"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:39:55 +00:00
parent 3fed44902f
commit be570b411d
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 3633 additions and 3636 deletions

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20010803 REPOST: A damaging local DoS in WinNT SP6a", "name": "3144",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/201722" "url": "http://www.securityfocus.com/bid/3144"
}, },
{ {
"name": "winnt-nt4all-dos(6943)", "name": "winnt-nt4all-dos(6943)",
@ -63,9 +63,9 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6943" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6943"
}, },
{ {
"name" : "3144", "name": "20010803 REPOST: A damaging local DoS in WinNT SP6a",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/3144" "url": "http://www.securityfocus.com/archive/1/201722"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/209545" "url": "http://www.securityfocus.com/archive/1/209545"
}, },
{
"name" : "badblue-file-source-disclosure(7021)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7021"
},
{ {
"name": "3222", "name": "3222",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/3222" "url": "http://www.securityfocus.com/bid/3222"
},
{
"name": "badblue-file-source-disclosure(7021)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7021"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20011213 EFTP 2.0.8.346 directory content disclosure",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/245393"
},
{
"name" : "http://www.eftp.org/releasehistory.html",
"refsource" : "CONFIRM",
"url" : "http://www.eftp.org/releasehistory.html"
},
{
"name" : "VU#413875",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/413875"
},
{ {
"name": "3691", "name": "3691",
"refsource": "BID", "refsource": "BID",
@ -81,6 +66,21 @@
"name": "eftp-dot-directory-traversal(7699)", "name": "eftp-dot-directory-traversal(7699)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7699" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7699"
},
{
"name": "VU#413875",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/413875"
},
{
"name": "http://www.eftp.org/releasehistory.html",
"refsource": "CONFIRM",
"url": "http://www.eftp.org/releasehistory.html"
},
{
"name": "20011213 EFTP 2.0.8.346 directory content disclosure",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/245393"
} }
] ]
} }

View File

@ -53,74 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060602 rPSA-2006-0091-1 firefox thunderbird", "name": "20709",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/435795/100/0/threaded" "url": "http://secunia.com/advisories/20709"
},
{
"name" : "http://www.mozilla.org/security/announce/2006/mfsa2006-40.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2006/mfsa2006-40.html"
},
{
"name" : "DSA-1118",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1118"
},
{
"name" : "DSA-1134",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1134"
},
{
"name" : "GLSA-200606-21",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml"
},
{
"name" : "HPSBUX02156",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name" : "SSRT061236",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name" : "MDKSA-2006:146",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:146"
},
{
"name" : "RHSA-2006:0578",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0578.html"
},
{
"name" : "RHSA-2006:0611",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
},
{
"name" : "RHSA-2006:0609",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"name" : "RHSA-2006:0594",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
},
{
"name" : "SUSE-SA:2006:035",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_35_mozilla.html"
},
{
"name" : "USN-297-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/297-1/"
}, },
{ {
"name": "USN-297-3", "name": "USN-297-3",
@ -133,59 +68,9 @@
"url": "https://usn.ubuntu.com/323-1/" "url": "https://usn.ubuntu.com/323-1/"
}, },
{ {
"name" : "18228", "name": "mozilla-vcard-doublefree-memory-corruption(26850)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/18228" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26850"
},
{
"name" : "oval:org.mitre.oval:def:10247",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10247"
},
{
"name" : "ADV-2006-2106",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2106"
},
{
"name" : "ADV-2006-3749",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3749"
},
{
"name" : "1016214",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016214"
},
{
"name" : "20394",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20394"
},
{
"name" : "20382",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20382"
},
{
"name" : "20709",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20709"
},
{
"name" : "21134",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21134"
},
{
"name" : "21183",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21183"
},
{
"name" : "21178",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21178"
}, },
{ {
"name": "21210", "name": "21210",
@ -193,9 +78,9 @@
"url": "http://secunia.com/advisories/21210" "url": "http://secunia.com/advisories/21210"
}, },
{ {
"name" : "21269", "name": "RHSA-2006:0594",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/21269" "url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
}, },
{ {
"name": "21336", "name": "21336",
@ -203,29 +88,144 @@
"url": "http://secunia.com/advisories/21336" "url": "http://secunia.com/advisories/21336"
}, },
{ {
"name" : "21324", "name": "20382",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/21324" "url": "http://secunia.com/advisories/20382"
},
{
"name": "1016214",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016214"
},
{
"name": "20060602 rPSA-2006-0091-1 firefox thunderbird",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435795/100/0/threaded"
},
{
"name": "ADV-2006-3749",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3749"
},
{
"name": "MDKSA-2006:146",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:146"
},
{
"name": "RHSA-2006:0609",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"name": "21178",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21178"
}, },
{ {
"name": "21607", "name": "21607",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21607" "url": "http://secunia.com/advisories/21607"
}, },
{
"name": "18228",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18228"
},
{
"name": "21134",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21134"
},
{ {
"name": "21631", "name": "21631",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21631" "url": "http://secunia.com/advisories/21631"
}, },
{
"name": "SSRT061236",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name": "oval:org.mitre.oval:def:10247",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10247"
},
{
"name": "GLSA-200606-21",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml"
},
{
"name": "DSA-1118",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1118"
},
{
"name": "RHSA-2006:0611",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
},
{
"name": "HPSBUX02156",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name": "DSA-1134",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1134"
},
{
"name": "21324",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21324"
},
{
"name": "21183",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21183"
},
{
"name": "20394",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20394"
},
{
"name": "21269",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21269"
},
{
"name": "SUSE-SA:2006:035",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_35_mozilla.html"
},
{
"name": "USN-297-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/297-1/"
},
{
"name": "RHSA-2006:0578",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0578.html"
},
{
"name": "ADV-2006-2106",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2106"
},
{ {
"name": "22065", "name": "22065",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22065" "url": "http://secunia.com/advisories/22065"
}, },
{ {
"name" : "mozilla-vcard-doublefree-memory-corruption(26850)", "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-40.html",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26850" "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-40.html"
} }
] ]
} }

