "ADV-2011-0109",
@ -143,9 +118,34 @@
"url": "http://www.vupen.com/english/advisories/2011/0109"
},
{
"name" : "ADV-2011-0212",
"name": "42658",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42658"
},
{
"name": "ADV-2011-0009",
"refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0212"
"url": "http://www.vupen.com/english/advisories/2011/0009"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483"
},
{
"name": "FEDORA-2010-19192",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052796.html"
},
{
"name": "[oss-security] 20101221 CVE request: opensc buffer overflow",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/21/2"
},
{
"name": "45435",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45435"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "14326",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/14326"
"name": "aco-contacts-sql-injection(60269)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60269"
},
{
"name": "ADV-2010-1785",
@ -63,9 +63,9 @@
"url": "http://www.vupen.com/english/advisories/2010/1785"
},
{
"name" : "aco-contacts-sql-injection(60269)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/60269"
"name": "14326",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14326"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20140521 Wordpress Booking System (Booking Calendar) plugin SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/532168/100/0/threaded"
"name": "http://packetstormsecurity.com/files/126762/WordPress-Booking-System-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/126762/WordPress-Booking-System-SQL-Injection.html"
},
{
"name": "http://wordpress.org/plugins/booking-system/changelog",
@ -63,9 +63,9 @@
"url": "http://wordpress.org/plugins/booking-system/changelog"
},
{
"name" : "http://packetstormsecurity.com/files/126762/WordPress-Booking-System-SQL-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/126762/WordPress-Booking-System-SQL-Injection.html"
"name": "20140521 Wordpress Booking System (Booking Calendar) plugin SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/532168/100/0/threaded"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3327",
"STATE": "PUBLIC"
},
@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "60650",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60650"
},
{
"name": "20140806 Cisco IOS Software and Cisco IOS XE Software EnergyWise Crafted Packet Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140806-energywise"
},
{
"name" : "69066",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69066"
},
{
"name": "1030682",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030682"
},
{
"name" : "60650",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60650"
},
{
"name": "ciscoios-xe-cve20143327-dos(95137)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95137"
},
{
"name": "69066",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69066"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3554",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2014/07/29/2"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1118583",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1118583"
"name": "libndp-cve20143554-bo(94927)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94927"
},
{
"name": "68945",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/68945"
},
{
"name" : "libndp-cve20143554-bo(94927)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/94927"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1118583",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118583"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-3795",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-4269",
"STATE": "PUBLIC"
},
@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name" : "68577",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68577"
},
{
"name": "1030579",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030579"
},
{
"name" : "59289",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59289"
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name": "oracle-cpujul2014-cve20144269(94566)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94566"
},
{
"name": "59289",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59289"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name": "68577",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68577"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-4476",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/HT204243",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/HT204243"
"name": "1031647",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031647"
},
{
"name": "http://support.apple.com/HT204245",
@ -68,14 +68,14 @@
"url": "http://support.apple.com/HT204246"
},
{
"name" : "https://support.apple.com/kb/HT204949",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT204949"
"name": "APPLE-SA-2015-06-30-6",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html"
},
{
"name" : "APPLE-SA-2015-01-27-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html"
"name": "http://support.apple.com/HT204243",
"refsource": "CONFIRM",
"url": "http://support.apple.com/HT204243"
},
{
"name": "APPLE-SA-2015-01-27-2",
@ -88,9 +88,9 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00002.html"
},
{
"name" : "APPLE-SA-2015-06-30-6",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html"
"name": "https://support.apple.com/kb/HT204949",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT204949"
},
{
"name": "72329",
@ -98,9 +98,9 @@
"url": "http://www.securityfocus.com/bid/72329"
},
{
"name" : "1031647",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031647"
"name": "APPLE-SA-2015-01-27-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-8180",
"STATE": "PUBLIC"
},

