"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:01:27 +00:00
parent afa014096c
commit df1a0ba43d
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 4030 additions and 4030 deletions

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "ASB01-02",
"refsource" : "ALLAIRE",
"url" : "http://www.allaire.com/handlers/index.cfm?ID=19546&Method=Full"
},
{ {
"name": "jrun-webinf-file-retrieval(6008)", "name": "jrun-webinf-file-retrieval(6008)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6008" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6008"
},
{
"name": "ASB01-02",
"refsource": "ALLAIRE",
"url": "http://www.allaire.com/handlers/index.cfm?ID=19546&Method=Full"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20010617 Buffer Overflow in GazTek HTTP Daemon v1.4 (ghttpd)",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=99279182704674&w=2"
},
{
"name" : "20010630 Advisory Ghttp 1.4",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=99406263214417&w=2"
},
{
"name" : "gaztek-ghttpd-bo(6702)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6702"
},
{ {
"name": "2879", "name": "2879",
"refsource": "BID", "refsource": "BID",
@ -76,6 +61,21 @@
"name": "2965", "name": "2965",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/2965" "url": "http://www.securityfocus.com/bid/2965"
},
{
"name": "20010617 Buffer Overflow in GazTek HTTP Daemon v1.4 (ghttpd)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=99279182704674&w=2"
},
{
"name": "gaztek-ghttpd-bo(6702)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6702"
},
{
"name": "20010630 Advisory Ghttp 1.4",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=99406263214417&w=2"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060425 Instant Photo Gallery <= Multiple XSS", "name": "24985",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/archive/1/432024/100/0/threaded" "url": "http://www.osvdb.org/24985"
},
{
"name" : "20060427 Re: Instant Photo Gallery <= Multiple XSS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432241/100/0/threaded"
}, },
{ {
"name": "20060427 Instant Photo Gallery <= Multiple XSS (fwd)", "name": "20060427 Instant Photo Gallery <= Multiple XSS (fwd)",
@ -72,15 +67,20 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/17696" "url": "http://www.securityfocus.com/bid/17696"
}, },
{
"name" : "24985",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24985"
},
{ {
"name": "803", "name": "803",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/803" "url": "http://securityreason.com/securityalert/803"
},
{
"name": "20060427 Re: Instant Photo Gallery <= Multiple XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432241/100/0/threaded"
},
{
"name": "20060425 Instant Photo Gallery <= Multiple XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432024/100/0/threaded"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBST02112", "name": "ADV-2006-1458",
"refsource" : "HP", "refsource": "VUPEN",
"url" : "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00642089" "url": "http://www.vupen.com/english/advisories/2006/1458"
},
{
"name": "1015969",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015969"
}, },
{ {
"name": "SSRT061129", "name": "SSRT061129",
@ -68,24 +73,19 @@
"url": "http://www.securityfocus.com/bid/17638" "url": "http://www.securityfocus.com/bid/17638"
}, },
{ {
"name" : "ADV-2006-1458", "name": "hp-storageworks-win-dos(25939)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2006/1458" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25939"
}, },
{ {
"name" : "1015969", "name": "HPSBST02112",
"refsource" : "SECTRACK", "refsource": "HP",
"url" : "http://securitytracker.com/id?1015969" "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00642089"
}, },
{ {
"name": "19752", "name": "19752",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19752" "url": "http://secunia.com/advisories/19752"
},
{
"name" : "hp-storageworks-win-dos(25939)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25939"
} }
] ]
} }

View File

@ -52,26 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://pridels0.blogspot.com/2006/05/cyberbuild-vuln.html",
"refsource" : "MISC",
"url" : "http://pridels0.blogspot.com/2006/05/cyberbuild-vuln.html"
},
{
"name" : "17829",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17829"
},
{ {
"name": "ADV-2006-1630", "name": "ADV-2006-1630",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1630" "url": "http://www.vupen.com/english/advisories/2006/1630"
}, },
{
"name" : "25197",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/25197"
},
{ {
"name": "25198", "name": "25198",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -83,14 +68,29 @@
"url": "http://www.osvdb.org/25199" "url": "http://www.osvdb.org/25199"
}, },
{ {
"name" : "19889", "name": "25197",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/19889" "url": "http://www.osvdb.org/25197"
},
{
"name": "http://pridels0.blogspot.com/2006/05/cyberbuild-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2006/05/cyberbuild-vuln.html"
},
{
"name": "17829",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17829"
}, },
{ {
"name": "cyberbuild-multiple-xss(26202)", "name": "cyberbuild-multiple-xss(26202)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26202" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26202"