View File

@ -67,15 +67,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/21323" "url": "http://www.securityfocus.com/bid/21323"
}, },
{
"name" : "1933",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1933"
},
{ {
"name": "evolve-products-sql-injection(30540)", "name": "evolve-products-sql-injection(30540)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30540" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30540"
},
{
"name": "1933",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1933"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20061122 Advisory: LDU <= 8.x Remote SQL Injection Vulnerability.", "name": "1954",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/452259/100/100/threaded" "url": "http://securityreason.com/securityalert/1954"
}, },
{ {
"name": "http://www.nukedx.com/?viewdoc=51", "name": "http://www.nukedx.com/?viewdoc=51",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/21227" "url": "http://www.securityfocus.com/bid/21227"
}, },
{ {
"name" : "1954", "name": "20061122 Advisory: LDU <= 8.x Remote SQL Injection Vulnerability.",
"refsource" : "SREASON", "refsource": "BUGTRAQ",
"url" : "http://securityreason.com/securityalert/1954" "url": "http://www.securityfocus.com/archive/1/452259/100/100/threaded"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/21459" "url": "http://www.securityfocus.com/bid/21459"
}, },
{
"name" : "23223",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23223"
},
{ {
"name": "agilebill-proxy-dos(30751)", "name": "agilebill-proxy-dos(30751)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30751" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30751"
},
{
"name": "23223",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23223"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "phpalbum-language-local-file-include(30817)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30817"
},
{ {
"name": "2913", "name": "2913",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2913" "url": "https://www.exploit-db.com/exploits/2913"
}, },
{
"name" : "21519",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21519"
},
{ {
"name": "ADV-2006-4927", "name": "ADV-2006-4927",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4927" "url": "http://www.vupen.com/english/advisories/2006/4927"
}, },
{ {
"name" : "phpalbum-language-local-file-include(30817)", "name": "21519",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30817" "url": "http://www.securityfocus.com/bid/21519"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "2943", "name": "ADV-2006-5060",
"refsource" : "EXPLOIT-DB", "refsource": "VUPEN",
"url" : "https://www.exploit-db.com/exploits/2943" "url": "http://www.vupen.com/english/advisories/2006/5060"
}, },
{ {
"name": "21638", "name": "21638",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/21638" "url": "http://www.securityfocus.com/bid/21638"
}, },
{ {
"name" : "ADV-2006-5060", "name": "azucar-index-file-include(30935)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2006/5060" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30935"
}, },
{ {
"name": "23416", "name": "23416",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/23416" "url": "http://secunia.com/advisories/23416"
}, },
{ {
"name" : "azucar-index-file-include(30935)", "name": "2943",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30935" "url": "https://www.exploit-db.com/exploits/2943"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "2982", "name": "23478",
"refsource" : "EXPLOIT-DB", "refsource": "SECUNIA",
"url" : "https://www.exploit-db.com/exploits/2982" "url": "http://secunia.com/advisories/23478"
}, },
{ {
"name": "ADV-2006-5144", "name": "ADV-2006-5144",
@ -63,9 +63,9 @@
"url": "http://www.vupen.com/english/advisories/2006/5144" "url": "http://www.vupen.com/english/advisories/2006/5144"
}, },
{ {
"name" : "23478", "name": "2982",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/23478" "url": "https://www.exploit-db.com/exploits/2982"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-0036", "ID": "CVE-2011-0036",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,14 +58,9 @@
"url": "http://support.avaya.com/css/P8/documents/100127294" "url": "http://support.avaya.com/css/P8/documents/100127294"
}, },
{ {
"name" : "MS11-003", "name": "ADV-2011-0318",
"refsource" : "MS", "refsource": "VUPEN",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-003" "url": "http://www.vupen.com/english/advisories/2011/0318"
},
{
"name" : "46158",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46158"
}, },
{ {
"name": "70832", "name": "70832",
@ -77,16 +72,21 @@
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12261" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12261"
}, },
{
"name": "MS11-003",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-003"
},
{
"name": "46158",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46158"
},
{ {
"name": "1025038", "name": "1025038",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025038" "url": "http://www.securitytracker.com/id?1025038"
}, },
{
"name" : "ADV-2011-0318",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0318"
},
{ {
"name": "ms-explorer-code-exec(64912)", "name": "ms-explorer-code-exec(64912)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-0458", "ID": "CVE-2011-0458",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "JVN#99977321", "name": "google-picasa-dll-code-execution(66295)",
"refsource" : "JVN", "refsource": "XF",
"url" : "http://jvn.jp/en/jp/JVN99977321/index.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66295"
},
{