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "https://www.drupal.org/node/2324689",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2324689"
"name": "60758",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60758"
},
{
"name": "https://www.drupal.org/node/2324303",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2324303"
},
{
"name": "https://www.drupal.org/node/2324689",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2324689"
},
{
"name": "69343",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69343"
},
{
"name" : "60758",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60758"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.com/files/129507",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/129507"
},
{
"name": "lightboxphoto-wordpress-multiple-csrf(99490)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99490"
},
{
"name": "http://packetstormsecurity.com/files/129507",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/129507"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20150212 CVE-2014-9469 vBulletin XSS (Cross-Site Scripting) Security Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Feb/49"
"name": "72592",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72592"
},
{
"name": "http://packetstormsecurity.com/files/130393/vBulletin-5.1.3-Cross-Site-Scripting.html",
@ -63,9 +63,9 @@
"url": "http://packetstormsecurity.com/files/130393/vBulletin-5.1.3-Cross-Site-Scripting.html"
},
{
"name" : "72592",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/72592"
"name": "20150212 CVE-2014-9469 vBulletin XSS (Cross-Site Scripting) Security Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Feb/49"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2014-9487",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23",
"refsource" : "MLIST",
"url" : "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html"
},
{
"name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/01/03/13"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1175828",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1175828"
},
{
"name": "GLSA-201502-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201502-04"
},
{
"name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23",
"refsource": "MLIST",
"url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1175828",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175828"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-9634",
"STATE": "PUBLIC"
},
@ -57,20 +57,20 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/01/22/3"
},
{
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682",
"refsource" : "CONFIRM",
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1185148",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185148"
},
{
"name" : "https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710",
"name": "https://jenkins.io/changelog-old/",
"refsource": "CONFIRM",
"url" : "https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710"
"url": "https://jenkins.io/changelog-old/"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682"
},
{
"name": "https://issues.jenkins-ci.org/browse/JENKINS-25019",
@ -78,9 +78,9 @@
"url": "https://issues.jenkins-ci.org/browse/JENKINS-25019"
},
{
"name" : "https://jenkins.io/changelog-old/",
"name": "https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710",
"refsource": "CONFIRM",
"url" : "https://jenkins.io/changelog-old/"
"url": "https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710"
},
{
"name": "72054",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-9639",
"STATE": "PUBLIC"
},
@ -53,20 +53,35 @@
"references": {
"reference_data": [
{
"name" : "20150119 vorbis-tools issues",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Jan/78"
"name": "72295",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72295"
},
{
"name": "[oss-security] 20150121 CVE request: two issues in vorbis-tools",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/01/21/5"
},
{
"name": "FEDORA-2015-2335",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150543.html"
},
{
"name": "[oss-security] 20150122 Re: CVE request: two issues in vorbis-tools",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/01/22/9"
},
{
"name": "openSUSE-SU-2015:0522",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00054.html"
},
{
"name": "20150119 vorbis-tools issues",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jan/78"
},
{
"name": "https://trac.xiph.org/ticket/2136",
"refsource": "MISC",
@ -76,21 +91,6 @@
"name": "FEDORA-2015-2330",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150570.html"
},
{
"name" : "FEDORA-2015-2335",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150543.html"
},
{
"name" : "openSUSE-SU-2015:0522",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-03/msg00054.html"
},
{
"name" : "72295",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/72295"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2014-9892",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-08-01.html"
},
{
"name" : "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e"
},
{
"name": "92222",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92222"
},
{
"name": "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-2467",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2633",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2764",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-3903",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-10-01.html"
},
{
"name" : "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=b8874573428e8ce024f57c6242d662fcca5e5d55",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=b8874573428e8ce024f57c6242d662fcca5e5d55"
},
{
"name": "93322",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93322"
},
{
"name": "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=b8874573428e8ce024f57c6242d662fcca5e5d55",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=b8874573428e8ce024f57c6242d662fcca5e5d55"
}
]
}

View File

@ -58,15 +58,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21995545",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21995545"
},
{
"name": "95102",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95102"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21995545",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21995545"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-6391",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20160928 Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip"
"name": "1036914",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036914"
},
{
"name": "93197",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/93197"
},
{
"name" : "1036914",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036914"
"name": "20160928 Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160905 Re: CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/09/05/9"
},
{
"name": "https://github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5",
"refsource": "CONFIRM",
"url": "https://github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5"
},
{
"name": "[oss-security] 20160905 Re: CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/09/05/9"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7310",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7337",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@suse.com",
"ID": "CVE-2016-7952",
"STATE": "PUBLIC"
},
@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20161004 Re: X.Org security advisory: Protocol handling issues in X Window System client libraries",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/10/04/4"
},
{
"name" : "[oss-security] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/10/04/2"
},
{
"name" : "[xorg-announce] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries",
"refsource" : "MLIST",
"url" : "https://lists.x.org/archives/xorg-announce/2016-October/002720.html"
},
{
"name" : "https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3",
"refsource" : "CONFIRM",
"url" : "https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3"
"name": "1036945",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036945"
},
{
"name": "FEDORA-2016-c1d4b1df79",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFLHX7WNEUXXDAGR324T35L5P6RRR7GE/"
},
{
"name" : "FEDORA-2016-e6ba110670",
"refsource" : "FEDORA",
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RVEUZRHYY3AJEKMFQ4DS7DX3Y2AICFP7/"
},
{
"name": "93375",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93375"
},
{
"name" : "1036945",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036945"
"name": "https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3",
"refsource": "CONFIRM",
"url": "https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3"
},
{
"name": "[xorg-announce] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries",
"refsource": "MLIST",
"url": "https://lists.x.org/archives/xorg-announce/2016-October/002720.html"
},
{
"name": "[oss-security] 20161004 Re: X.Org security advisory: Protocol handling issues in X Window System client libraries",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/04/4"
},
{
"name": "FEDORA-2016-e6ba110670",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RVEUZRHYY3AJEKMFQ4DS7DX3Y2AICFP7/"
},
{
"name": "[oss-security] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/04/2"
}
]
}