},
{
"name": "19889",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19889"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060512 Multiple vulnerabilities in Raydium rev 309",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/433930/100/0/threaded"
},
{
"name" : "http://aluigi.altervista.org/adv/raydiumx-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/raydiumx-adv.txt"
},
{ {
"name": "17986", "name": "17986",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/17986" "url": "http://www.securityfocus.com/bid/17986"
}, },
{
"name" : "ADV-2006-1808",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1808"
},
{ {
"name": "20097", "name": "20097",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20097" "url": "http://secunia.com/advisories/20097"
}, },
{ {
"name" : "900", "name": "ADV-2006-1808",
"refsource" : "SREASON", "refsource": "VUPEN",
"url" : "http://securityreason.com/securityalert/900" "url": "http://www.vupen.com/english/advisories/2006/1808"
},
{
"name": "http://aluigi.altervista.org/adv/raydiumx-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/raydiumx-adv.txt"
}, },
{ {
"name": "raydium-raydiumnetworkread-bo(26516)", "name": "raydium-raydiumnetworkread-bo(26516)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26516" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26516"
},
{
"name": "20060512 Multiple vulnerabilities in Raydium rev 309",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/433930/100/0/threaded"
},
{
"name": "900",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/900"
} }
] ]
} }

View File

@ -62,6 +62,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/18184" "url": "http://www.securityfocus.com/bid/18184"
}, },
{
"name": "4nforum-modules-sql-injection(26729)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26729"
},
{ {
"name": "ADV-2006-2061", "name": "ADV-2006-2061",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -76,11 +81,6 @@
"name": "20374", "name": "20374",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20374" "url": "http://secunia.com/advisories/20374"
},
{
"name" : "4nforum-modules-sql-injection(26729)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26729"
} }
] ]
} }

View File

@ -58,30 +58,30 @@
"url": "http://www.securityfocus.com/archive/1/435746/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/435746/100/0/threaded"
}, },
{ {
"name" : "ADV-2006-2208", "name": "20485",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2006/2208" "url": "http://secunia.com/advisories/20485"
},
{
"name" : "26237",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26237"
}, },
{ {
"name": "1009549", "name": "1009549",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1009549" "url": "http://securitytracker.com/id?1009549"
}, },
{
"name" : "20485",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20485"
},
{ {
"name": "1025", "name": "1025",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1025" "url": "http://securityreason.com/securityalert/1025"
}, },
{
"name": "26237",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26237"
},
{
"name": "ADV-2006-2208",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2208"
},
{ {
"name": "ashopkart-database-file-access(15599)", "name": "ashopkart-database-file-access(15599)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060620 ULtimate PHP Board <= 1.96 GOLD Code Execution (exploit code)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/437875/100/0/threaded"
},
{ {
"name": "http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt", "name": "http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt",
"refsource": "MISC", "refsource": "MISC",
@ -66,6 +61,11 @@
"name": "1138", "name": "1138",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1138" "url": "http://securityreason.com/securityalert/1138"
},
{
"name": "20060620 ULtimate PHP Board <= 1.96 GOLD Code Execution (exploit code)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/437875/100/0/threaded"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "30454", "name": "selenium-server-uspecified-xss(30313)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://www.osvdb.org/30454" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30313"
}, },
{ {
"name": "22927", "name": "22927",
@ -63,9 +63,9 @@
"url": "http://secunia.com/advisories/22927" "url": "http://secunia.com/advisories/22927"
}, },
{ {
"name" : "selenium-server-uspecified-xss(30313)", "name": "30454",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30313" "url": "http://www.osvdb.org/30454"
} }
] ]
} }

View File

@ -52,25 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061203 Vt-Forum Lite System V.1.3 Xss Vuln.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/453452/100/0/threaded"
},
{ {
"name": "21428", "name": "21428",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/21428" "url": "http://www.securityfocus.com/bid/21428"
}, },
{ {
"name" : "ADV-2006-4850", "name": "20061203 Vt-Forum Lite System V.1.3 Xss Vuln.",
"refsource" : "VUPEN", "refsource": "BUGTRAQ",
"url" : "http://www.vupen.com/english/advisories/2006/4850" "url": "http://www.securityfocus.com/archive/1/453452/100/0/threaded"
},
{
"name" : "23226",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23226"
}, },
{ {
"name": "2011", "name": "2011",