"name" : "JVNDB-2011-000022",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000022"
},
{
"name" : "47031",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/47031"
},
{
"name" : "71281",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/71281"
}, },
{ {
"name": "43853", "name": "43853",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43853" "url": "http://secunia.com/advisories/43853"
}, },
{
"name": "47031",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47031"
},
{ {
"name": "ADV-2011-0766", "name": "ADV-2011-0766",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0766" "url": "http://www.vupen.com/english/advisories/2011/0766"
}, },
{ {
"name" : "google-picasa-dll-code-execution(66295)", "name": "JVN#99977321",
"refsource" : "XF", "refsource": "JVN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66295" "url": "http://jvn.jp/en/jp/JVN99977321/index.html"
},
{
"name": "71281",
"refsource": "OSVDB",
"url": "http://osvdb.org/71281"
},
{
"name": "JVNDB-2011-000022",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000022"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-0882", "ID": "CVE-2011-0882",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
},
{ {
"name": "TA11-201A", "name": "TA11-201A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.tibco.com/multimedia/iprocess_advisory_20110518_tcm8-13710.txt",
"refsource" : "CONFIRM",
"url" : "http://www.tibco.com/multimedia/iprocess_advisory_20110518_tcm8-13710.txt"
},
{ {
"name": "http://www.tibco.com/services/support/advisories/iprocess-advisory_20110518.jsp", "name": "http://www.tibco.com/services/support/advisories/iprocess-advisory_20110518.jsp",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.tibco.com/services/support/advisories/iprocess-advisory_20110518.jsp" "url": "http://www.tibco.com/services/support/advisories/iprocess-advisory_20110518.jsp"
}, },
{
"name": "iprocess-unspecified-session-hijacking(67538)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67538"
},
{ {
"name": "47921", "name": "47921",
"refsource": "BID", "refsource": "BID",
@ -72,20 +72,20 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/72554" "url": "http://osvdb.org/72554"
}, },
{
"name" : "44639",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44639"
},
{ {
"name": "ADV-2011-1272", "name": "ADV-2011-1272",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1272" "url": "http://www.vupen.com/english/advisories/2011/1272"
}, },
{ {
"name" : "iprocess-unspecified-session-hijacking(67538)", "name": "44639",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67538" "url": "http://secunia.com/advisories/44639"
},
{
"name": "http://www.tibco.com/multimedia/iprocess_advisory_20110518_tcm8-13710.txt",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/multimedia/iprocess_advisory_20110518_tcm8-13710.txt"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "oval:org.mitre.oval:def:14869",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14869"
},
{ {
"name": "http://code.google.com/p/chromium/issues/detail?id=112670", "name": "http://code.google.com/p/chromium/issues/detail?id=112670",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html" "url": "http://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html"
}, },
{
"name" : "oval:org.mitre.oval:def:14869",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14869"
},
{ {
"name": "48016", "name": "48016",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -52,70 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=119525",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=119525"
},
{ {
"name": "http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html", "name": "http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html" "url": "http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html"
}, },
{
"name" : "http://support.apple.com/kb/HT5400",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5400"
},
{
"name" : "http://support.apple.com/kb/HT5485",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5485"
},
{
"name" : "http://support.apple.com/kb/HT5503",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5503"
},
{
"name" : "APPLE-SA-2012-07-25-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
},
{
"name" : "APPLE-SA-2012-09-12-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"name" : "APPLE-SA-2012-09-19-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name" : "GLSA-201204-03",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201204-03.xml"
},
{
"name" : "52913",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/52913"
},
{
"name" : "oval:org.mitre.oval:def:15141",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15141"
},
{ {
"name": "1026892", "name": "1026892",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026892" "url": "http://www.securitytracker.com/id?1026892"
}, },
{ {
"name" : "48732", "name": "http://support.apple.com/kb/HT5485",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/48732" "url": "http://support.apple.com/kb/HT5485"
},
{
"name": "APPLE-SA-2012-09-19-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT5503",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5503"
},
{
"name": "52913",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52913"
},
{
"name": "chrome-style-code-execution(74635)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74635"
}, },
{ {
"name": "48749", "name": "48749",
@ -123,9 +93,39 @@
"url": "http://secunia.com/advisories/48749" "url": "http://secunia.com/advisories/48749"
}, },
{ {
"name" : "chrome-style-code-execution(74635)", "name": "48732",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/74635" "url": "http://secunia.com/advisories/48732"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=119525",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=119525"
