"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:54:48 +00:00
parent 12b54f3847
commit e9538fac23
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
62 changed files with 3835 additions and 3830 deletions

View File

@ -53,20 +53,30 @@
"references": {
"reference_data": [
{
"name" : "http://pridels0.blogspot.com/2006/06/phpmydirectory-xss-vuln.html",
"refsource" : "MISC",
"url" : "http://pridels0.blogspot.com/2006/06/phpmydirectory-xss-vuln.html"
},
{
"name" : "18539",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18539"
"name": "26671",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26671"
},
{
"name": "ADV-2006-2427",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2427"
},
{
"name": "http://pridels0.blogspot.com/2006/06/phpmydirectory-xss-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2006/06/phpmydirectory-xss-vuln.html"
},
{
"name": "phpmydirectory-multiple-scripts-xss(27211)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27211"
},
{
"name": "18539",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18539"
},
{
"name": "26669",
"refsource": "OSVDB",
@ -77,20 +87,10 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26670"
},
{
"name" : "26671",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26671"
},
{
"name": "20718",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20718"
},
{
"name" : "phpmydirectory-multiple-scripts-xss(27211)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27211"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20060629 NewsPHP 2006 PRO XSS SQL injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/438858/100/0/threaded"
"name": "newsphp-rssfeed-sql-injection(27509)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27509"
},
{
"name": "18726",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18726"
},
{
"name" : "26978",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26978"
},
{
"name": "1188",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1188"
},
{
"name" : "newsphp-rssfeed-sql-injection(27509)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27509"
"name": "20060629 NewsPHP 2006 PRO XSS SQL injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/438858/100/0/threaded"
},
{
"name": "26978",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26978"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "mybb-user-groups-unspecified(27446)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27446"
},
{
"name": "http://community.mybboard.net/showthread.php?tid=10115",
"refsource": "CONFIRM",
@ -71,11 +76,6 @@
"name": "20873",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20873"
},
{
"name" : "mybb-user-groups-unspecified(27446)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27446"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443171/100/0/threaded"
},
{
"name" : "1413",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1413"
},
{
"name": "virtualwar-calendar-xss(28552)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28552"
},
{
"name": "1413",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1413"
}
]
}

View File

@ -52,60 +52,60 @@
},
"references": {
"reference_data": [
{
"name" : "20060913 Cisco IOS VTP issues",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/445896/100/0/threaded"
},
{
"name" : "20060913 Re: Cisco IOS VTP issues",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/445938/100/0/threaded"
},
{
"name": "http://www.phenoelit.de/stuff/CiscoVTP.txt",
"refsource": "MISC",
"url": "http://www.phenoelit.de/stuff/CiscoVTP.txt"
},
{
"name" : "20060913 Cisco VLAN Trunking Protocol Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml"
},
{
"name" : "VU#821420",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/821420"
},
{
"name" : "19998",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19998"
},
{
"name" : "ADV-2006-3600",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3600"
},
{
"name": "28775",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28775"
},
{
"name" : "1016843",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016843"
},
{
"name": "21896",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21896"
},
{
"name": "19998",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19998"
},
{
"name": "20060913 Cisco VLAN Trunking Protocol Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml"
},
{
"name": "1016843",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016843"
},
{
"name": "20060913 Re: Cisco IOS VTP issues",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/445938/100/0/threaded"
},
{
"name": "VU#821420",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/821420"
},
{
"name": "ADV-2006-3600",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3600"
},
{
"name": "cisco-ios-vtp-version-dos(28924)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28924"
},
{
"name": "20060913 Cisco IOS VTP issues",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/445896/100/0/threaded"
}
]
}

View File

@ -58,24 +58,24 @@
"url": "http://whizzo.uoregon.edu/public/src/alphamail/ChangeLog"
},
{
"name" : "19996",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19996"
"name": "alphamail-logging-password-disclosure(28907)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28907"
},
{
"name": "ADV-2006-3592",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3592"
},
{
"name": "19996",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19996"
},
{
"name": "21871",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21871"
},
{
"name" : "alphamail-logging-password-disclosure(28907)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28907"
}
]
}