@ -81,6 +71,16 @@
"name": "vtforum-multiple-xss(30725)", "name": "vtforum-multiple-xss(30725)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30725" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30725"
},
{
"name": "23226",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23226"
},
{
"name": "ADV-2006-4850",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4850"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061012 maluinfo version 206.2.38l Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/448639/100/0/threaded"
},
{ {
"name": "20507", "name": "20507",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/20507" "url": "http://www.securityfocus.com/bid/20507"
}, },
{
"name" : "2380",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2380"
},
{ {
"name": "maluinfo-bbusage-file-include(29516)", "name": "maluinfo-bbusage-file-include(29516)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29516" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29516"
},
{
"name": "20061012 maluinfo version 206.2.38l Remote File Include Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/448639/100/0/threaded"
},
{
"name": "2380",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2380"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0212", "ID": "CVE-2011-0212",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0233", "ID": "CVE-2011-0233",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT4808",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4808"
},
{ {
"name": "http://support.apple.com/kb/HT4981", "name": "http://support.apple.com/kb/HT4981",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4981" "url": "http://support.apple.com/kb/HT4981"
}, },
{ {
"name" : "http://support.apple.com/kb/HT4999", "name": "APPLE-SA-2011-10-12-1",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4999"
},
{
"name" : "APPLE-SA-2011-07-20-1",
"refsource": "APPLE", "refsource": "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
}, },
{ {
"name": "APPLE-SA-2011-10-11-1", "name": "APPLE-SA-2011-10-11-1",
@ -78,9 +68,19 @@
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html"
}, },
{ {
"name" : "APPLE-SA-2011-10-12-1", "name": "http://support.apple.com/kb/HT4999",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4999"
},
{
"name": "http://support.apple.com/kb/HT4808",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4808"
},
{
"name": "APPLE-SA-2011-07-20-1",
"refsource": "APPLE", "refsource": "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-0698", "ID": "CVE-2011-0698",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2011-0439",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0439"
},
{ {
"name": "[oss-security] 20110209 Django multiple flaws (CVEs inside)", "name": "[oss-security] 20110209 Django multiple flaws (CVEs inside)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/02/09/6" "url": "http://openwall.com/lists/oss-security/2011/02/09/6"
}, },
{
"name" : "http://www.djangoproject.com/weblog/2011/feb/08/security/",
"refsource" : "CONFIRM",
"url" : "http://www.djangoproject.com/weblog/2011/feb/08/security/"
},
{
"name" : "MDVSA-2011:031",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031"
},
{
"name" : "46296",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46296"
},
{ {
"name": "43230", "name": "43230",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -83,9 +73,19 @@
"url": "http://www.vupen.com/english/advisories/2011/0372" "url": "http://www.vupen.com/english/advisories/2011/0372"
}, },
{ {
"name" : "ADV-2011-0439", "name": "46296",
"refsource" : "VUPEN", "refsource": "BID",
"url" : "http://www.vupen.com/english/advisories/2011/0439" "url": "http://www.securityfocus.com/bid/46296"
},
{
"name": "MDVSA-2011:031",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031"
},
{
"name": "http://www.djangoproject.com/weblog/2011/feb/08/security/",
"refsource": "CONFIRM",
"url": "http://www.djangoproject.com/weblog/2011/feb/08/security/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2426", "ID": "CVE-2011-2426",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-26.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-26.html"
},
{
"name" : "RHSA-2011:1333",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1333.html"
},
{
"name" : "SUSE-SU-2011:1063",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00025.html"
},
{
"name" : "oval:org.mitre.oval:def:14070",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14070"
},
{ {
"name": "oval:org.mitre.oval:def:15366", "name": "oval:org.mitre.oval:def:15366",
"refsource": "OVAL", "refsource": "OVAL",
@ -81,6 +61,26 @@
"name": "48308", "name": "48308",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48308" "url": "http://secunia.com/advisories/48308"
},
{
"name": "oval:org.mitre.oval:def:14070",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14070"
},
{
"name": "SUSE-SU-2011:1063",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00025.html"
},
{
"name": "RHSA-2011:1333",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1333.html"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-26.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-26.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.contextis.com/resources/blog/webgl/", "name": "48319",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://www.contextis.com/resources/blog/webgl/" "url": "http://www.securityfocus.com/bid/48319"