},
{
"name": "APPLE-SA-2012-09-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"name": "APPLE-SA-2012-07-25-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
},
{
"name": "GLSA-201204-03",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201204-03.xml"
},
{
"name": "http://support.apple.com/kb/HT5400",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5400"
},
{
"name": "oval:org.mitre.oval:def:15141",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15141"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4279", "ID": "CVE-2011-4279",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/11/14/1" "url": "http://openwall.com/lists/oss-security/2011/11/14/1"
}, },
{
"name" : "http://git.moodle.org/gw?p=moodle.git;a=commit;h=81b58cc227cf96a1cd2e002cc210b7b3e376fd17",
"refsource" : "CONFIRM",
"url" : "http://git.moodle.org/gw?p=moodle.git;a=commit;h=81b58cc227cf96a1cd2e002cc210b7b3e376fd17"
},
{ {
"name": "http://moodle.org/mod/forum/discuss.php?d=170004", "name": "http://moodle.org/mod/forum/discuss.php?d=170004",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=170004" "url": "http://moodle.org/mod/forum/discuss.php?d=170004"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=81b58cc227cf96a1cd2e002cc210b7b3e376fd17",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=81b58cc227cf96a1cd2e002cc210b7b3e376fd17"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-4798", "ID": "CVE-2011-4798",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-4892", "ID": "CVE-2011-4892",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1240", "ID": "CVE-2013-1240",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1338", "ID": "CVE-2013-1338",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS13-028",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-028"
},
{ {
"name": "TA13-100A", "name": "TA13-100A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-100A" "url": "http://www.us-cert.gov/ncas/alerts/TA13-100A"
}, },
{
"name": "MS13-028",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-028"
},
{ {
"name": "oval:org.mitre.oval:def:16621", "name": "oval:org.mitre.oval:def:16621",
"refsource": "OVAL", "refsource": "OVAL",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-1472", "ID": "CVE-2013-1472",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{
"name" : "HPSBMU02874",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136733161405818&w=2"
},
{
"name" : "SSRT101184",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136733161405818&w=2"
},
{ {
"name": "TA13-032A", "name": "TA13-032A",
"refsource": "CERT", "refsource": "CERT",
@ -77,10 +62,25 @@
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/858729" "url": "http://www.kb.cert.org/vuls/id/858729"
}, },
{
"name": "HPSBMU02874",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
},
{ {
"name": "oval:org.mitre.oval:def:16620", "name": "oval:org.mitre.oval:def:16620",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16620" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16620"
},
{
"name": "SSRT101184",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-5380", "ID": "CVE-2013-5380",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21651085",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21651085"
},
{ {
"name": "IV33364", "name": "IV33364",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV33364" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV33364"
}, },
{
"name" : "55068",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/55068"
},
{ {
"name": "55070", "name": "55070",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55070" "url": "http://secunia.com/advisories/55070"
}, },
{
"name": "55068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55068"
},
{ {
"name": "maximo-cve20135380-infodisc(86931)", "name": "maximo-cve20135380-infodisc(86931)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86931" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86931"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21651085",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21651085"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-5486", "ID": "CVE-2013-5486",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "30008",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/30008"
},
{ {
"name": "20130918 Multiple Vulnerabilities in Cisco Prime Data Center Network Manager", "name": "20130918 Multiple Vulnerabilities in Cisco Prime Data Center Network Manager",
"refsource": "CISCO", "refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130918-dcnm" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130918-dcnm"
},
{
"name": "30008",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/30008"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2179", "ID": "CVE-2014-2179",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20141106 Cisco RV Series multiple vulnerabilities", "name": "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers",
"refsource" : "BUGTRAQ", "refsource": "CISCO",
"url" : "http://www.securityfocus.com/archive/1/533917/100/0/threaded" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv"
},
{
"name" : "20141106 Cisco RV Series multiple vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Nov/6"
}, },
{ {
"name": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html", "name": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html",
@ -68,19 +63,24 @@
"url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html"
}, },
{ {
