"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:42:44 +00:00
parent 0d5f7ed9e8
commit da46f359ab
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
55 changed files with 4157 additions and 4157 deletions

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://osvdb.org/ref/22/22247-aquifer.txt",
"refsource" : "MISC",
"url" : "http://osvdb.org/ref/22/22247-aquifer.txt"
},
{ {
"name": "20060124 vendor ack/fix: Aquifer CMS Index.asp Keyword Variable XSS (fwd)", "name": "20060124 vendor ack/fix: Aquifer CMS Index.asp Keyword Variable XSS (fwd)",
"refsource": "VIM", "refsource": "VIM",
"url": "http://attrition.org/pipermail/vim/2006-January/000509.html" "url": "http://attrition.org/pipermail/vim/2006-January/000509.html"
}, },
{ {
"name" : "16162", "name": "18326",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/16162" "url": "http://secunia.com/advisories/18326"
}, },
{ {
"name": "ADV-2006-0074", "name": "ADV-2006-0074",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0074" "url": "http://www.vupen.com/english/advisories/2006/0074"
}, },
{
"name": "http://osvdb.org/ref/22/22247-aquifer.txt",
"refsource": "MISC",
"url": "http://osvdb.org/ref/22/22247-aquifer.txt"
},
{
"name": "16162",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16162"
},
{ {
"name": "22247", "name": "22247",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/22247" "url": "http://www.osvdb.org/22247"
},
{
"name" : "18326",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18326"
} }
] ]
} }

View File

@ -53,25 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://devel.webwork.rochester.edu/twiki/bin/view/Webwork/WeBWorKRelease2pt1pt4", "name": "ADV-2006-0319",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://devel.webwork.rochester.edu/twiki/bin/view/Webwork/WeBWorKRelease2pt1pt4" "url": "http://www.vupen.com/english/advisories/2006/0319"
}, },
{ {
"name": "16371", "name": "16371",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/16371" "url": "http://www.securityfocus.com/bid/16371"
}, },
{
"name" : "ADV-2006-0319",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0319"
},
{ {
"name": "18594", "name": "18594",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18594" "url": "http://secunia.com/advisories/18594"
}, },
{
"name": "http://devel.webwork.rochester.edu/twiki/bin/view/Webwork/WeBWorKRelease2pt1pt4",
"refsource": "CONFIRM",
"url": "http://devel.webwork.rochester.edu/twiki/bin/view/Webwork/WeBWorKRelease2pt1pt4"
},
{ {
"name": "webwork-unknown-command-execution(24322)", "name": "webwork-unknown-command-execution(24322)",
"refsource": "XF", "refsource": "XF",

View File

@ -57,16 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/423901/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/423901/100/0/threaded"
}, },
{
"name" : "ADV-2006-0449",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0449"
},
{
"name" : "22978",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22978"
},
{ {
"name": "1015581", "name": "1015581",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -76,6 +66,16 @@
"name": "neomail-neomail-script-xss(24470)", "name": "neomail-neomail-script-xss(24470)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24470" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24470"
},
{
"name": "ADV-2006-0449",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0449"
},
{
"name": "22978",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22978"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060222 South River WebDrive Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/425785/100/0/threaded"
},
{ {
"name": "webdrive-name-bo(24903)", "name": "webdrive-name-bo(24903)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24903" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24903"
},
{
"name": "20060222 South River WebDrive Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/425785/100/0/threaded"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "http://www.securityfocus.com/archive/1/426538/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/426538/100/0/threaded"
}, },
{ {
"name" : "http://www.joomla.org/content/view/938/78/", "name": "19105",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.joomla.org/content/view/938/78/" "url": "http://secunia.com/advisories/19105"
}, },
{ {
"name": "23817", "name": "23817",
@ -68,9 +68,9 @@
"url": "http://www.osvdb.org/23817" "url": "http://www.osvdb.org/23817"
}, },
{ {
"name" : "19105", "name": "http://www.joomla.org/content/view/938/78/",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/19105" "url": "http://www.joomla.org/content/view/938/78/"
}, },
{ {
"name": "527", "name": "527",

View File

@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://hamid.ir/security/nodez.txt", "name": "19165",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://hamid.ir/security/nodez.txt" "url": "http://secunia.com/advisories/19165"
}, },
{ {
"name": "17066", "name": "17066",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/17066" "url": "http://www.securityfocus.com/bid/17066"
}, },
{
"name": "http://hamid.ir/security/nodez.txt",
"refsource": "MISC",
"url": "http://hamid.ir/security/nodez.txt"
},
{ {
"name": "ADV-2006-0899", "name": "ADV-2006-0899",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0899" "url": "http://www.vupen.com/english/advisories/2006/0899"
}, },
{
"name" : "23776",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23776"
},
{ {
"name": "1015747", "name": "1015747",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015747" "url": "http://securitytracker.com/id?1015747"
}, },
{
"name" : "19165",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19165"
},
{ {
"name": "nodez-op-xss(25121)", "name": "nodez-op-xss(25121)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25121" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25121"
},
{
"name": "23776",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23776"
} }
] ]
} }

View File

@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://osvdb.org/ref/24/24233-tilde.txt",
"refsource" : "MISC",
"url" : "http://osvdb.org/ref/24/24233-tilde.txt"
},
{
"name" : "17299",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17299"
},
{
"name" : "ADV-2006-1145",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1145"
},
{
"name" : "24233",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24233"
},
{ {
"name": "19447", "name": "19447",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +61,26 @@
"name": "tildecms-index-sql-injection(25510)", "name": "tildecms-index-sql-injection(25510)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25510" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25510"
},
{
"name": "http://osvdb.org/ref/24/24233-tilde.txt",
"refsource": "MISC",
"url": "http://osvdb.org/ref/24/24233-tilde.txt"
},
{
"name": "24233",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24233"
},
{
"name": "ADV-2006-1145",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1145"
},
{
"name": "17299",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17299"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://www.kapda.ir/advisory-313.html",
"refsource": "MISC",
"url": "http://www.kapda.ir/advisory-313.html"
},
{ {
"name": "20060418 [KAPDA::#41] - Mambo/Joomla rss component vulnerability", "name": "20060418 [KAPDA::#41] - Mambo/Joomla rss component vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "http://irannetjob.com/content/view/209/28/", "name": "http://irannetjob.com/content/view/209/28/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://irannetjob.com/content/view/209/28/" "url": "http://irannetjob.com/content/view/209/28/"
},
{
"name" : "http://www.kapda.ir/advisory-313.html",
"refsource" : "MISC",
"url" : "http://www.kapda.ir/advisory-313.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2006-3437", "ID": "CVE-2006-3437",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060726 EzUpload multi file vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/441172/100/0/threaded"
},
{ {
"name": "19175", "name": "19175",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "1305", "name": "1305",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1305" "url": "http://securityreason.com/securityalert/1305"
},
{
"name": "20060726 EzUpload multi file vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/441172/100/0/threaded"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "solaris-listener-dos(28420)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28420"
},
{ {
"name": "102576", "name": "102576",
"refsource": "SUNALERT", "refsource": "SUNALERT",
@ -61,11 +66,6 @@
"name": "1016706", "name": "1016706",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016706" "url": "http://securitytracker.com/id?1016706"
},
{
"name" : "solaris-listener-dos(28420)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28420"
} }
] ]
} }

View File

@ -52,25 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "APPLE-SA-2006-09-29",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html"
},
{ {
"name": "20271", "name": "20271",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/20271" "url": "http://www.securityfocus.com/bid/20271"
}, },
{ {
"name" : "ADV-2006-3852", "name": "macos-cfnetwork-ssl-spoofing(29277)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2006/3852" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29277"
},
{
"name" : "29267",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/29267"
}, },
{ {
"name": "1016952", "name": "1016952",
@ -83,9 +73,19 @@
"url": "http://secunia.com/advisories/22187" "url": "http://secunia.com/advisories/22187"
}, },
{ {
"name" : "macos-cfnetwork-ssl-spoofing(29277)", "name": "ADV-2006-3852",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29277" "url": "http://www.vupen.com/english/advisories/2006/3852"
},
{
"name": "APPLE-SA-2006-09-29",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html"
},
{
"name": "29267",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29267"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.gulftech.org/?node=research&article_id=00111-08282006&", "name": "21659",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://www.gulftech.org/?node=research&article_id=00111-08282006&" "url": "http://secunia.com/advisories/21659"
},
{
"name" : "http://cubecart.com/site/forums/index.php?showtopic=21540",
"refsource" : "CONFIRM",
"url" : "http://cubecart.com/site/forums/index.php?showtopic=21540"
}, },
{ {
"name": "http://www.cubecart.com/site/forums/index.php?s=5e34938dc670782af211587b8a450c90&act=Attach&type=post&id=697", "name": "http://www.cubecart.com/site/forums/index.php?s=5e34938dc670782af211587b8a450c90&act=Attach&type=post&id=697",
@ -73,9 +68,14 @@
"url": "http://www.securityfocus.com/bid/19782" "url": "http://www.securityfocus.com/bid/19782"
}, },
{ {
"name" : "21659", "name": "http://cubecart.com/site/forums/index.php?showtopic=21540",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/21659" "url": "http://cubecart.com/site/forums/index.php?showtopic=21540"
},
{
"name": "http://www.gulftech.org/?node=research&article_id=00111-08282006&",
"refsource": "MISC",
"url": "http://www.gulftech.org/?node=research&article_id=00111-08282006&"
} }
] ]
} }

View File

@ -52,25 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060907 CORE-2006-0322: Multiple vulnerabilities in ICQ Toolbar 1.3 for Internet Explorer",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/445515/100/0/threaded"
},
{ {
"name": "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1510", "name": "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1510",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1510" "url": "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1510"
}, },
{
"name": "ADV-2006-3528",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3528"
},
{
"name": "icq-toolbar-rss-feed-xss(28809)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28809"
},
{ {
"name": "19900", "name": "19900",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/19900" "url": "http://www.securityfocus.com/bid/19900"
}, },
{ {
"name" : "ADV-2006-3528", "name": "20060907 CORE-2006-0322: Multiple vulnerabilities in ICQ Toolbar 1.3 for Internet Explorer",
"refsource" : "VUPEN", "refsource": "BUGTRAQ",
"url" : "http://www.vupen.com/english/advisories/2006/3528" "url": "http://www.securityfocus.com/archive/1/445515/100/0/threaded"
}, },
{ {
"name": "21809", "name": "21809",
@ -81,11 +86,6 @@
"name": "1523", "name": "1523",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1523" "url": "http://securityreason.com/securityalert/1523"
},
{
"name" : "icq-toolbar-rss-feed-xss(28809)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28809"
} }
] ]
} }

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060920 Cisco Security Advisory: Cisco Intrusion Prevention System Management Interface Denial of Service and Fragmented Packet Evasion Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20060920-ips.shtml"
},
{
"name" : "VU#658884",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/658884"
},
{ {
"name": "20127", "name": "20127",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/20127" "url": "http://www.securityfocus.com/bid/20127"
}, },
{
"name" : "ADV-2006-3721",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3721"
},
{ {
"name": "29036", "name": "29036",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/29036" "url": "http://www.osvdb.org/29036"
}, },
{
"name": "20060920 Cisco Security Advisory: Cisco Intrusion Prevention System Management Interface Denial of Service and Fragmented Packet Evasion Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060920-ips.shtml"
},
{
"name": "cisco-ips-frag-bypass(29058)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29058"
},
{ {
"name": "1016891", "name": "1016891",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016891" "url": "http://securitytracker.com/id?1016891"
}, },
{
"name": "VU#658884",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/658884"
},
{ {
"name": "22022", "name": "22022",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22022" "url": "http://secunia.com/advisories/22022"
}, },
{ {
"name" : "cisco-ips-frag-bypass(29058)", "name": "ADV-2006-3721",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29058" "url": "http://www.vupen.com/english/advisories/2006/3721"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "12806",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/12806"
},
{ {
"name": "65010", "name": "65010",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -72,6 +67,11 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1288" "url": "http://www.vupen.com/english/advisories/2010/1288"
}, },
{
"name": "12806",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/12806"
},
{ {
"name": "cmscout-search-xss(58996)", "name": "cmscout-search-xss(58996)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "MDVSA-2011:039",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
},
{ {
"name": "http://code.google.com/p/chromium/issues/detail?id=43488", "name": "http://code.google.com/p/chromium/issues/detail?id=43488",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -63,34 +68,29 @@
"url": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html" "url": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html"
}, },
{ {
"name" : "MDVSA-2011:039", "name": "ADV-2010-2722",
"refsource" : "MANDRIVA", "refsource": "VUPEN",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039" "url": "http://www.vupen.com/english/advisories/2010/2722"
}, },
{ {
"name": "USN-1006-1", "name": "USN-1006-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1006-1" "url": "http://www.ubuntu.com/usn/USN-1006-1"
}, },
{
"name" : "oval:org.mitre.oval:def:11884",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11884"
},
{ {
"name": "41856", "name": "41856",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41856" "url": "http://secunia.com/advisories/41856"
}, },
{
"name" : "ADV-2010-2722",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2722"
},
{ {
"name": "ADV-2011-0552", "name": "ADV-2011-0552",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0552" "url": "http://www.vupen.com/english/advisories/2011/0552"
},
{
"name": "oval:org.mitre.oval:def:11884",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11884"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3436", "ID": "CVE-2010-3436",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,60 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://security-tracker.debian.org/tracker/CVE-2010-3436",
"refsource" : "CONFIRM",
"url" : "http://security-tracker.debian.org/tracker/CVE-2010-3436"
},
{
"name" : "http://svn.php.net/viewvc/php/php-src/trunk/main/fopen_wrappers.c?r1=303824&r2=303823&pathrev=303824",
"refsource" : "CONFIRM",
"url" : "http://svn.php.net/viewvc/php/php-src/trunk/main/fopen_wrappers.c?r1=303824&r2=303823&pathrev=303824"
},
{ {
"name": "http://svn.php.net/viewvc?view=revision&revision=303824", "name": "http://svn.php.net/viewvc?view=revision&revision=303824",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://svn.php.net/viewvc?view=revision&revision=303824" "url": "http://svn.php.net/viewvc?view=revision&revision=303824"
}, },
{ {
"name" : "http://www.php.net/ChangeLog-5.php", "name": "ADV-2011-0077",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://www.php.net/ChangeLog-5.php" "url": "http://www.vupen.com/english/advisories/2011/0077"
}, },
{ {
"name" : "http://www.php.net/archive/2010.php#id2010-12-10-1", "name": "42812",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.php.net/archive/2010.php#id2010-12-10-1" "url": "http://secunia.com/advisories/42812"
},
{
"name" : "http://www.php.net/releases/5_2_15.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/releases/5_2_15.php"
},
{
"name" : "http://www.php.net/releases/5_3_4.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/releases/5_3_4.php"
},
{
"name" : "http://support.apple.com/kb/HT4581",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4581"
},
{
"name" : "http://support.apple.com/kb/HT5002",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5002"
},
{
"name" : "APPLE-SA-2011-03-21-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name" : "APPLE-SA-2011-10-12-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
}, },
{ {
"name": "MDVSA-2010:218", "name": "MDVSA-2010:218",
@ -113,9 +73,19 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:218" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:218"
}, },
{ {
"name" : "SSA:2010-357-01", "name": "http://www.php.net/releases/5_3_4.php",
"refsource" : "SLACKWARE", "refsource": "CONFIRM",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.490619" "url": "http://www.php.net/releases/5_3_4.php"
},
{
"name": "http://svn.php.net/viewvc/php/php-src/trunk/main/fopen_wrappers.c?r1=303824&r2=303823&pathrev=303824",
"refsource": "CONFIRM",
"url": "http://svn.php.net/viewvc/php/php-src/trunk/main/fopen_wrappers.c?r1=303824&r2=303823&pathrev=303824"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
}, },
{ {
"name": "USN-1042-1", "name": "USN-1042-1",
@ -128,14 +98,19 @@
"url": "http://www.securityfocus.com/bid/44723" "url": "http://www.securityfocus.com/bid/44723"
}, },
{ {
"name" : "42729", "name": "http://www.php.net/ChangeLog-5.php",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/42729" "url": "http://www.php.net/ChangeLog-5.php"
}, },
{ {
"name" : "42812", "name": "APPLE-SA-2011-10-12-3",
"refsource" : "SECUNIA", "refsource": "APPLE",
"url" : "http://secunia.com/advisories/42812" "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "SSA:2010-357-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.490619"
}, },
{ {
"name": "ADV-2010-3313", "name": "ADV-2010-3313",
@ -143,9 +118,34 @@
"url": "http://www.vupen.com/english/advisories/2010/3313" "url": "http://www.vupen.com/english/advisories/2010/3313"
}, },
{ {
"name" : "ADV-2011-0077", "name": "http://www.php.net/archive/2010.php#id2010-12-10-1",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2011/0077" "url": "http://www.php.net/archive/2010.php#id2010-12-10-1"
},
{
"name": "http://www.php.net/releases/5_2_15.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/releases/5_2_15.php"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "42729",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42729"
},
{
"name": "http://security-tracker.debian.org/tracker/CVE-2010-3436",
"refsource": "CONFIRM",
"url": "http://security-tracker.debian.org/tracker/CVE-2010-3436"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3701", "ID": "CVE-2010-3701",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "RHSA-2010:0756",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0756.html"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=634014", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=634014",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=640006" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640006"
}, },
{
"name" : "RHSA-2010:0756",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0756.html"
},
{ {
"name": "RHSA-2010:0757", "name": "RHSA-2010:0757",
"refsource": "REDHAT", "refsource": "REDHAT",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3878", "ID": "CVE-2010-3878",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=604617", "name": "RHSA-2010:0938",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=604617" "url": "http://www.redhat.com/support/errata/RHSA-2010-0938.html"
}, },
{ {
"name": "RHSA-2010:0937", "name": "RHSA-2010:0937",
@ -63,9 +63,9 @@
"url": "http://www.redhat.com/support/errata/RHSA-2010-0937.html" "url": "http://www.redhat.com/support/errata/RHSA-2010-0937.html"
}, },
{ {
"name" : "RHSA-2010:0938", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=604617",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0938.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=604617"
}, },
{ {
"name": "RHSA-2010:0939", "name": "RHSA-2010:0939",

View File

@ -52,11 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "40391",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40391"
},
{ {
"name": "14239", "name": "14239",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14239" "url": "http://www.exploit-db.com/exploits/14239"
}, },
{
"name": "66013",
"refsource": "OSVDB",
"url": "http://osvdb.org/66013"
},
{
"name": "autodealer-info-sql-injection(60061)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60061"
},
{
"name": "8489",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8489"
},
{ {
"name": "http://packetstormsecurity.org/1007-exploits/bsautodealer-sql.txt", "name": "http://packetstormsecurity.org/1007-exploits/bsautodealer-sql.txt",
"refsource": "MISC", "refsource": "MISC",
@ -66,26 +86,6 @@
"name": "41384", "name": "41384",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/41384" "url": "http://www.securityfocus.com/bid/41384"
},
{
"name" : "66013",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/66013"
},
{
"name" : "40391",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40391"
},
{
"name" : "8489",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/8489"
},
{
"name" : "autodealer-info-sql-injection(60061)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/60061"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20110207 ZDI-11-050: IBM Informix Dynamic Server SET ENVIRONMENT Remote Code Execution Vulnerability", "name": "ADV-2011-0309",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/516250/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2011/0309"
},
{
"name" : "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ibm",
"refsource" : "MISC",
"url" : "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ibm"
}, },
{ {
"name": "http://zerodayinitiative.com/advisories/ZDI-11-050/", "name": "http://zerodayinitiative.com/advisories/ZDI-11-050/",
@ -72,25 +67,30 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/46230" "url": "http://www.securityfocus.com/bid/46230"
}, },
{
"name" : "43212",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43212"
},
{ {
"name": "8078", "name": "8078",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8078" "url": "http://securityreason.com/securityalert/8078"
}, },
{ {
"name" : "ADV-2011-0309", "name": "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ibm",
"refsource" : "VUPEN", "refsource": "MISC",
"url" : "http://www.vupen.com/english/advisories/2011/0309" "url": "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ibm"
},
{
"name": "43212",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43212"
}, },
{ {
"name": "ibm-informix-dynamic-oninit-bo(65209)", "name": "ibm-informix-dynamic-oninit-bo(65209)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65209" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65209"
},
{
"name": "20110207 ZDI-11-050: IBM Informix Dynamic Server SET ENVIRONMENT Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516250/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1184", "ID": "CVE-2011-1184",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,34 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://svn.apache.org/viewvc?view=rev&rev=1087655", "name": "MDVSA-2011:156",
"refsource" : "CONFIRM", "refsource": "MANDRIVA",
"url" : "http://svn.apache.org/viewvc?view=rev&rev=1087655" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:156"
},
{
"name" : "http://svn.apache.org/viewvc?view=rev&rev=1158180",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=rev&rev=1158180"
},
{
"name" : "http://svn.apache.org/viewvc?view=rev&rev=1159309",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=rev&rev=1159309"
},
{
"name" : "http://tomcat.apache.org/security-5.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-5.html"
},
{
"name" : "http://tomcat.apache.org/security-6.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-6.html"
},
{
"name" : "http://tomcat.apache.org/security-7.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-7.html"
}, },
{ {
"name": "DSA-2401", "name": "DSA-2401",
@ -88,64 +63,9 @@
"url": "http://www.debian.org/security/2012/dsa-2401" "url": "http://www.debian.org/security/2012/dsa-2401"
}, },
{ {
"name" : "HPSBUX02860", "name": "SUSE-SU-2012:0155",
"refsource" : "HP", "refsource": "SUSE",
"url" : "http://marc.info/?l=bugtraq&m=136485229118404&w=2" "url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html"
},
{
"name" : "SSRT101146",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name" : "HPSBST02955",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
},
{
"name" : "HPSBOV02762",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name" : "SSRT100825",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name" : "MDVSA-2011:156",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:156"
},
{
"name" : "RHSA-2011:1845",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1845.html"
},
{
"name" : "RHSA-2012:0074",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0074.html"
},
{
"name" : "RHSA-2012:0075",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0075.html"
},
{
"name" : "RHSA-2012:0076",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0076.html"
},
{
"name" : "RHSA-2012:0077",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0077.html"
},
{
"name" : "RHSA-2012:0078",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0078.html"
}, },
{ {
"name": "RHSA-2012:0325", "name": "RHSA-2012:0325",
@ -153,24 +73,104 @@
"url": "http://rhn.redhat.com/errata/RHSA-2012-0325.html" "url": "http://rhn.redhat.com/errata/RHSA-2012-0325.html"
}, },
{ {
"name" : "SUSE-SU-2012:0155", "name": "HPSBUX02860",
"refsource" : "SUSE", "refsource": "HP",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html" "url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name": "http://svn.apache.org/viewvc?view=rev&rev=1159309",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=rev&rev=1159309"
},
{
"name": "RHSA-2012:0078",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0078.html"
},
{
"name": "RHSA-2011:1845",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1845.html"
},
{
"name": "http://svn.apache.org/viewvc?view=rev&rev=1158180",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=rev&rev=1158180"
},
{
"name": "RHSA-2012:0075",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0075.html"
},
{
"name": "RHSA-2012:0074",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0074.html"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "HPSBOV02762",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name": "http://svn.apache.org/viewvc?view=rev&rev=1087655",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=rev&rev=1087655"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "57126",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57126"
},
{
"name": "SSRT100825",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name": "http://tomcat.apache.org/security-5.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-5.html"
}, },
{ {
"name": "openSUSE-SU-2012:0208", "name": "openSUSE-SU-2012:0208",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00006.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00006.html"
}, },
{
"name": "SSRT101146",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name": "RHSA-2012:0076",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0076.html"
},
{
"name": "HPSBST02955",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
},
{ {
"name": "oval:org.mitre.oval:def:19169", "name": "oval:org.mitre.oval:def:19169",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19169" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19169"
}, },
{ {
"name" : "57126", "name": "RHSA-2012:0077",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/57126" "url": "http://rhn.redhat.com/errata/RHSA-2012-0077.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2011-1828", "ID": "CVE-2011-1828",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://launchpad.net/bugs/771553",
"refsource" : "CONFIRM",
"url" : "https://launchpad.net/bugs/771553"
},
{ {
"name": "USN-1127-1", "name": "USN-1127-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -67,20 +62,25 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/47679" "url": "http://www.securityfocus.com/bid/47679"
}, },
{
"name" : "44413",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44413"
},
{ {
"name": "ADV-2011-1143", "name": "ADV-2011-1143",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1143" "url": "http://www.vupen.com/english/advisories/2011/1143"
}, },
{
"name": "https://launchpad.net/bugs/771553",
"refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/771553"
},
{ {
"name": "usbcreator-unspecified-sec-bypass(67241)", "name": "usbcreator-unspecified-sec-bypass(67241)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67241" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67241"
},
{
"name": "44413",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44413"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.simonroses.com/wp-content/uploads/2011/05/SRF-SA-2011-01.txt", "name": "8250",
"refsource" : "MISC", "refsource": "SREASON",
"url" : "http://www.simonroses.com/wp-content/uploads/2011/05/SRF-SA-2011-01.txt" "url": "http://securityreason.com/securityalert/8250"
}, },
{ {
"name": "47765", "name": "47765",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/47765" "url": "http://www.securityfocus.com/bid/47765"
}, },
{ {
"name" : "8250", "name": "http://www.simonroses.com/wp-content/uploads/2011/05/SRF-SA-2011-01.txt",
"refsource" : "SREASON", "refsource": "MISC",
"url" : "http://securityreason.com/securityalert/8250" "url": "http://www.simonroses.com/wp-content/uploads/2011/05/SRF-SA-2011-01.txt"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1924", "ID": "CVE-2011-1924",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,20 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[tor-announce] 20110228 Tor 0.2.1.30 is released", "name": "43548",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html" "url": "http://secunia.com/advisories/43548"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=705192",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=705192"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=705194", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=705194",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194"
}, },
{
"name": "44862",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44862"
},
{
"name": "46618",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46618"
},
{ {
"name": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e", "name": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -78,19 +83,14 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html"
}, },
{ {
"name" : "46618", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=705192",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/46618" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705192"
}, },
{ {
"name" : "43548", "name": "[tor-announce] 20110228 Tor 0.2.1.30 is released",
"refsource" : "SECUNIA", "refsource": "MLIST",
"url" : "http://secunia.com/advisories/43548" "url": "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html"
},
{
"name" : "44862",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44862"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://sitewat.ch/Advisory/View/4",
"refsource" : "MISC",
"url" : "https://sitewat.ch/Advisory/View/4"
},
{ {
"name": "51276", "name": "51276",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/51276" "url": "http://www.securityfocus.com/bid/51276"
},
{
"name": "https://sitewat.ch/Advisory/View/4",
"refsource": "MISC",
"url": "https://sitewat.ch/Advisory/View/4"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20111127 Wordpress skysa-official plugin Cross-Site Scripting Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/520662/100/0/threaded"
},
{ {
"name": "50824", "name": "50824",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "skysaappbar-skysa-xss(71486)", "name": "skysaappbar-skysa-xss(71486)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71486" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71486"
},
{
"name": "20111127 Wordpress skysa-official plugin Cross-Site Scripting Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520662/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3369", "ID": "CVE-2014-3369",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=35828", "name": "60850",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=35828" "url": "http://secunia.com/advisories/60850"
},
{
"name" : "20141015 Multiple Vulnerabilities in Cisco TelePresence Video Communication Server and Cisco Expressway Software",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-vcs"
}, },
{ {
"name": "1031055", "name": "1031055",
@ -68,9 +63,14 @@
"url": "http://www.securitytracker.com/id/1031055" "url": "http://www.securitytracker.com/id/1031055"
}, },
{ {
"name" : "60850", "name": "20141015 Multiple Vulnerabilities in Cisco TelePresence Video Communication Server and Cisco Expressway Software",
"refsource" : "SECUNIA", "refsource": "CISCO",
"url" : "http://secunia.com/advisories/60850" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-vcs"
},
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35828",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35828"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3515", "ID": "CVE-2014-3515",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,15 +58,45 @@
"url": "http://git.php.net/?p=php-src.git;a=commit;h=88223c5245e9b470e1e6362bfd96829562ffe6ab" "url": "http://git.php.net/?p=php-src.git;a=commit;h=88223c5245e9b470e1e6362bfd96829562ffe6ab"
}, },
{ {
"name" : "http://www.php.net/ChangeLog-5.php", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21683486",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683486"
},
{
"name": "RHSA-2014:1766",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
}, },
{ {
"name": "https://bugs.php.net/bug.php?id=67492", "name": "https://bugs.php.net/bug.php?id=67492",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=67492" "url": "https://bugs.php.net/bug.php?id=67492"
}, },
{
"name": "HPSBUX03102",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
},
{
"name": "DSA-2974",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2974"
},
{
"name": "59794",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59794"
},
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "60998",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60998"
},
{ {
"name": "http://support.apple.com/kb/HT6443", "name": "http://support.apple.com/kb/HT6443",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -78,59 +108,29 @@
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
}, },
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21683486", "name": "RHSA-2014:1765",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21683486" "url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
},
{
"name" : "DSA-2974",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2974"
},
{
"name" : "HPSBUX03102",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
}, },
{ {
"name": "SSRT101681", "name": "SSRT101681",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2" "url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
}, },
{
"name" : "RHSA-2014:1765",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
},
{
"name" : "RHSA-2014:1766",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
},
{
"name" : "openSUSE-SU-2014:1236",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
},
{ {
"name": "68237", "name": "68237",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/68237" "url": "http://www.securityfocus.com/bid/68237"
}, },
{
"name" : "59794",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59794"
},
{ {
"name": "59831", "name": "59831",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59831" "url": "http://secunia.com/advisories/59831"
}, },
{ {
"name" : "60998", "name": "openSUSE-SU-2014:1236",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/60998" "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20140514 Re: Mumble 1.2.6: Mumble-SA-2014-005 and Mumble-SA-2014-006",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/05/15/4"
},
{
"name" : "[oss-security] 20140515 Mumble 1.2.6: Mumble-SA-2014-005 and Mumble-SA-2014-006",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/05/15/1"
},
{ {
"name": "http://mumble.info/security/Mumble-SA-2014-006.txt", "name": "http://mumble.info/security/Mumble-SA-2014-006.txt",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "67401", "name": "67401",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/67401" "url": "http://www.securityfocus.com/bid/67401"
},
{
"name": "[oss-security] 20140514 Re: Mumble 1.2.6: Mumble-SA-2014-005 and Mumble-SA-2014-006",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/05/15/4"
},
{
"name": "[oss-security] 20140515 Mumble 1.2.6: Mumble-SA-2014-005 and Mumble-SA-2014-006",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/05/15/1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7424", "ID": "CVE-2014-7424",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#483761", "name": "VU#483761",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20141008 CVE request for VDSM denial of service", "name": "[oss-security] 20141008 Re: CVE request for VDSM denial of service",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/10/08/6" "url": "http://www.openwall.com/lists/oss-security/2014/10/08/16"
}, },
{ {
"name": "[oss-security] 20141008 Re: CVE request for VDSM denial of service", "name": "[oss-security] 20141008 Re: CVE request for VDSM denial of service",
@ -63,9 +63,9 @@
"url": "http://www.openwall.com/lists/oss-security/2014/10/08/18" "url": "http://www.openwall.com/lists/oss-security/2014/10/08/18"
}, },
{ {
"name" : "[oss-security] 20141008 Re: CVE request for VDSM denial of service", "name": "[oss-security] 20141008 CVE request for VDSM denial of service",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/10/08/16" "url": "http://www.openwall.com/lists/oss-security/2014/10/08/6"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1150812", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1150812",

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://drupal.org/node/2254925",
"refsource" : "MISC",
"url" : "http://drupal.org/node/2254925"
},
{
"name" : "https://www.drupal.org/node/2254835",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/node/2254835"
},
{ {
"name": "https://www.drupal.org/node/2254837", "name": "https://www.drupal.org/node/2254837",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -76,6 +66,16 @@
"name": "58318", "name": "58318",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58318" "url": "http://secunia.com/advisories/58318"
},
{
"name": "http://drupal.org/node/2254925",
"refsource": "MISC",
"url": "http://drupal.org/node/2254925"
},
{
"name": "https://www.drupal.org/node/2254835",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2254835"
} }
] ]
} }

View File

@ -58,29 +58,29 @@
"url": "http://www.securityfocus.com/archive/1/534360/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/534360/100/0/threaded"
}, },
{ {
"name" : "20141231 [KIS-2014-15] Osclass <= 3.4.2 (ajax.php) Local File Inclusion Vulnerability", "name": "71841",
"refsource" : "FULLDISC", "refsource": "BID",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/133" "url": "http://www.securityfocus.com/bid/71841"
}, },
{ {
"name": "http://karmainsecurity.com/KIS-2014-15", "name": "http://karmainsecurity.com/KIS-2014-15",
"refsource": "MISC", "refsource": "MISC",
"url": "http://karmainsecurity.com/KIS-2014-15" "url": "http://karmainsecurity.com/KIS-2014-15"
}, },
{
"name" : "http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.html"
},
{ {
"name": "http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/", "name": "http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/" "url": "http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/"
}, },
{ {
"name" : "71841", "name": "http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.html",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/71841" "url": "http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.html"
},
{
"name": "20141231 [KIS-2014-15] Osclass <= 3.4.2 (ajax.php) Local File Inclusion Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/133"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8232", "ID": "CVE-2014-8232",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2014-9622", "ID": "CVE-2014-9622",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20141114 xdg-open RCE",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Nov/36"
},
{
"name" : "[oss-security] 20150117 Re: CVE Request: xdg-utils: xdg-open: command injection vulnerability",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/01/17/10"
},
{ {
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=66670", "name": "https://bugs.freedesktop.org/show_bug.cgi?id=66670",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,6 +62,26 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=472888" "url": "https://bugs.gentoo.org/show_bug.cgi?id=472888"
}, },
{
"name": "20141114 xdg-open RCE",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Nov/36"
},
{
"name": "[oss-security] 20150117 Re: CVE Request: xdg-utils: xdg-open: command injection vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/01/17/10"
},
{
"name": "62155",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62155"
},
{
"name": "71284",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71284"
},
{ {
"name": "DSA-3131", "name": "DSA-3131",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -81,16 +91,6 @@
"name": "GLSA-201701-09", "name": "GLSA-201701-09",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-09" "url": "https://security.gentoo.org/glsa/201701-09"
},
{
"name" : "71284",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71284"
},
{
"name" : "62155",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62155"
} }
] ]
} }

View File

@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160602 Re: ImageMagick CVEs",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/02/13"
},
{
"name" : "https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=36ed9419a68cb1356b1843b48cc12788179cdaee",
"refsource" : "CONFIRM",
"url" : "https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=36ed9419a68cb1356b1843b48cc12788179cdaee"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343502", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343502",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343502" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343502"
}, },
{ {
"name" : "SUSE-SU-2016:1782", "name": "openSUSE-SU-2016:1833",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html"
},
{
"name" : "SUSE-SU-2016:1783",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html"
},
{
"name" : "SUSE-SU-2016:1784",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html"
}, },
{ {
"name": "openSUSE-SU-2016:1724", "name": "openSUSE-SU-2016:1724",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html"
}, },
{
"name": "SUSE-SU-2016:1782",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html"
},
{
"name": "[oss-security] 20160602 Re: ImageMagick CVEs",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/02/13"
},
{ {
"name": "openSUSE-SU-2016:1748", "name": "openSUSE-SU-2016:1748",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1833", "name": "SUSE-SU-2016:1784",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html"
},
{
"name": "SUSE-SU-2016:1783",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html"
},
{
"name": "https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=36ed9419a68cb1356b1843b48cc12788179cdaee",
"refsource": "CONFIRM",
"url": "https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=36ed9419a68cb1356b1843b48cc12788179cdaee"
}, },
{ {
"name": "USN-3131-1", "name": "USN-3131-1",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2080", "ID": "CVE-2016-2080",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.f5.com/kb/en-us/solutions/public/k/11/sol11772107.html",
"refsource" : "CONFIRM",
"url" : "https://support.f5.com/kb/en-us/solutions/public/k/11/sol11772107.html"
},
{ {
"name": "1035520", "name": "1035520",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035520" "url": "http://www.securitytracker.com/id/1035520"
},
{
"name": "https://support.f5.com/kb/en-us/solutions/public/k/11/sol11772107.html",
"refsource": "CONFIRM",
"url": "https://support.f5.com/kb/en-us/solutions/public/k/11/sol11772107.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-2486", "ID": "CVE-2016-2486",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-06-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-06-01.html"
},
{ {
"name": "https://android.googlesource.com/platform/frameworks/av/+/ad40e57890f81a3cf436c5f06da66396010bd9e5", "name": "https://android.googlesource.com/platform/frameworks/av/+/ad40e57890f81a3cf436c5f06da66396010bd9e5",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/ad40e57890f81a3cf436c5f06da66396010bd9e5" "url": "https://android.googlesource.com/platform/frameworks/av/+/ad40e57890f81a3cf436c5f06da66396010bd9e5"
},
{
"name": "http://source.android.com/security/bulletin/2016-06-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-06-01.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2743", "ID": "CVE-2016-2743",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-2830", "ID": "CVE-2016-2830",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-63.html", "name": "DSA-3640",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-63.html" "url": "http://www.debian.org/security/2016/dsa-3640"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1255270", "name": "1036508",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1255270" "url": "http://www.securitytracker.com/id/1036508"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
@ -68,44 +68,44 @@
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
}, },
{ {
"name" : "DSA-3640", "name": "USN-3044-1",
"refsource" : "DEBIAN", "refsource": "UBUNTU",
"url" : "http://www.debian.org/security/2016/dsa-3640" "url": "http://www.ubuntu.com/usn/USN-3044-1"
},
{
"name" : "GLSA-201701-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-15"
}, },
{ {
"name": "RHSA-2016:1551", "name": "RHSA-2016:1551",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1551.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-1551.html"
}, },
{
"name": "GLSA-201701-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-15"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1255270",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1255270"
},
{ {
"name": "openSUSE-SU-2016:1964", "name": "openSUSE-SU-2016:1964",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"
}, },
{
"name" : "openSUSE-SU-2016:2026",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"
},
{
"name" : "USN-3044-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3044-1"
},
{ {
"name": "92261", "name": "92261",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92261" "url": "http://www.securityfocus.com/bid/92261"
}, },
{ {
"name" : "1036508", "name": "http://www.mozilla.org/security/announce/2016/mfsa2016-63.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1036508" "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-63.html"
},
{
"name": "openSUSE-SU-2016:2026",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"
} }
] ]
} }

View File

@ -73,15 +73,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21997340",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21997340"
},
{ {
"name": "96614", "name": "96614",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/96614" "url": "http://www.securityfocus.com/bid/96614"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21997340",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21997340"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160630 [CVE-2016-6130] Double-Fetch Vulnerability in Linux-4.5/drivers/s390/char/sclp_ctl.c",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/538803/30/0/threaded"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6"
},
{
"name" : "https://bugzilla.kernel.org/show_bug.cgi?id=116741",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.kernel.org/show_bug.cgi?id=116741"
},
{ {
"name": "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6", "name": "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -81,6 +66,21 @@
"name": "91540", "name": "91540",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91540" "url": "http://www.securityfocus.com/bid/91540"
},
{
"name": "20160630 [CVE-2016-6130] Double-Fetch Vulnerability in Linux-4.5/drivers/s390/char/sclp_ctl.c",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/538803/30/0/threaded"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6"
},
{
"name": "https://bugzilla.kernel.org/show_bug.cgi?id=116741",
"refsource": "CONFIRM",
"url": "https://bugzilla.kernel.org/show_bug.cgi?id=116741"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-6702", "ID": "CVE-2016-6702",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7760", "ID": "CVE-2016-7760",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -80,19 +80,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1350683", "name": "RHSA-2017:1106",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1350683" "url": "https://access.redhat.com/errata/RHSA-2017:1106"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-10/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-10/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-11/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-11/"
}, },
{ {
"name": "https://www.mozilla.org/security/advisories/mfsa2017-12/", "name": "https://www.mozilla.org/security/advisories/mfsa2017-12/",
@ -100,39 +90,49 @@
"url": "https://www.mozilla.org/security/advisories/mfsa2017-12/" "url": "https://www.mozilla.org/security/advisories/mfsa2017-12/"
}, },
{ {
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-13/", "name": "https://www.mozilla.org/security/advisories/mfsa2017-11/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-13/" "url": "https://www.mozilla.org/security/advisories/mfsa2017-11/"
}, },
{ {
"name" : "DSA-3831", "name": "https://www.mozilla.org/security/advisories/mfsa2017-10/",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "https://www.debian.org/security/2017/dsa-3831" "url": "https://www.mozilla.org/security/advisories/mfsa2017-10/"
},
{
"name" : "RHSA-2017:1104",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1104"
},
{
"name" : "RHSA-2017:1106",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1106"
},
{
"name" : "RHSA-2017:1201",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1201"
}, },
{ {
"name": "97940", "name": "97940",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/97940" "url": "http://www.securityfocus.com/bid/97940"
}, },
{
"name": "DSA-3831",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3831"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-13/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-13/"
},
{ {
"name": "1038320", "name": "1038320",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038320" "url": "http://www.securitytracker.com/id/1038320"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1350683",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1350683"
},
{
"name": "RHSA-2017:1104",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1104"
},
{
"name": "RHSA-2017:1201",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1201"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-5525", "ID": "CVE-2017-5525",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20170118 CVE request Qemu: audio: memory leakage in ac97 device",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/01/17/19"
},
{ {
"name": "[oss-security] 20170118 Re: CVE request Qemu: audio: memory leakage in ac97 device", "name": "[oss-security] 20170118 Re: CVE request Qemu: audio: memory leakage in ac97 device",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,11 +62,6 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html" "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
}, },
{
"name" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=12351a91da97b414eec8cdb09f1d9f41e535a401",
"refsource" : "CONFIRM",
"url" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=12351a91da97b414eec8cdb09f1d9f41e535a401"
},
{ {
"name": "GLSA-201702-28", "name": "GLSA-201702-28",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -81,6 +71,16 @@
"name": "95671", "name": "95671",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95671" "url": "http://www.securityfocus.com/bid/95671"
},
{
"name": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=12351a91da97b414eec8cdb09f1d9f41e535a401",
"refsource": "CONFIRM",
"url": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=12351a91da97b414eec8cdb09f1d9f41e535a401"
},
{
"name": "[oss-security] 20170118 CVE request Qemu: audio: memory leakage in ac97 device",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/01/17/19"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-5580", "ID": "CVE-2017-5580",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20170124 CVE request Virglrenderer: OOB access while parsing texture instruction", "name": "GLSA-201707-06",
"refsource" : "MLIST", "refsource": "GENTOO",
"url" : "http://www.openwall.com/lists/oss-security/2017/01/24/5" "url": "https://security.gentoo.org/glsa/201707-06"
},
{
"name" : "[oss-security] 20170125 Re: CVE request Virglrenderer: OOB access while parsing texture instruction",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/01/25/5"
}, },
{ {
"name": "[virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0", "name": "[virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0",
@ -72,15 +67,20 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa" "url": "https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa"
}, },
{
"name" : "GLSA-201707-06",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201707-06"
},
{ {
"name": "95782", "name": "95782",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95782" "url": "http://www.securityfocus.com/bid/95782"
},
{
"name": "[oss-security] 20170124 CVE request Virglrenderer: OOB access while parsing texture instruction",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/01/24/5"
},
{
"name": "[oss-security] 20170125 Re: CVE request Virglrenderer: OOB access while parsing texture instruction",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/01/25/5"
} }
] ]
} }