}, },
{ {
"name": "http://www.contextis.com/resources/blog/webgl2/", "name": "http://www.contextis.com/resources/blog/webgl2/",
@ -63,9 +63,9 @@
"url": "http://www.contextis.com/resources/blog/webgl2/" "url": "http://www.contextis.com/resources/blog/webgl2/"
}, },
{ {
"name" : "48319", "name": "http://www.contextis.com/resources/blog/webgl/",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/48319" "url": "http://www.contextis.com/resources/blog/webgl/"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20110627 Arbitrary files deletion in Novell File Reporter 1.0.4.2",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/518626/100/0/threaded"
},
{
"name" : "http://aluigi.org/adv/nfr_2-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.org/adv/nfr_2-adv.txt"
},
{ {
"name": "1025716", "name": "1025716",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -72,6 +62,16 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45071" "url": "http://secunia.com/advisories/45071"
}, },
{
"name": "http://aluigi.org/adv/nfr_2-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.org/adv/nfr_2-adv.txt"
},
{
"name": "20110627 Arbitrary files deletion in Novell File Reporter 1.0.4.2",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/518626/100/0/threaded"
},
{ {
"name": "8309", "name": "8309",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2011-2852", "ID": "CVE-2011-2852",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=91120",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=91120"
},
{
"name" : "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"name" : "75553",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/75553"
},
{ {
"name": "oval:org.mitre.oval:def:14551", "name": "oval:org.mitre.oval:def:14551",
"refsource": "OVAL", "refsource": "OVAL",
@ -76,6 +61,21 @@
"name": "chrome-v8-code-execution(69879)", "name": "chrome-v8-code-execution(69879)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69879" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69879"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=91120",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=91120"
},
{
"name": "75553",
"refsource": "OSVDB",
"url": "http://osvdb.org/75553"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://service.real.com/realplayer/security/08162011_player/en/",
"refsource" : "CONFIRM",
"url" : "http://service.real.com/realplayer/security/08162011_player/en/"
},
{ {
"name": "1025943", "name": "1025943",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025943" "url": "http://www.securitytracker.com/id?1025943"
},
{
"name": "http://service.real.com/realplayer/security/08162011_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/08162011_player/en/"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.cnvd.org.cn/vulnerability/CNVD-2011-05348",
"refsource" : "MISC",
"url" : "http://www.cnvd.org.cn/vulnerability/CNVD-2011-05348"
},
{ {
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-167-01.pdf", "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-167-01.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-167-01.pdf" "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-167-01.pdf"
}, },
{
"name" : "http://www.sunwayland.com.cn/news_info_.asp?Nid=3593",
"refsource" : "CONFIRM",
"url" : "http://www.sunwayland.com.cn/news_info_.asp?Nid=3593"
},
{
"name" : "73123",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/73123"
},
{ {
"name": "1025673", "name": "1025673",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025673" "url": "http://securitytracker.com/id?1025673"
}, },
{
"name": "73123",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/73123"
},
{
"name": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-05348",
"refsource": "MISC",
"url": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-05348"
},
{ {
"name": "44990", "name": "44990",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44990" "url": "http://secunia.com/advisories/44990"
},
{
"name": "http://www.sunwayland.com.cn/news_info_.asp?Nid=3593",
"refsource": "CONFIRM",
"url": "http://www.sunwayland.com.cn/news_info_.asp?Nid=3593"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-3509", "ID": "CVE-2011-3509",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3602", "ID": "CVE-2011-3602",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,9 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2011/10/06/3" "url": "http://www.openwall.com/lists/oss-security/2011/10/06/3"
}, },
{ {
"name" : "http://www.litech.org/radvd/CHANGES", "name": "DSA-2323",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "http://www.litech.org/radvd/CHANGES" "url": "http://www.debian.org/security/2011/dsa-2323"
}, },
{ {
"name": "https://github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc", "name": "https://github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc",
@ -68,9 +68,9 @@
"url": "https://github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc" "url": "https://github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc"
}, },
{ {
"name" : "DSA-2323", "name": "http://www.litech.org/radvd/CHANGES",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2011/dsa-2323" "url": "http://www.litech.org/radvd/CHANGES"
}, },
{ {
"name": "USN-1257-1", "name": "USN-1257-1",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2011-3971", "ID": "CVE-2011-3971",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=110374",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=110374"
},
{
"name" : "http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html"
},
{
"name" : "http://support.apple.com/kb/HT5400",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5400"
},
{ {
"name": "http://support.apple.com/kb/HT5485", "name": "http://support.apple.com/kb/HT5485",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5485" "url": "http://support.apple.com/kb/HT5485"
}, },
{
"name" : "http://support.apple.com/kb/HT5503",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5503"
},
{
"name" : "APPLE-SA-2012-07-25-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
},
{
"name" : "APPLE-SA-2012-09-12-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{ {
"name": "APPLE-SA-2012-09-19-1", "name": "APPLE-SA-2012-09-19-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
}, },
{
"name": "http://support.apple.com/kb/HT5503",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5503"
},
{ {
"name": "oval:org.mitre.oval:def:14960", "name": "oval:org.mitre.oval:def:14960",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14960" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14960"
},
{
"name": "http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=110374",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=110374"
},
{
"name": "APPLE-SA-2012-09-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"name": "APPLE-SA-2012-07-25-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT5400",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5400"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4098", "ID": "CVE-2011-4098",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[cluster-devel] 20110912 [PATCH] GFS2: rewrite fallocate code to write blocks directly",
"refsource" : "MLIST",
"url" : "https://www.redhat.com/archives/cluster-devel/2011-September/msg00064.html"
},
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=64dd153c83743af81f20924c6343652d731eeecb", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=64dd153c83743af81f20924c6343652d731eeecb",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=64dd153c83743af81f20924c6343652d731eeecb" "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=64dd153c83743af81f20924c6343652d731eeecb"
}, },
{ {
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.2.bz2", "name": "https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=fadca7bdc43b02f518585d9547019966415cadfd",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.2.bz2" "url": "https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=fadca7bdc43b02f518585d9547019966415cadfd"
},
{
"name": "[cluster-devel] 20110912 [PATCH] GFS2: rewrite fallocate code to write blocks directly",
"refsource": "MLIST",
"url": "https://www.redhat.com/archives/cluster-devel/2011-September/msg00064.html"
}, },
{ {
"name": "https://github.com/torvalds/linux/commit/64dd153c83743af81f20924c6343652d731eeecb", "name": "https://github.com/torvalds/linux/commit/64dd153c83743af81f20924c6343652d731eeecb",
@ -73,9 +73,9 @@
"url": "https://github.com/torvalds/linux/commit/64dd153c83743af81f20924c6343652d731eeecb" "url": "https://github.com/torvalds/linux/commit/64dd153c83743af81f20924c6343652d731eeecb"
}, },
{ {
"name" : "https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=fadca7bdc43b02f518585d9547019966415cadfd", "name": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.2.bz2",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=fadca7bdc43b02f518585d9547019966415cadfd" "url": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.2.bz2"
} }
] ]
} }

View File

@ -57,11 +57,26 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html" "url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html"
}, },
{
"name": "49259",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49259"
},
{
"name": "82136",
"refsource": "OSVDB",
"url": "http://osvdb.org/82136"
},
{ {
"name": "[rt-announce] 20120522 RT 4.0.6 Released - Security Release", "name": "[rt-announce] 20120522 RT 4.0.6 Released - Security Release",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html" "url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html"
}, },
{
"name": "rt-unspecified-sql-injection(75824)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75824"
},
{ {
"name": "[rt-announce] 20120522 Security vulnerabilities in RT", "name": "[rt-announce] 20120522 Security vulnerabilities in RT",
"refsource": "MLIST", "refsource": "MLIST",
@ -71,21 +86,6 @@
"name": "53660", "name": "53660",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/53660" "url": "http://www.securityfocus.com/bid/53660"
},
{
"name" : "82136",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/82136"
},
{
"name" : "49259",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/49259"
},
{
"name" : "rt-unspecified-sql-injection(75824)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75824"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-1030", "ID": "CVE-2013-1030",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT5880",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5880"
},
{ {
"name": "APPLE-SA-2013-09-12-1", "name": "APPLE-SA-2013-09-12-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"name": "http://support.apple.com/kb/HT5880",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5880"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1257", "ID": "CVE-2013-1257",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016"
}, },
{
"name" : "TA13-043B",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
},
{ {
"name": "oval:org.mitre.oval:def:16176", "name": "oval:org.mitre.oval:def:16176",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16176" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16176"
},
{
"name": "TA13-043B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-1380", "ID": "CVE-2013-1380",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "SUSE-SU-2013:0670",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html"
},
{ {
"name": "http://www.adobe.com/support/security/bulletins/apsb13-11.html", "name": "http://www.adobe.com/support/security/bulletins/apsb13-11.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,11 +72,6 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0730.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-0730.html"
}, },
{
"name" : "SUSE-SU-2013:0670",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html"
},
{ {
"name": "openSUSE-SU-2013:0672", "name": "openSUSE-SU-2013:0672",
"refsource": "SUSE", "refsource": "SUSE",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2013-5350", "ID": "CVE-2013-5350",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://secunia.com/secunia_research/2014-1/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2014-1/"
},
{ {
"name": "https://www.openpne.jp/archives/12293/", "name": "https://www.openpne.jp/archives/12293/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,15 +62,20 @@
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN69986880/index.html" "url": "http://jvn.jp/en/jp/JVN69986880/index.html"
}, },
{
"name" : "JVNDB-2014-000009",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000009"
},
{ {
"name": "54043", "name": "54043",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54043" "url": "http://secunia.com/advisories/54043"
},
{
"name": "http://secunia.com/secunia_research/2014-1/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2014-1/"
},
{
"name": "JVNDB-2014-000009",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000009"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5828", "ID": "CVE-2013-5828",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{ {
"name": "55322", "name": "55322",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55322" "url": "http://secunia.com/advisories/55322"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5831", "ID": "CVE-2013-5831",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html", "name": "RHSA-2014:0414",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" "url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "http://support.apple.com/kb/HT5982",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5982"
},
{
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name" : "APPLE-SA-2013-10-15-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"name" : "HPSBUX02943",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
},
{
"name" : "HPSBUX02944",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
}, },
{ {
"name": "RHSA-2013:1440", "name": "RHSA-2013:1440",
@ -93,44 +63,74 @@
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
}, },
{ {
"name" : "RHSA-2013:1507", "name": "63129",
"refsource" : "REDHAT", "refsource": "BID",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1507.html" "url": "http://www.securityfocus.com/bid/63129"
}, },
{ {
"name": "RHSA-2013:1508", "name": "RHSA-2013:1508",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
}, },
{
"name" : "RHSA-2013:1793",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name" : "RHSA-2014:0414",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
},
{ {
"name": "SUSE-SU-2013:1677", "name": "SUSE-SU-2013:1677",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
}, },
{ {
"name" : "63129", "name": "HPSBUX02944",
"refsource" : "BID", "refsource": "HP",
"url" : "http://www.securityfocus.com/bid/63129" "url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name": "HPSBUX02943",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
}, },
{ {
"name": "oval:org.mitre.oval:def:19122", "name": "oval:org.mitre.oval:def:19122",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19122" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19122"
}, },
{
"name": "RHSA-2013:1793",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "APPLE-SA-2013-10-15-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"name": "RHSA-2013:1507",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"name": "http://support.apple.com/kb/HT5982",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5982"
},
{ {
"name": "56338", "name": "56338",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56338" "url": "http://secunia.com/advisories/56338"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2120", "ID": "CVE-2014-2120",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1029935",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029935"