"name" : "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers", "name": "20141106 Cisco RV Series multiple vulnerabilities",
"refsource" : "CISCO", "refsource": "FULLDISC",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" "url": "http://seclists.org/fulldisclosure/2014/Nov/6"
}, },
{ {
"name" : "1031171", "name": "20141106 Cisco RV Series multiple vulnerabilities",
"refsource" : "SECTRACK", "refsource": "BUGTRAQ",
"url" : "http://www.securitytracker.com/id/1031171" "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded"
}, },
{ {
"name": "cisco-cve20142179-file-upload(98499)", "name": "cisco-cve20142179-file-upload(98499)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98499" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98499"
},
{
"name": "1031171",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031171"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2014-2510", "ID": "CVE-2014-2510",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20140707 ESA-2014-057: EMC Documentum Foundation Services (DFS) XML External Entity (XXE) Vulnerability", "name": "59773",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-07/0025.html" "url": "http://secunia.com/advisories/59773"
}, },
{ {
"name": "68434", "name": "68434",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/68434" "url": "http://www.securityfocus.com/bid/68434"
}, },
{
"name": "20140707 ESA-2014-057: EMC Documentum Foundation Services (DFS) XML External Entity (XXE) Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-07/0025.html"
},
{ {
"name": "1030528", "name": "1030528",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030528" "url": "http://www.securitytracker.com/id/1030528"
},
{
"name" : "59773",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59773"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-2810", "ID": "CVE-2014-2810",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS14-051",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051"
},
{ {
"name": "69104", "name": "69104",
"refsource": "BID", "refsource": "BID",
@ -67,6 +62,11 @@
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030715" "url": "http://www.securitytracker.com/id/1030715"
}, },
{
"name": "MS14-051",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051"
},
{ {
"name": "60670", "name": "60670",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-6080", "ID": "CVE-2014-6080",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-6134", "ID": "CVE-2014-6134",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20140917 Reflected XSS in WooCommerce - excelling e Commerce allows attackers ability to do almost anything an admin user can do (WordPress plugin)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Sep/59"
},
{ {
"name": "https://security.dxw.com/advisories/reflected-xss-in-woocommerce-excelling-ecommerce-allows-attackers-ability-to-do-almost-anything-an-admin-user-can-do", "name": "https://security.dxw.com/advisories/reflected-xss-in-woocommerce-excelling-ecommerce-allows-attackers-ability-to-do-almost-anything-an-admin-user-can-do",
"refsource": "MISC", "refsource": "MISC",
"url": "https://security.dxw.com/advisories/reflected-xss-in-woocommerce-excelling-ecommerce-allows-attackers-ability-to-do-almost-anything-an-admin-user-can-do" "url": "https://security.dxw.com/advisories/reflected-xss-in-woocommerce-excelling-ecommerce-allows-attackers-ability-to-do-almost-anything-an-admin-user-can-do"
}, },
{
"name": "20140917 Reflected XSS in WooCommerce - excelling e Commerce allows attackers ability to do almost anything an admin user can do (WordPress plugin)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Sep/59"
},
{ {
"name": "https://wordpress.org/plugins/woocommerce/changelog", "name": "https://wordpress.org/plugins/woocommerce/changelog",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-6338", "ID": "CVE-2014-6338",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1038431",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038431"
},
{ {
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0234", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0234",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "98229", "name": "98229",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/98229" "url": "http://www.securityfocus.com/bid/98229"
},
{
"name" : "1038431",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038431"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0241",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0241"
},
{ {
"name": "98208", "name": "98208",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/98208" "url": "http://www.securityfocus.com/bid/98208"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0241",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0241"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://source.android.com/security/bulletin/2017-03-01.html", "name": "1037968",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://source.android.com/security/bulletin/2017-03-01.html" "url": "http://www.securitytracker.com/id/1037968"
},
{
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
"refsource" : "CONFIRM",
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
}, },
{ {
"name": "96809", "name": "96809",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/96809" "url": "http://www.securityfocus.com/bid/96809"
}, },
{ {
"name" : "1037968", "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1037968" "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
},
{
"name": "https://source.android.com/security/bulletin/2017-03-01.html",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01.html"
} }
] ]
} }

View File

@ -1,15 +1,12 @@
{ {
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"DATE_ASSIGNED" : "2017-08-22T17:29:33.461990",
"ID" : "CVE-2017-1000233",
"REQUESTER" : "security@openproject.org",
"STATE" : "REJECT",
"STATE_DETAIL" : "DUPLICATE of CVE-2017-11667"
},
"data_format" : "MITRE",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-1000233",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-11-17", "DATE_ASSIGNED": "2017-11-17",
"ID": "CVE-2017-1000389", "ID": "CVE-2017-1000389",
"REQUESTER": "ml@beckweb.net", "REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Jenkins global-build-stats Plugin", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "1.4 and earlier" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Jenkins global-build-stats Plugin" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Cross Site Scripting, Cross-Site Request Forgery" "value": "n/a"
} }
] ]
} }

View File

@ -64,15 +64,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21999736",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21999736"
},
{ {
"name": "96761", "name": "96761",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/96761" "url": "http://www.securityfocus.com/bid/96761"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21999736",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21999736"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/123904", "name": "101571",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/123904" "url": "http://www.securityfocus.com/bid/101571"
}, },
{ {
"name": "http://www.ibm.com/support/docview.wss?uid=swg22009673", "name": "http://www.ibm.com/support/docview.wss?uid=swg22009673",
@ -63,9 +63,9 @@
"url": "http://www.ibm.com/support/docview.wss?uid=swg22009673" "url": "http://www.ibm.com/support/docview.wss?uid=swg22009673"
}, },
{ {
"name" : "101571", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/123904",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/101571" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/123904"
} }
] ]
} }

View File

@ -62,6 +62,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "99376",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99376"
},
{ {
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/124678", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/124678",
"refsource": "MISC", "refsource": "MISC",
@ -71,11 +76,6 @@
"name": "http://www.ibm.com/support/docview.wss?uid=swg22004461", "name": "http://www.ibm.com/support/docview.wss?uid=swg22004461",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22004461" "url": "http://www.ibm.com/support/docview.wss?uid=swg22004461"
},
{
"name" : "99376",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99376"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1861", "ID": "CVE-2017-1861",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4172", "ID": "CVE-2017-4172",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4183", "ID": "CVE-2017-4183",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4569", "ID": "CVE-2017-4569",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4804", "ID": "CVE-2017-4804",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4831", "ID": "CVE-2017-4831",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {