"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:33:36 +00:00
parent 35dddb969b
commit c10eca09c8
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3500 additions and 3500 deletions

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070420 eXtremail-v9", "name": "http://www.digit-labs.org/files/exploits/extremail-v9.c",
"refsource" : "FULLDISC", "refsource": "MISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0569.html" "url": "http://www.digit-labs.org/files/exploits/extremail-v9.c"
},
{
"name": "35583",
"refsource": "OSVDB",
"url": "http://osvdb.org/35583"
}, },
{ {
"name": "3769", "name": "3769",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3769" "url": "https://www.exploit-db.com/exploits/3769"
}, },
{
"name" : "http://www.digit-labs.org/files/exploits/extremail-v9.c",
"refsource" : "MISC",
"url" : "http://www.digit-labs.org/files/exploits/extremail-v9.c"
},
{ {
"name": "23577", "name": "23577",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/23577" "url": "http://www.securityfocus.com/bid/23577"
}, },
{ {
"name" : "35583", "name": "20070420 eXtremail-v9",
"refsource" : "OSVDB", "refsource": "FULLDISC",
"url" : "http://osvdb.org/35583" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0569.html"
} }
] ]
} }

View File

@ -68,24 +68,24 @@
"url": "http://www.securityfocus.com/bid/24092" "url": "http://www.securityfocus.com/bid/24092"
}, },
{ {
"name" : "ADV-2007-1775", "name": "rdiffweb-rdwhelpers-directory-traversal(33734)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2007/1775" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33734"
}, },
{ {
"name": "36519", "name": "36519",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/36519" "url": "http://osvdb.org/36519"
}, },
{
"name": "ADV-2007-1775",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1775"
},
{ {
"name": "25368", "name": "25368",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25368" "url": "http://secunia.com/advisories/25368"
},
{
"name" : "rdiffweb-rdwhelpers-directory-traversal(33734)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33734"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070528 Uebimiau Webmail Multiple Vulnerabilities", "name": "38337",
"refsource" : "FULLDISC", "refsource": "OSVDB",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063629.html" "url": "http://osvdb.org/38337"
}, },
{ {
"name": "24210", "name": "24210",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/24210" "url": "http://www.securityfocus.com/bid/24210"
}, },
{ {
"name" : "38337", "name": "20070528 Uebimiau Webmail Multiple Vulnerabilities",
"refsource" : "OSVDB", "refsource": "FULLDISC",
"url" : "http://osvdb.org/38337" "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063629.html"
}, },
{ {
"name": "uebimiau-error-information-disclosure(34554)", "name": "uebimiau-error-information-disclosure(34554)",

View File

@ -53,24 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070625 Ingres Unauthenticated Pointer Overwrite 2", "name": "ADV-2007-2288",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/472193/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2007/2288"
}, },
{ {
"name" : "20070625 Ingres Unauthenticated Pointer Overwrite 1", "name": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=145778",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2007-06/0302.html" "url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=145778"
}, },
{ {
"name" : "http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-ingres-pointer-overwrite-1/", "name": "25756",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-ingres-pointer-overwrite-1/" "url": "http://secunia.com/advisories/25756"
}, },
{ {
"name" : "http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-ingres-pointer-overwrite-2/", "name": "25775",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-ingres-pointer-overwrite-2/" "url": "http://secunia.com/advisories/25775"
},
{
"name": "ADV-2007-2290",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2290"
}, },
{ {
"name": "http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp", "name": "http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp",
@ -78,9 +83,14 @@
"url": "http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp" "url": "http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp"
}, },
{ {
"name" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=145778", "name": "ingres-unspecified-code-execution(34993)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=145778" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34993"
},
{
"name": "ingres-pointer-code-execution(35000)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35000"
}, },
{ {
"name": "24585", "name": "24585",
@ -93,34 +103,24 @@
"url": "http://osvdb.org/37486" "url": "http://osvdb.org/37486"
}, },
{ {
"name" : "ADV-2007-2288", "name": "20070625 Ingres Unauthenticated Pointer Overwrite 1",
"refsource" : "VUPEN", "refsource": "BUGTRAQ",
"url" : "http://www.vupen.com/english/advisories/2007/2288" "url": "http://archives.neohapsis.com/archives/bugtraq/2007-06/0302.html"
}, },
{ {
"name" : "ADV-2007-2290", "name": "20070625 Ingres Unauthenticated Pointer Overwrite 2",
"refsource" : "VUPEN", "refsource": "BUGTRAQ",
"url" : "http://www.vupen.com/english/advisories/2007/2290" "url": "http://www.securityfocus.com/archive/1/472193/100/0/threaded"
}, },
{ {
"name" : "25775", "name": "http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-ingres-pointer-overwrite-1/",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/25775" "url": "http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-ingres-pointer-overwrite-1/"
}, },
{ {
"name" : "25756", "name": "http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-ingres-pointer-overwrite-2/",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/25756" "url": "http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-ingres-pointer-overwrite-2/"
},
{
"name" : "ingres-pointer-code-execution(35000)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35000"
},
{
"name" : "ingres-unspecified-code-execution(34993)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34993"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "http://www.sipera.com/index.php?action=resources,threat_advisory&tid=276&" "url": "http://www.sipera.com/index.php?action=resources,threat_advisory&tid=276&"
}, },
{ {
"name" : "24535", "name": "25840",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/24535" "url": "http://secunia.com/advisories/25840"
}, },
{ {
"name": "37752", "name": "37752",
@ -68,9 +68,9 @@
"url": "http://osvdb.org/37752" "url": "http://osvdb.org/37752"
}, },
{ {
"name" : "25840", "name": "24535",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/25840" "url": "http://www.securityfocus.com/bid/24535"
} }
] ]
} }

View File

@ -53,34 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "5222", "name": "29299",
"refsource" : "EXPLOIT-DB", "refsource": "SECUNIA",
"url" : "https://www.exploit-db.com/exploits/5222" "url": "http://secunia.com/advisories/29299"
}, },
{ {
"name" : "http://pridels-team.blogspot.com/2007/06/quickticket-multiple-sql-inj.html", "name": "quicktalkforum-multiple-sql-injection(35100)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://pridels-team.blogspot.com/2007/06/quickticket-multiple-sql-inj.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35100"
},
{
"name" : "28176",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28176"
},
{
"name" : "42684",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/42684"
},
{
"name" : "37606",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37606"
},
{
"name" : "38956",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38956"
}, },
{ {
"name": "38957", "name": "38957",
@ -88,14 +68,24 @@
"url": "http://osvdb.org/38957" "url": "http://osvdb.org/38957"
}, },
{ {
"name" : "38958", "name": "http://pridels-team.blogspot.com/2007/06/quickticket-multiple-sql-inj.html",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://osvdb.org/38958" "url": "http://pridels-team.blogspot.com/2007/06/quickticket-multiple-sql-inj.html"
}, },
{ {
"name" : "38959", "name": "42684",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://osvdb.org/38959" "url": "http://osvdb.org/42684"
},
{
"name": "5222",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5222"
},
{
"name": "37606",
"refsource": "OSVDB",
"url": "http://osvdb.org/37606"
}, },
{ {
"name": "ADV-2007-2367", "name": "ADV-2007-2367",
@ -103,9 +93,14 @@
"url": "http://www.vupen.com/english/advisories/2007/2367" "url": "http://www.vupen.com/english/advisories/2007/2367"
}, },
{ {
"name" : "29299", "name": "28176",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/29299" "url": "http://www.securityfocus.com/bid/28176"
},
{
"name": "38958",
"refsource": "OSVDB",
"url": "http://osvdb.org/38958"
}, },
{ {
"name": "quickticket-qtiusr-sql-injection(41065)", "name": "quickticket-qtiusr-sql-injection(41065)",
@ -113,9 +108,14 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41065" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41065"
}, },
{ {
"name" : "quicktalkforum-multiple-sql-injection(35100)", "name": "38959",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35100" "url": "http://osvdb.org/38959"
},
{
"name": "38956",
"refsource": "OSVDB",
"url": "http://osvdb.org/38956"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4150" "url": "https://www.exploit-db.com/exploits/4150"
}, },
{
"name" : "45787",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/45787"
},
{ {
"name": "vrnews-admin-security-bypass(35271)", "name": "vrnews-admin-security-bypass(35271)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35271" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35271"
},
{
"name": "45787",
"refsource": "OSVDB",
"url": "http://osvdb.org/45787"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "42423",
"refsource": "OSVDB",
"url": "http://osvdb.org/42423"
},
{ {
"name": "http://forums.adventnet.com/viewtopic.php?t=247521", "name": "http://forums.adventnet.com/viewtopic.php?t=247521",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26304" "url": "http://www.securityfocus.com/bid/26304"
}, },
{
"name" : "42423",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/42423"
},
{ {
"name": "27833", "name": "27833",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20071126 PHPSlideShow (toonchapter8.php) Cross-Site Scripting Vulnerability", "name": "27809",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/484192/100/0/threaded" "url": "http://secunia.com/advisories/27809"
},
{
"name" : "20071127 PHPSlideShow XSS Update",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/484289/100/0/threaded"
},
{
"name" : "20080416 Re: PHPSlideShow (toonchapter8.php) Cross-Site Scripting Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/490968/100/0/threaded"
}, },
{ {
"name": "http://www.packetstormsecurity.org/0711-exploits/phpslideshow-xss.txt", "name": "http://www.packetstormsecurity.org/0711-exploits/phpslideshow-xss.txt",
@ -73,29 +63,39 @@
"url": "http://www.packetstormsecurity.org/0711-exploits/phpslideshow-xss.txt" "url": "http://www.packetstormsecurity.org/0711-exploits/phpslideshow-xss.txt"
}, },
{ {
"name" : "26576", "name": "20071126 PHPSlideShow (toonchapter8.php) Cross-Site Scripting Vulnerability",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/26576" "url": "http://www.securityfocus.com/archive/1/484192/100/0/threaded"
},
{
"name": "phpslideshow-directory-xss(38638)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38638"
},
{
"name": "20071127 PHPSlideShow XSS Update",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/484289/100/0/threaded"
}, },
{ {
"name": "26575", "name": "26575",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26575" "url": "http://www.securityfocus.com/bid/26575"
}, },
{
"name": "20080416 Re: PHPSlideShow (toonchapter8.php) Cross-Site Scripting Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/490968/100/0/threaded"
},
{
"name": "26576",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26576"
},
{ {
"name": "ADV-2007-3992", "name": "ADV-2007-3992",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3992" "url": "http://www.vupen.com/english/advisories/2007/3992"
},
{
"name" : "27809",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27809"
},
{
"name" : "phpslideshow-directory-xss(38638)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38638"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-6439", "ID": "CVE-2007-6439",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,45 +53,75 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080103 rPSA-2008-0004-1 tshark wireshark", "name": "oval:org.mitre.oval:def:15002",
"refsource" : "BUGTRAQ", "refsource": "OVAL",
"url" : "http://www.securityfocus.com/archive/1/485792/100/0/threaded" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15002"
}, },
{ {
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=199958", "name": "27777",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=199958" "url": "http://secunia.com/advisories/27777"
},
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2007-03.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2007-03.html"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004"
}, },
{ {
"name": "https://issues.rpath.com/browse/RPL-1975", "name": "https://issues.rpath.com/browse/RPL-1975",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1975" "url": "https://issues.rpath.com/browse/RPL-1975"
}, },
{
"name": "29048",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29048"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2007-03.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2007-03.html"
},
{
"name": "28564",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28564"
},
{
"name": "20080103 rPSA-2008-0004-1 tshark wireshark",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485792/100/0/threaded"
},
{ {
"name": "GLSA-200712-23", "name": "GLSA-200712-23",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200712-23.xml" "url": "http://security.gentoo.org/glsa/glsa-200712-23.xml"
}, },
{ {
"name" : "MDVSA-2008:001", "name": "28304",
"refsource" : "MANDRIVA", "refsource": "SECUNIA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:001" "url": "http://secunia.com/advisories/28304"
},
{
"name": "wireshark-ipv6-dissector-dos(39180)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39180"
},
{
"name": "oval:org.mitre.oval:def:10331",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10331"
},
{
"name": "28325",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28325"
}, },
{ {
"name": "MDVSA-2008:1", "name": "MDVSA-2008:1",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:1" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:1"
}, },
{
"name": "MDVSA-2008:001",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:001"
},
{ {
"name": "RHSA-2008:0058", "name": "RHSA-2008:0058",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -102,60 +132,30 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html"
}, },
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=199958",
"refsource": "MISC",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=199958"
},
{
"name": "wireshark-usb-dissector-dos(39181)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39181"
},
{ {
"name": "27071", "name": "27071",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/27071" "url": "http://www.securityfocus.com/bid/27071"
}, },
{
"name" : "oval:org.mitre.oval:def:10331",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10331"
},
{
"name" : "oval:org.mitre.oval:def:15002",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15002"
},
{ {
"name": "28288", "name": "28288",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28288" "url": "http://secunia.com/advisories/28288"
}, },
{ {
"name" : "27777", "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/27777" "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004"
},
{
"name" : "28304",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28304"
},
{
"name" : "28325",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28325"
},
{
"name" : "28564",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28564"
},
{
"name" : "29048",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29048"
},
{
"name" : "wireshark-ipv6-dissector-dos(39180)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39180"
},
{
"name" : "wireshark-usb-dissector-dos(39181)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39181"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.packetstormsecurity.com/1001-exploits/webservercreator-traversalxssrfi.txt",
"refsource" : "MISC",
"url" : "http://www.packetstormsecurity.com/1001-exploits/webservercreator-traversalxssrfi.txt"
},
{ {
"name": "37841", "name": "37841",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/37841" "url": "http://www.securityfocus.com/bid/37841"
}, },
{
"name": "http://www.packetstormsecurity.com/1001-exploits/webservercreator-traversalxssrfi.txt",
"refsource": "MISC",
"url": "http://www.packetstormsecurity.com/1001-exploits/webservercreator-traversalxssrfi.txt"
},
{ {
"name": "webservercreator-index-file-include(55727)", "name": "webservercreator-index-file-include(55727)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1157", "ID": "CVE-2010-1157",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,134 +58,29 @@
"url": "http://www.securityfocus.com/archive/1/510879/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/510879/100/0/threaded"
}, },
{ {
"name" : "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "name": "DSA-2207",
"refsource" : "BUGTRAQ", "refsource": "DEBIAN",
"url" : "http://www.securityfocus.com/archive/1/516397/100/0/threaded" "url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"name" : "http://tomcat.apache.org/security-5.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-5.html"
},
{
"name" : "http://tomcat.apache.org/security-6.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-6.html"
}, },
{ {
"name": "http://svn.apache.org/viewvc?view=revision&revision=936540", "name": "http://svn.apache.org/viewvc?view=revision&revision=936540",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=936540" "url": "http://svn.apache.org/viewvc?view=revision&revision=936540"
}, },
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=936541",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=936541"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name" : "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"name" : "http://support.apple.com/kb/HT5002",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5002"
},
{
"name" : "APPLE-SA-2011-10-12-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name" : "DSA-2207",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2207"
},
{
"name" : "HPSBUX02579",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=129070310906557&w=2"
},
{
"name" : "SSRT100203",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=129070310906557&w=2"
},
{ {
"name": "HPSBUX02860", "name": "HPSBUX02860",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2" "url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
}, },
{
"name" : "SSRT101146",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name" : "HPSBST02955",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
},
{
"name" : "HPSBOV02762",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name" : "SSRT100825",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name" : "MDVSA-2010:176",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{ {
"name": "MDVSA-2010:177", "name": "MDVSA-2010:177",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
}, },
{ {
"name" : "RHSA-2011:0896", "name": "ADV-2010-3056",
"refsource" : "REDHAT", "refsource": "VUPEN",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0896.html" "url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"name" : "RHSA-2011:0897",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0897.html"
},
{
"name" : "SUSE-SR:2010:017",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name" : "39635",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39635"
},
{
"name" : "oval:org.mitre.oval:def:19492",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19492"
},
{
"name" : "39574",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39574"
},
{
"name" : "42368",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42368"
}, },
{ {
"name": "43310", "name": "43310",
@ -193,9 +88,34 @@
"url": "http://secunia.com/advisories/43310" "url": "http://secunia.com/advisories/43310"
}, },
{ {
"name" : "57126", "name": "39574",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/57126" "url": "http://secunia.com/advisories/39574"
},
{
"name": "HPSBOV02762",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "MDVSA-2010:176",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"name": "42368",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42368"
},
{
"name": "RHSA-2011:0897",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0897.html"
}, },
{ {
"name": "ADV-2010-0980", "name": "ADV-2010-0980",
@ -203,9 +123,89 @@
"url": "http://www.vupen.com/english/advisories/2010/0980" "url": "http://www.vupen.com/english/advisories/2010/0980"
}, },
{ {
"name" : "ADV-2010-3056", "name": "oval:org.mitre.oval:def:19492",
"refsource" : "VUPEN", "refsource": "OVAL",
"url" : "http://www.vupen.com/english/advisories/2010/3056" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19492"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "57126",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57126"
},
{
"name": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=936541",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=936541"
},
{
"name": "SUSE-SR:2010:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name": "SSRT100825",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name": "39635",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39635"
},
{
"name": "RHSA-2011:0896",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
},
{
"name": "http://tomcat.apache.org/security-5.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "HPSBUX02579",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=129070310906557&w=2"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "SSRT101146",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "SSRT100203",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=129070310906557&w=2"
},
{
"name": "HPSBST02955",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.org/1002-exploits/uigapersonalportal-sql.txt", "name": "ADV-2010-0488",
"refsource" : "MISC", "refsource": "VUPEN",
"url" : "http://packetstormsecurity.org/1002-exploits/uigapersonalportal-sql.txt" "url": "http://www.vupen.com/english/advisories/2010/0488"
},
{
"name" : "11599",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/11599"
}, },
{ {
"name": "38757", "name": "38757",
@ -68,9 +63,14 @@
"url": "http://secunia.com/advisories/38757" "url": "http://secunia.com/advisories/38757"
}, },
{ {
"name" : "ADV-2010-0488", "name": "11599",
"refsource" : "VUPEN", "refsource": "EXPLOIT-DB",
"url" : "http://www.vupen.com/english/advisories/2010/0488" "url": "http://www.exploit-db.com/exploits/11599"
},
{
"name": "http://packetstormsecurity.org/1002-exploits/uigapersonalportal-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1002-exploits/uigapersonalportal-sql.txt"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "56310",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56310"
},
{
"name": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-002/-rexx-recruitment-cross-site-scripting-in-user-registration",
"refsource": "MISC",
"url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-002/-rexx-recruitment-cross-site-scripting-in-user-registration"
},
{ {
"name": "20140327 [RT-SA-2014-002] rexx Recruitment: Cross-Site Scripting in User Registration", "name": "20140327 [RT-SA-2014-002] rexx Recruitment: Cross-Site Scripting in User Registration",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,16 +71,6 @@
"name": "20140327 [RT-SA-2014-002] rexx Recruitment: Cross-Site Scripting in User Registration", "name": "20140327 [RT-SA-2014-002] rexx Recruitment: Cross-Site Scripting in User Registration",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Mar/389" "url": "http://seclists.org/fulldisclosure/2014/Mar/389"
},
{
"name" : "https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-002/-rexx-recruitment-cross-site-scripting-in-user-registration",
"refsource" : "MISC",
"url" : "https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-002/-rexx-recruitment-cross-site-scripting-in-user-registration"
},
{
"name" : "56310",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56310"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1331", "ID": "CVE-2014-1331",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT6254",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6254"
},
{ {
"name": "https://support.apple.com/kb/HT6537", "name": "https://support.apple.com/kb/HT6537",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6537" "url": "https://support.apple.com/kb/HT6537"
}, },
{
"name" : "APPLE-SA-2014-05-21-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html"
},
{
"name" : "APPLE-SA-2014-06-30-3",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
},
{ {
"name": "APPLE-SA-2014-06-30-4", "name": "APPLE-SA-2014-06-30-4",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html"
}, },
{
"name": "http://support.apple.com/kb/HT6254",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6254"
},
{
"name": "APPLE-SA-2014-06-30-3",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
},
{ {
"name": "67553", "name": "67553",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/67553" "url": "http://www.securityfocus.com/bid/67553"
},
{
"name": "APPLE-SA-2014-05-21-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1388", "ID": "CVE-2014-1388",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,41 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT6367",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6367"
},
{
"name" : "https://support.apple.com/kb/HT6537",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT6537"
},
{
"name" : "http://support.apple.com/kb/HT6441",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6441"
},
{
"name" : "http://support.apple.com/kb/HT6442",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6442"
},
{
"name" : "APPLE-SA-2014-09-17-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"name" : "APPLE-SA-2014-09-17-2",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"name" : "GLSA-201601-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201601-02"
},
{ {
"name": "69223", "name": "69223",
"refsource": "BID", "refsource": "BID",
@ -97,20 +62,55 @@
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030731" "url": "http://www.securitytracker.com/id/1030731"
}, },
{
"name": "http://support.apple.com/kb/HT6441",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6441"
},
{
"name": "GLSA-201601-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-02"
},
{
"name": "https://support.apple.com/kb/HT6537",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6537"
},
{
"name": "http://support.apple.com/kb/HT6367",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6367"
},
{
"name": "http://support.apple.com/kb/HT6442",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6442"
},
{ {
"name": "61318", "name": "61318",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61318" "url": "http://secunia.com/advisories/61318"
}, },
{ {
"name" : "60705", "name": "APPLE-SA-2014-09-17-2",
"refsource" : "SECUNIA", "refsource": "APPLE",
"url" : "http://secunia.com/advisories/60705" "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
}, },
{ {
"name": "apple-safari-cve20141388-code-exec(95271)", "name": "apple-safari-cve20141388-code-exec(95271)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95271" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95271"
},
{
"name": "APPLE-SA-2014-09-17-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"name": "60705",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60705"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1512", "ID": "CVE-2014-1512",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,31 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20140326 VUPEN Security Research - Mozilla Firefox \"BumpChunk\" Object Processing Use-after-free (Pwn2Own)",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-03/0145.html"
},
{ {
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-30.html", "name": "http://www.mozilla.org/security/announce/2014/mfsa2014-30.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-30.html" "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-30.html"
}, },
{
"name": "RHSA-2014:0310",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0310.html"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=982957", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=982957",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=982957" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=982957"
}, },
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "DSA-2881",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2881"
},
{ {
"name": "DSA-2911", "name": "DSA-2911",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -87,30 +77,35 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01" "url": "https://security.gentoo.org/glsa/201504-01"
}, },
{
"name" : "RHSA-2014:0310",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0310.html"
},
{
"name" : "RHSA-2014:0316",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0316.html"
},
{ {
"name": "SUSE-SU-2014:0418", "name": "SUSE-SU-2014:0418",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html"
}, },
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "USN-2151-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2151-1"
},
{
"name": "DSA-2881",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2881"
},
{ {
"name": "openSUSE-SU-2014:0419", "name": "openSUSE-SU-2014:0419",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html"
}, },
{ {
"name" : "openSUSE-SU-2014:0448", "name": "RHSA-2014:0316",
"refsource" : "SUSE", "refsource": "REDHAT",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" "url": "http://rhn.redhat.com/errata/RHSA-2014-0316.html"
}, },
{ {
"name": "openSUSE-SU-2014:0584", "name": "openSUSE-SU-2014:0584",
@ -118,9 +113,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html"
}, },
{ {
"name" : "USN-2151-1", "name": "openSUSE-SU-2014:0448",
"refsource" : "UBUNTU", "refsource": "SUSE",
"url" : "http://www.ubuntu.com/usn/USN-2151-1" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html"
},
{
"name": "20140326 VUPEN Security Research - Mozilla Firefox \"BumpChunk\" Object Processing Use-after-free (Pwn2Own)",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-03/0145.html"
}, },
{ {
"name": "66209", "name": "66209",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2014-1704", "ID": "CVE-2014-1704",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,60 +52,60 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=328202",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=328202"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=345715",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=345715"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=349079",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=349079"
},
{
"name" : "https://code.google.com/p/v8/source/detail?r=18564",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/v8/source/detail?r=18564"
},
{
"name" : "https://code.google.com/p/v8/source/detail?r=19614",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/v8/source/detail?r=19614"
},
{
"name" : "https://code.google.com/p/v8/source/detail?r=19668",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/v8/source/detail?r=19668"
},
{ {
"name": "DSA-2883", "name": "DSA-2883",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2883" "url": "http://www.debian.org/security/2014/dsa-2883"
}, },
{
"name": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
},
{ {
"name": "GLSA-201408-16", "name": "GLSA-201408-16",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml" "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
}, },
{ {
"name" : "openSUSE-SU-2014:0501", "name": "https://code.google.com/p/v8/source/detail?r=18564",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html" "url": "https://code.google.com/p/v8/source/detail?r=18564"
}, },
{ {
"name": "1029914", "name": "1029914",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029914" "url": "http://www.securitytracker.com/id/1029914"
},
{
"name": "openSUSE-SU-2014:0501",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=345715",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=345715"
},
{
"name": "https://code.google.com/p/v8/source/detail?r=19668",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/v8/source/detail?r=19668"
},
{
"name": "https://code.google.com/p/v8/source/detail?r=19614",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/v8/source/detail?r=19614"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=349079",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=349079"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=328202",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=328202"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5599", "ID": "CVE-2014-5599",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#645681",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/645681"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#645681", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/645681" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5679", "ID": "CVE-2014-5679",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#408169", "name": "VU#408169",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5867", "ID": "CVE-2014-5867",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#520545", "name": "VU#520545",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2015-2047", "ID": "CVE-2015-2047",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "72763",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72763"
},
{
"name": "https://review.typo3.org/#/c/37013/",
"refsource": "CONFIRM",
"url": "https://review.typo3.org/#/c/37013/"
},
{
"name": "openSUSE-SU-2016:2169",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html"
},
{
"name": "1031824",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031824"
},
{ {
"name": "[oss-security] 20150222 CVE Request: TYPO3-CORE-SA-2015-001: Authentication Bypass in TYPO3 CMS 4.5", "name": "[oss-security] 20150222 CVE Request: TYPO3-CORE-SA-2015-001: Authentication Bypass in TYPO3 CMS 4.5",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,30 +87,10 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/" "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/"
}, },
{
"name" : "https://review.typo3.org/#/c/37013/",
"refsource" : "CONFIRM",
"url" : "https://review.typo3.org/#/c/37013/"
},
{ {
"name": "DSA-3164", "name": "DSA-3164",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3164" "url": "http://www.debian.org/security/2015/dsa-3164"
},
{
"name" : "openSUSE-SU-2016:2169",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html"
},
{
"name" : "72763",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/72763"
},
{
"name" : "1031824",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031824"
} }
] ]
} }

View File

@ -53,50 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "36159", "name": "http://secpod.org/advisories/SECPOD_ZeusCart_XSS.txt",
"refsource" : "EXPLOIT-DB", "refsource": "MISC",
"url" : "http://www.exploit-db.com/exploits/36159" "url": "http://secpod.org/advisories/SECPOD_ZeusCart_XSS.txt"
},
{
"name" : "20150223 ECommerce-Shopping Cart Zeuscart v. 4: Multiple reflecting XSS-, SQLi and InformationDisclosure-vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Feb/89"
},
{
"name" : "[oss-security] 20150223 CVE-Request -- Zeuscart v. 4 -- Multiple reflecting XSS-, SQLi and InformationDisclosure-vulnerabilities",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2015/q1/649"
}, },
{ {
"name": "[oss-security] 20150302 Re: CVE-Request -- Zeuscart v. 4 -- Multiple reflecting XSS-, SQLi and InformationDisclosure-vulnerabilities", "name": "[oss-security] 20150302 Re: CVE-Request -- Zeuscart v. 4 -- Multiple reflecting XSS-, SQLi and InformationDisclosure-vulnerabilities",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2015/q1/727" "url": "http://seclists.org/oss-sec/2015/q1/727"
}, },
{
"name" : "http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html"
},
{
"name" : "http://secpod.org/advisories/SECPOD_ZeusCart_XSS.txt",
"refsource" : "MISC",
"url" : "http://secpod.org/advisories/SECPOD_ZeusCart_XSS.txt"
},
{
"name" : "http://secpod.org/blog/?p=109",
"refsource" : "MISC",
"url" : "http://secpod.org/blog/?p=109"
},
{ {
"name": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-12.html", "name": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-12.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-12.html" "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-12.html"
}, },
{
"name" : "https://github.com/ZeusCart/zeuscart/issues/28",
"refsource" : "MISC",
"url" : "https://github.com/ZeusCart/zeuscart/issues/28"
},
{ {
"name": "72761", "name": "72761",
"refsource": "BID", "refsource": "BID",
@ -106,6 +76,36 @@
"name": "68756", "name": "68756",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/68756" "url": "http://osvdb.org/show/osvdb/68756"
},
{
"name": "[oss-security] 20150223 CVE-Request -- Zeuscart v. 4 -- Multiple reflecting XSS-, SQLi and InformationDisclosure-vulnerabilities",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2015/q1/649"
},
{
"name": "36159",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/36159"
},
{
"name": "http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html"
},
{
"name": "20150223 ECommerce-Shopping Cart Zeuscart v. 4: Multiple reflecting XSS-, SQLi and InformationDisclosure-vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Feb/89"
},
{
"name": "http://secpod.org/blog/?p=109",
"refsource": "MISC",
"url": "http://secpod.org/blog/?p=109"
},
{
"name": "https://github.com/ZeusCart/zeuscart/issues/28",
"refsource": "MISC",
"url": "https://github.com/ZeusCart/zeuscart/issues/28"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2604", "ID": "CVE-2015-2604",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-354",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-354"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "75757", "name": "75757",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75757" "url": "http://www.securityfocus.com/bid/75757"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-354",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-354"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2648", "ID": "CVE-2015-2648",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,25 +58,60 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "name": "1032911",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" "url": "http://www.securitytracker.com/id/1032911"
},
{
"name": "RHSA-2015:1646",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1646.html"
}, },
{ {
"name": "DSA-3308", "name": "DSA-3308",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3308" "url": "http://www.debian.org/security/2015/dsa-3308"
}, },
{
"name": "openSUSE-SU-2015:1629",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html"
},
{ {
"name": "DSA-3311", "name": "DSA-3311",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3311" "url": "http://www.debian.org/security/2015/dsa-3311"
}, },
{
"name": "RHSA-2015:1647",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1647.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "RHSA-2015:1628",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
},
{
"name": "USN-2674-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2674-1"
},
{ {
"name": "GLSA-201610-06", "name": "GLSA-201610-06",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-06" "url": "https://security.gentoo.org/glsa/201610-06"
}, },
{
"name": "75822",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75822"
},
{ {
"name": "RHSA-2015:1630", "name": "RHSA-2015:1630",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -87,45 +122,10 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html"
}, },
{
"name" : "RHSA-2015:1628",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
},
{
"name" : "RHSA-2015:1646",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1646.html"
},
{
"name" : "RHSA-2015:1647",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1647.html"
},
{ {
"name": "RHSA-2015:1665", "name": "RHSA-2015:1665",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html"
},
{
"name" : "openSUSE-SU-2015:1629",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html"
},
{
"name" : "USN-2674-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2674-1"
},
{
"name" : "75822",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75822"
},
{
"name" : "1032911",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032911"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://patchwork.kernel.org/patch/10395909/",
"refsource" : "MISC",
"url" : "https://patchwork.kernel.org/patch/10395909/"
},
{ {
"name": "https://patchwork.kernel.org/patch/9842889/", "name": "https://patchwork.kernel.org/patch/9842889/",
"refsource": "MISC", "refsource": "MISC",
@ -66,6 +61,11 @@
"name": "https://www.spinics.net/lists/linux-mm/msg117896.html", "name": "https://www.spinics.net/lists/linux-mm/msg117896.html",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.spinics.net/lists/linux-mm/msg117896.html" "url": "https://www.spinics.net/lists/linux-mm/msg117896.html"
},
{
"name": "https://patchwork.kernel.org/patch/10395909/",
"refsource": "MISC",
"url": "https://patchwork.kernel.org/patch/10395909/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-3756", "ID": "CVE-2016-3756",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-07-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-07-01.html"
},
{ {
"name": "https://android.googlesource.com/platform/external/tremolo/+/659030a2e80c38fb8da0a4eb68695349eec6778b", "name": "https://android.googlesource.com/platform/external/tremolo/+/659030a2e80c38fb8da0a4eb68695349eec6778b",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/external/tremolo/+/659030a2e80c38fb8da0a4eb68695349eec6778b" "url": "https://android.googlesource.com/platform/external/tremolo/+/659030a2e80c38fb8da0a4eb68695349eec6778b"
},
{
"name": "http://source.android.com/security/bulletin/2016-07-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-07-01.html"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT207143", "name": "1036858",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT207143" "url": "http://www.securitytracker.com/id/1036858"
},
{
"name" : "https://support.apple.com/HT207170",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207170"
}, },
{ {
"name": "APPLE-SA-2016-09-20", "name": "APPLE-SA-2016-09-20",
@ -78,9 +73,14 @@
"url": "http://www.securityfocus.com/bid/93056" "url": "http://www.securityfocus.com/bid/93056"
}, },
{ {
"name" : "1036858", "name": "https://support.apple.com/HT207170",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1036858" "url": "https://support.apple.com/HT207170"
},
{
"name": "https://support.apple.com/HT207143",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207143"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8061", "ID": "CVE-2016-8061",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05363782",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05363782"
},
{ {
"name": "95369", "name": "95369",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95369" "url": "http://www.securityfocus.com/bid/95369"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05363782",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05363782"
} }
] ]
} }

View File

@ -54,9 +54,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170306_00", "name": "1037961",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170306_00" "url": "http://www.securitytracker.com/id/1037961"
}, },
{ {
"name": "96294", "name": "96294",
@ -64,9 +64,9 @@
"url": "http://www.securityfocus.com/bid/96294" "url": "http://www.securityfocus.com/bid/96294"
}, },
{ {
"name" : "1037961", "name": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170306_00",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1037961" "url": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170306_00"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org", "ASSIGNER": "jenkinsci-cert@googlegroups.com",
"DATE_ASSIGNED": "2019-02-06T02:59:03.179697", "DATE_ASSIGNED": "2019-02-06T02:59:03.179697",
"ID": "CVE-2019-1003020", "ID": "CVE-2019-1003020",
"REQUESTER": "ml@beckweb.net", "REQUESTER": "ml@beckweb.net",