View File

@ -52,30 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/453475/100/0/threaded"
},
{
"name" : "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051096.html"
},
{
"name": "http://gleg.net/vulndisco_meta.shtml",
"refsource": "MISC",
"url": "http://gleg.net/vulndisco_meta.shtml"
},
{
"name" : "http://gleg.net/fprot.txt",
"refsource" : "MISC",
"url" : "http://gleg.net/fprot.txt"
},
{
"name" : "2893",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2893"
"name": "23328",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23328"
},
{
"name": "http://www.f-prot.com/news/gen_news/061201_release_unix467.html",
@ -83,19 +68,9 @@
"url": "http://www.f-prot.com/news/gen_news/061201_release_unix467.html"
},
{
"name" : "GLSA-200612-12",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200612-12.xml"
},
{
"name" : "21086",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21086"
},
{
"name" : "ADV-2006-4830",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4830"
"name": "22879",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22879"
},
{
"name": "30406",
@ -108,14 +83,39 @@
"url": "http://securitytracker.com/id?1017331"
},
{
"name" : "22879",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22879"
"name": "21086",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21086"
},
{
"name" : "23328",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23328"
"name": "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/453475/100/0/threaded"
},
{
"name": "http://gleg.net/fprot.txt",
"refsource": "MISC",
"url": "http://gleg.net/fprot.txt"
},
{
"name": "GLSA-200612-12",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200612-12.xml"
},
{
"name": "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051096.html"
},
{
"name": "ADV-2006-4830",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4830"
},
{
"name": "2893",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2893"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-6605",
"STATE": "PUBLIC"
},
@ -52,31 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-75/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name" : "http://www.mailenable.com/hotfix/",
"refsource" : "CONFIRM",
"url" : "http://www.mailenable.com/hotfix/"
},
{
"name" : "21645",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21645"
},
{
"name" : "ADV-2006-5052",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/5052"
},
{
"name": "1017395",
"refsource": "SECTRACK",
@ -91,6 +66,31 @@
"name": "2053",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2053"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"name": "http://secunia.com/secunia_research/2006-75/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
]
}

View File

@ -52,21 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "23376",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23376"
},
{
"name": "sambar-size-dos(30920)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30920"
},
{
"name": "http://www.securityfocus.com/data/vulnerabilities/exploits/21617.php",
"refsource": "MISC",
"url": "http://www.securityfocus.com/data/vulnerabilities/exploits/21617.php"
},
{
"name" : "2934",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2934"
},
{
"name" : "21617",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21617"
},
{
"name": "ADV-2006-5041",
"refsource": "VUPEN",
@ -78,14 +78,14 @@
"url": "http://securitytracker.com/id?1017393"
},
{
"name" : "23376",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23376"
"name": "2934",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2934"
},
{
"name" : "sambar-size-dos(30920)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30920"
"name": "21617",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21617"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20061228 OpenSER OSP Module remote code execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/455412/100/0/threaded"
},
{
"name": "21801",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "openser-validateospheader-bo(31151)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31151"
},
{
"name": "20061228 OpenSER OSP Module remote code execution",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/455412/100/0/threaded"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "2257",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2257"
},
{
"name": "19737",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19737"
},
{
"name": "2257",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2257"
},
{
"name": "cliserv-clheaders-file-include(28590)",
"refsource": "XF",

View File

@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20100521 PHP-Calendar \"description\" and \"lastaction\" Cross Site Scripting Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/511395/100/0/threaded"
},
{
"name" : "http://packetstormsecurity.org/1005-advisories/phpcalendar-xss.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1005-advisories/phpcalendar-xss.txt"
},
{
"name" : "http://php-calendar.blogspot.com/2010/05/php-calendar-20-beta7.html",
"refsource" : "CONFIRM",
"url" : "http://php-calendar.blogspot.com/2010/05/php-calendar-20-beta7.html"
},
{
"name" : "40334",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40334"
},
{
"name" : "33899",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33899"
"name": "phpcalendar-description-xss(58861)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58861"
},
{
"name": "ADV-2010-1202",
@ -83,9 +63,29 @@
"url": "http://www.vupen.com/english/advisories/2010/1202"
},
{
"name" : "phpcalendar-description-xss(58861)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58861"
"name": "20100521 PHP-Calendar \"description\" and \"lastaction\" Cross Site Scripting Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/511395/100/0/threaded"
},
{
"name": "40334",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40334"
},
{
"name": "http://packetstormsecurity.org/1005-advisories/phpcalendar-xss.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1005-advisories/phpcalendar-xss.txt"
},
{
"name": "33899",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33899"
},
{
"name": "http://php-calendar.blogspot.com/2010/05/php-calendar-20-beta7.html",
"refsource": "CONFIRM",
"url": "http://php-calendar.blogspot.com/2010/05/php-calendar-20-beta7.html"
}
]
}

View File

@ -52,21 +52,36 @@
},
"references": {
"reference_data": [
{
"name": "audio-converter-pls-bo(59206)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59206"
},
{
"name": "40081",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40081"
},
{
"name": "13760",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/13760"
},
{
"name" : "13763",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/13763"
"name": "65256",
"refsource": "OSVDB",
"url": "http://osvdb.org/65256"
},
{
"name": "http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-048-d-r-software-multiple-products/",
"refsource": "MISC",
"url": "http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-048-d-r-software-multiple-products/"
},
{
"name": "ADV-2010-1387",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1387"
},
{
"name": "40618",
"refsource": "BID",
@ -78,24 +93,9 @@
"url": "http://www.securityfocus.com/bid/40631"
},
{
"name" : "65256",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/65256"
},
{
"name" : "40081",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40081"
},
{
"name" : "ADV-2010-1387",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1387"
},
{
"name" : "audio-converter-pls-bo(59206)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/59206"
"name": "13763",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/13763"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "14016",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/14016"
},
{
"name" : "15237",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/15237"
},
{
"name": "http://packetstormsecurity.org/1006-exploits/adaptcms200-rfi.txt",
"refsource": "MISC",
@ -76,6 +66,16 @@
"name": "adaptcms-init-file-include(59752)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59752"
},
{
"name": "15237",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15237"
},
{
"name": "14016",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14016"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-0093",
"STATE": "PUBLIC"
},
@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "MS11-008",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-008"
},
{
"name" : "46138",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46138"
},
{
"name": "70829",
"refsource": "OSVDB",
"url": "http://osvdb.org/70829"
},
{
"name" : "oval:org.mitre.oval:def:12469",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12469"
},
{
"name" : "1025043",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025043"
},
{
"name" : "43254",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43254"
},
{
"name": "ADV-2011-0321",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0321"
},
{
"name": "MS11-008",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-008"
},
{
"name": "ms-visio-data-code-execution(64924)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64924"
},
{
"name": "1025043",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025043"
},
{
"name": "46138",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46138"
},
{
"name": "43254",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43254"
},
{
"name": "oval:org.mitre.oval:def:12469",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12469"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0150",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT4554",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4554"
},
{
"name": "http://support.apple.com/kb/HT4564",
"refsource": "CONFIRM",
@ -77,6 +72,11 @@
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT4554",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4554"
},
{
"name": "APPLE-SA-2011-03-09-2",
"refsource": "APPLE",

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "DSA-2168",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2168"
},
{
"name": "46428",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46428"
},
{
"name" : "1025095",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025095"
},
{
"name" : "43371",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43371"
},
{
"name" : "43407",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43407"
"name": "DSA-2168",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2168"
},
{
"name": "ADV-2011-0410",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0410"
},
{
"name": "43371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43371"
},
{
"name": "1025095",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025095"
},
{
"name": "ADV-2011-0411",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0411"
},
{
"name": "43407",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43407"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "15901",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/15901"
},
{
"name": "42790",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42790"
},
{
"name": "15901",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15901"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "IY99978",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1IY99978"
},
{
"name": "43030",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43030"
},
{
"name": "IY99978",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=swg1IY99978"
}
]
}

View File

@ -58,19 +58,9 @@
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21473989"
},
{
"name" : "PM35478",
"name": "PM35611",
"refsource": "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1PM35478"
},
{
"name" : "PM35480",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1PM35480"
},
{
"name" : "PM35545",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1PM35545"
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM35611"
},
{
"name": "PM35609",
@ -78,20 +68,30 @@
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM35609"
},
{
"name" : "PM35611",
"name": "43965",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43965"
},
{
"name": "PM35545",
"refsource": "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1PM35611"
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM35545"
},
{
"name": "PM35480",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM35480"
},
{
"name": "PM35478",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM35478"
},
{
"name": "47122",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47122"
},
{
"name" : "43965",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43965"
},
{
"name": "ADV-2011-0833",
"refsource": "VUPEN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1749",
"STATE": "PUBLIC"
},
@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140425 Re: CVE request: CVE-2011-1089-like flaw in mount.nfs",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/04/25/5"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=697975",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=697975"
},
{
"name": "RHSA-2012:0310",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0310.html"
},
{
"name": "http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils-1.2.4/download",
@ -63,19 +68,14 @@
"url": "http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils-1.2.4/download"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=697975",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=697975"
"name": "[oss-security] 20140425 Re: CVE request: CVE-2011-1089-like flaw in mount.nfs",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/04/25/5"
},
{
"name": "RHSA-2011:1534",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1534.html"
},
{
"name" : "RHSA-2012:0310",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0310.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-4427",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4594",
"STATE": "PUBLIC"
},
@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20111208 Re: CVE Request -- kernel: send(m)msg: user pointer dereferences",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/12/08/4"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bc909d9ddbf7778371e36a651d6e4194b1cc7d4c",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bc909d9ddbf7778371e36a651d6e4194b1cc7d4c"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1",
"name": "https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c",
"refsource": "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
"url": "https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761646",
@ -73,9 +68,14 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761646"
},
{
"name" : "https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1",
"refsource": "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
},
{
"name": "[oss-security] 20111208 Re: CVE Request -- kernel: send(m)msg: user pointer dereferences",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/12/08/4"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4596",
"STATE": "PUBLIC"
},
@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "[openstack] 20111213 [OSSA 2011-001] Path traversal issues registering malicious images using EC2 API (CVE-2011-4596)",
"refsource" : "MLIST",
"url" : "https://lists.launchpad.net/openstack/msg06105.html"
},
{
"name" : "https://bugs.launchpad.net/nova/+bug/885167",
"name": "https://github.com/openstack/nova/commit/ad3241929ea00569c74505ed002208ce360c667e",
"refsource": "CONFIRM",
"url" : "https://bugs.launchpad.net/nova/+bug/885167"
"url": "https://github.com/openstack/nova/commit/ad3241929ea00569c74505ed002208ce360c667e"
},
{
"name": "https://bugs.launchpad.net/nova/+bug/894755",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/nova/+bug/894755"
},
{
"name": "[openstack] 20111213 [OSSA 2011-001] Path traversal issues registering malicious images using EC2 API (CVE-2011-4596)",
"refsource": "MLIST",
"url": "https://lists.launchpad.net/openstack/msg06105.html"
},
{
"name": "https://github.com/openstack/nova/commit/76363226bd8533256f7795bba358d7f4b8a6c9e6",
"refsource": "CONFIRM",
"url": "https://github.com/openstack/nova/commit/76363226bd8533256f7795bba358d7f4b8a6c9e6"
},
{
"name" : "https://github.com/openstack/nova/commit/ad3241929ea00569c74505ed002208ce360c667e",
"name": "https://bugs.launchpad.net/nova/+bug/885167",
"refsource": "CONFIRM",
"url" : "https://github.com/openstack/nova/commit/ad3241929ea00569c74505ed002208ce360c667e"
"url": "https://bugs.launchpad.net/nova/+bug/885167"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2011-4881",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-123456",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,9 +53,19 @@
"references": {
"reference_data": [
{
"name" : "32867",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/32867"
"name": "105708",
"refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/105708"
},
{
"name": "https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/",
"refsource": "MISC",
"url": "https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/"
},
{
"name": "105707",
"refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/105707"
},
{
"name": "20140411 CSRF and stored XSS in Quick Page/Post Redirect Plugin (WordPress plugin)",
@ -68,30 +78,20 @@
"url": "http://packetstormsecurity.com/files/126127"
},
{
"name" : "https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/",
"refsource" : "MISC",
"url" : "https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/"
},
{
"name" : "https://wordpress.org/plugins/quick-pagepost-redirect-plugin/changelog/",
"refsource" : "CONFIRM",
"url" : "https://wordpress.org/plugins/quick-pagepost-redirect-plugin/changelog/"
},
{
"name" : "105707",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/show/osvdb/105707"
},
{
"name" : "105708",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/show/osvdb/105708"
"name": "32867",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/32867"
},
{
"name": "57883",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57883"
},
{
"name": "https://wordpress.org/plugins/quick-pagepost-redirect-plugin/changelog/",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/quick-pagepost-redirect-plugin/changelog/"
},
{
"name": "quickpage-wordpress-cve20142598-csrf(92528)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3264",
"STATE": "PUBLIC"
},

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20140430 SEC Consult SA-20140430-0 :: SQL injection and persistent XSS in the Typo3 3rd party extension si_bibtex",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/531980/100/0/threaded"
},
{
"name": "20140430 SEC Consult SA-20140430-0 :: SQL injection and persistent XSS in the Typo3 3rd party extension si_bibtex",
"refsource": "FULLDISC",
@ -71,6 +66,11 @@
"name": "67145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67145"
},
{
"name": "20140430 SEC Consult SA-20140430-0 :: SQL injection and persistent XSS in the Typo3 3rd party extension si_bibtex",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531980/100/0/threaded"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "http://seclists.org/fulldisclosure/2014/Aug/55"
},
{
"name" : "20140830 Re: [The ManageOwnage Series, part I]: blind SQL injection in two servlets (metasploit module included)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Aug/85"
"name": "69305",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69305"
},
{
"name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt",
@ -78,9 +78,9 @@
"url": "http://packetstormsecurity.com/files/127973/ManageEngine-Password-Manager-MetadataServlet.dat-SQL-Injection.html"
},
{
"name" : "69305",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69305"
"name": "20140830 Re: [The ManageOwnage Series, part I]: blind SQL injection in two servlets (metasploit module included)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Aug/85"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20141124 Docker 1.3.2 - Security Advisory [24 Nov 2014]",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/11/24/5"
},
{
"name" : "https://docs.docker.com/v1.3/release-notes/",
"refsource" : "CONFIRM",
"url" : "https://docs.docker.com/v1.3/release-notes/"
},
{
"name" : "FEDORA-2014-15779",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html"
},
{
"name" : "openSUSE-SU-2014:1596",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html"
"name": "60241",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60241"
},
{
"name": "60171",
@ -78,9 +63,24 @@
"url": "http://secunia.com/advisories/60171"
},
{
"name" : "60241",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60241"
"name": "https://docs.docker.com/v1.3/release-notes/",
"refsource": "CONFIRM",
"url": "https://docs.docker.com/v1.3/release-notes/"
},
{
"name": "openSUSE-SU-2014:1596",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html"
},
{
"name": "FEDORA-2014-15779",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html"
},
{
"name": "[oss-security] 20141124 Docker 1.3.2 - Security Advisory [24 Nov 2014]",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/11/24/5"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7470",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#844385",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/844385"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#844385",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/844385"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7707",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#319905",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-04-01.html",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-04-01.html"
},
{
"name": "97347",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97347"
},
{
"name": "https://source.android.com/security/bulletin/2017-04-01.html",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-04-01.html"
},
{
"name": "1038201",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-12-04T00:00:00",
"ID": "CVE-2017-0880",
"STATE": "PUBLIC"

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30a61ddf8117c26ac5b295e1233eaa9629a94ca3",
"refsource" : "MISC",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30a61ddf8117c26ac5b295e1233eaa9629a94ca3"
"name": "1041432",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041432"
},
{
"name": "https://github.com/torvalds/linux/commit/30a61ddf8117c26ac5b295e1233eaa9629a94ca3",
@ -63,9 +63,14 @@
"url": "https://github.com/torvalds/linux/commit/30a61ddf8117c26ac5b295e1233eaa9629a94ca3"
},
{
"name" : "1041432",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041432"
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30a61ddf8117c26ac5b295e1233eaa9629a94ca3",
"refsource": "MISC",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30a61ddf8117c26ac5b295e1233eaa9629a94ca3"
}
]
}

View File

@ -74,25 +74,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/136857",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/136857"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22011561",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22011561"
},
{
"name" : "102863",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102863"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/136857",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/136857"
},
{
"name": "1040299",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040299"
},
{
"name": "102863",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102863"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-1975",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-040-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-040-01"
},
{
"name": "96147",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96147"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-040-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-040-01"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-5526",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20170118 CVE request Qemu: audio: memory leakage in es1370 device",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/01/18/1"
},
{
"name" : "[oss-security] 20170118 Re: CVE request Qemu: audio: memory leakage in es1370 device",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/01/18/8"
"name": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=069eb7b2b8fc47c7cb52e5a4af23ea98d939e3da",
"refsource": "CONFIRM",
"url": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=069eb7b2b8fc47c7cb52e5a4af23ea98d939e3da"
},
{
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
@ -68,14 +63,19 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"name" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=069eb7b2b8fc47c7cb52e5a4af23ea98d939e3da",
"refsource" : "CONFIRM",
"url" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=069eb7b2b8fc47c7cb52e5a4af23ea98d939e3da"
"name": "[oss-security] 20170118 Re: CVE request Qemu: audio: memory leakage in es1370 device",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/01/18/8"
},
{
"name": "95669",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95669"
},
{
"name": "[oss-security] 20170118 CVE request Qemu: audio: memory leakage in es1370 device",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/01/18/1"
}
]
}