},
{ {
"name": "20140318 Cisco Adaptive Security Appliance WebVPN Login Page Cross-Site Scripting Vulnerability", "name": "20140318 Cisco Adaptive Security Appliance WebVPN Login Page Cross-Site Scripting Vulnerability",
"refsource": "CISCO", "refsource": "CISCO",
@ -61,11 +66,6 @@
"name": "66290", "name": "66290",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/66290" "url": "http://www.securityfocus.com/bid/66290"
},
{
"name" : "1029935",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029935"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2144", "ID": "CVE-2014-2144",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2147", "ID": "CVE-2014-2147",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -67,15 +67,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/72551" "url": "http://www.securityfocus.com/bid/72551"
}, },
{
"name" : "1031715",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031715"
},
{ {
"name": "cisco-prime-cve20142147-xfs(100755)", "name": "cisco-prime-cve20142147-xfs(100755)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100755" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100755"
},
{
"name": "1031715",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031715"
} }
] ]
} }

View File

@ -52,16 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "33069",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/33069"
},
{ {
"name": "http://packetstormsecurity.com/files/126337/Wireshark-1.8.12-1.10.5-wiretap-mpeg.c-Stack-Buffer-Overflow.html", "name": "http://packetstormsecurity.com/files/126337/Wireshark-1.8.12-1.10.5-wiretap-mpeg.c-Stack-Buffer-Overflow.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/126337/Wireshark-1.8.12-1.10.5-wiretap-mpeg.c-Stack-Buffer-Overflow.html" "url": "http://packetstormsecurity.com/files/126337/Wireshark-1.8.12-1.10.5-wiretap-mpeg.c-Stack-Buffer-Overflow.html"
}, },
{
"name": "104199",
"refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/104199"
},
{
"name": "57489",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57489"
},
{
"name": "RHSA-2014:0341",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html"
},
{
"name": "57480",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57480"
},
{ {
"name": "http://www.wireshark.org/security/wnpa-sec-2014-04.html", "name": "http://www.wireshark.org/security/wnpa-sec-2014-04.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -73,24 +88,9 @@
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9843" "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9843"
}, },
{ {
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=f567435ac7140c96a5de56dbce3d5e7659af4d09", "name": "33069",
"refsource" : "CONFIRM", "refsource": "EXPLOIT-DB",
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=f567435ac7140c96a5de56dbce3d5e7659af4d09" "url": "http://www.exploit-db.com/exploits/33069"
},
{
"name" : "DSA-2871",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2871"
},
{
"name" : "RHSA-2014:0341",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0341.html"
},
{
"name" : "RHSA-2014:0342",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0342.html"
}, },
{ {
"name": "openSUSE-SU-2014:0382", "name": "openSUSE-SU-2014:0382",
@ -98,19 +98,9 @@
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html"
}, },
{ {
"name" : "openSUSE-SU-2014:0383", "name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=f567435ac7140c96a5de56dbce3d5e7659af4d09",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html" "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=f567435ac7140c96a5de56dbce3d5e7659af4d09"
},
{
"name" : "66066",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/66066"
},
{
"name" : "104199",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/show/osvdb/104199"
}, },
{ {
"name": "1029907", "name": "1029907",
@ -118,14 +108,24 @@
"url": "http://www.securitytracker.com/id/1029907" "url": "http://www.securitytracker.com/id/1029907"
}, },
{ {
"name" : "57480", "name": "openSUSE-SU-2014:0383",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/57480" "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html"
}, },
{ {
"name" : "57489", "name": "DSA-2871",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/57489" "url": "http://www.debian.org/security/2014/dsa-2871"
},
{
"name": "RHSA-2014:0342",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0342.html"
},
{
"name": "66066",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66066"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-2814", "ID": "CVE-2014-2814",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS14-042", "name": "59780",
"refsource" : "MS", "refsource": "SECUNIA",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-042" "url": "http://secunia.com/advisories/59780"
},
{
"name" : "297262",
"refsource" : "MSKB",
"url" : "https://support.microsoft.com/kb/2972621"
}, },
{ {
"name": "68393", "name": "68393",
@ -73,9 +68,14 @@
"url": "http://www.securitytracker.com/id/1030538" "url": "http://www.securitytracker.com/id/1030538"
}, },
{ {
"name" : "59780", "name": "297262",
"refsource" : "SECUNIA", "refsource": "MSKB",
"url" : "http://secunia.com/advisories/59780" "url": "https://support.microsoft.com/kb/2972621"
},
{
"name": "MS14-042",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-042"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-6344", "ID": "CVE-2014-6344",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS14-065", "name": "1031185",
"refsource" : "MS", "refsource": "SECTRACK",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065" "url": "http://www.securitytracker.com/id/1031185"
}, },
{ {
"name": "70346", "name": "70346",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/70346" "url": "http://www.securityfocus.com/bid/70346"
}, },
{ {
"name" : "1031185", "name": "MS14-065",
"refsource" : "SECTRACK", "refsource": "MS",
"url" : "http://www.securitytracker.com/id/1031185" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-6468", "ID": "CVE-2014-6468",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", "name": "61609",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" "url": "http://secunia.com/advisories/61609"
}, },
{ {
"name" : "http://linux.oracle.com/errata/ELSA-2014-1636", "name": "61928",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://linux.oracle.com/errata/ELSA-2014-1636" "url": "http://secunia.com/advisories/61928"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21692299",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21692299"
},
{
"name" : "GLSA-201502-12",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201502-12.xml"
},
{
"name" : "RHSA-2014:1636",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1636.html"
}, },
{ {
"name": "70488", "name": "70488",
@ -88,14 +73,29 @@
"url": "http://secunia.com/advisories/60416" "url": "http://secunia.com/advisories/60416"
}, },
{ {
"name" : "61609", "name": "RHSA-2014:1636",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/61609" "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html"
}, },
{ {
"name" : "61928", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/61928" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-1636",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2014-1636"
},
{
"name": "GLSA-201502-12",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21692299",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692299"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-6575", "ID": "CVE-2014-6575",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{ {
"name": "1031583", "name": "1031583",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031583" "url": "http://www.securitytracker.com/id/1031583"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6791", "ID": "CVE-2014-6791",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#322809", "name": "VU#322809",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0134" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0134"
}, },
{
"name" : "96687",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96687"
},
{ {
"name": "1038006", "name": "1038006",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038006" "url": "http://www.securitytracker.com/id/1038006"
},
{
"name": "96687",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96687"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2017-0468", "ID": "CVE-2017-0468",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -66,15 +66,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01" "url": "https://source.android.com/security/bulletin/2017-03-01"
}, },
{
"name" : "96717",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96717"
},
{ {
"name": "1037968", "name": "1037968",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037968" "url": "http://www.securitytracker.com/id/1037968"
},
{
"name": "96717",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96717"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16461", "ID": "CVE-2017-16461",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -109,14 +109,9 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859"
}, },
{ {
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22013375", "name": "103130",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22013375" "url": "http://www.securityfocus.com/bid/103130"
},
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22012828",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22012828"
}, },
{ {
"name": "http://www.ibm.com/support/docview.wss?uid=swg22013432", "name": "http://www.ibm.com/support/docview.wss?uid=swg22013432",
@ -124,9 +119,14 @@
"url": "http://www.ibm.com/support/docview.wss?uid=swg22013432" "url": "http://www.ibm.com/support/docview.wss?uid=swg22013432"
}, },
{ {
"name" : "103130", "name": "http://www.ibm.com/support/docview.wss?uid=swg22012828",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/103130" "url": "http://www.ibm.com/support/docview.wss?uid=swg22012828"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22013375",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22013375"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1820", "ID": "CVE-2017-1820",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4084", "ID": "CVE-2017-4084",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4286", "ID": "CVE-2017-4286",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4372", "ID": "CVE-2017-4372",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4432", "ID": "CVE-2017-4432",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4482", "ID": "CVE-2017-4482",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {