"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 06:12:15 +00:00
parent 1d342560dd
commit ecb781e3fc
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 3520 additions and 3520 deletions

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1810",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1810"
},
{
"name": "bearshare-dot-download-files(6481)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6481"
},
{ {
"name": "20010430 A Serious Security Vulnerability Found in BearShare (Directory Traversal)", "name": "20010430 A Serious Security Vulnerability Found in BearShare (Directory Traversal)",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,16 +71,6 @@
"name": "2672", "name": "2672",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/2672" "url": "http://www.securityfocus.com/bid/2672"
},
{
"name" : "bearshare-dot-download-files(6481)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6481"
},
{
"name" : "1810",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/1810"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20011114 Xato Advisory: Win2k/XP Terminal Services IP Spoofing",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=100578220002083&w=2"
},
{ {
"name": "win-terminal-spoof-address(7538)", "name": "win-terminal-spoof-address(7538)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7538" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7538"
}, },
{
"name": "20011114 Xato Advisory: Win2k/XP Terminal Services IP Spoofing",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=100578220002083&w=2"
},
{ {
"name": "3541", "name": "3541",
"refsource": "BID", "refsource": "BID",

View File

@ -57,16 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=100714173510535&w=2" "url": "http://marc.info/?l=bugtraq&m=100714173510535&w=2"
}, },
{
"name" : "VU#220715",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/220715"
},
{
"name" : "3599",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/3599"
},
{ {
"name": "alchemy-http-dot-commands(7625)", "name": "alchemy-http-dot-commands(7625)",
"refsource": "XF", "refsource": "XF",
@ -76,6 +66,16 @@
"name": "alchemy-http-dot-variant(7626)", "name": "alchemy-http-dot-variant(7626)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7626" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7626"
},
{
"name": "3599",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3599"
},
{
"name": "VU#220715",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/220715"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "CLA-2001:384", "name": "SuSE-SA:2002:005",
"refsource" : "CONECTIVA", "refsource": "SUSE",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000384" "url": "http://lists2.suse.com/archive/suse-security-announce/2001-Mar/0000.html"
}, },
{ {
"name": "CLA-2001:386", "name": "CLA-2001:386",
@ -68,9 +68,9 @@
"url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-048.php3" "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-048.php3"
}, },
{ {
"name" : "SuSE-SA:2002:005", "name": "CLA-2001:384",
"refsource" : "SUSE", "refsource": "CONECTIVA",
"url" : "http://lists2.suse.com/archive/suse-security-announce/2001-Mar/0000.html" "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000384"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432095/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/432095/100/0/threaded"
}, },
{
"name": "mysmartbb-misc-sql-injection(26088)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26088"
},
{ {
"name": "17707", "name": "17707",
"refsource": "BID", "refsource": "BID",
@ -66,11 +71,6 @@
"name": "807", "name": "807",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/807" "url": "http://securityreason.com/securityalert/807"
},
{
"name" : "mysmartbb-misc-sql-injection(26088)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26088"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://pridels0.blogspot.com/2006/06/unak-cms-vuln.html", "name": "20410",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://pridels0.blogspot.com/2006/06/unak-cms-vuln.html" "url": "http://secunia.com/advisories/20410"
},
{
"name" : "18253",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18253"
}, },
{ {
"name": "ADV-2006-2116", "name": "ADV-2006-2116",
@ -68,14 +63,19 @@
"url": "http://www.vupen.com/english/advisories/2006/2116" "url": "http://www.vupen.com/english/advisories/2006/2116"
}, },
{ {
"name" : "20410", "name": "18253",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/20410" "url": "http://www.securityfocus.com/bid/18253"
}, },
{ {
"name": "unakcms-ua-us-xss(26896)", "name": "unakcms-ua-us-xss(26896)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26896" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26896"
},
{
"name": "http://pridels0.blogspot.com/2006/06/unak-cms-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2006/06/unak-cms-vuln.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2006-2938", "ID": "CVE-2006-2938",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,44 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060605 Multiple file include exploits in Xtreme Downloads v.1.0", "name": "26647",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/436107/100/0/threaded"
},
{
"name" : "20060605 file include in Xtreme Downloads v.1.0",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/436104/100/0/threaded"
},
{
"name" : "26643",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://www.osvdb.org/26643" "url": "http://www.osvdb.org/26647"
},
{
"name" : "26644",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26644"
}, },
{ {
"name": "26645", "name": "26645",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/26645" "url": "http://www.osvdb.org/26645"
}, },
{
"name": "26643",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26643"
},
{ {
"name": "26646", "name": "26646",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/26646" "url": "http://www.osvdb.org/26646"
}, },
{ {
"name" : "26647", "name": "xtremedownloads-root-file-include(26961)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://www.osvdb.org/26647" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26961"
}, },
{ {
"name" : "26648", "name": "20060605 Multiple file include exploits in Xtreme Downloads v.1.0",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://www.osvdb.org/26648" "url": "http://www.securityfocus.com/archive/1/436107/100/0/threaded"
}, },
{ {
"name": "1072", "name": "1072",
@ -98,9 +88,19 @@
"url": "http://securityreason.com/securityalert/1072" "url": "http://securityreason.com/securityalert/1072"
}, },
{ {
"name" : "xtremedownloads-root-file-include(26961)", "name": "20060605 file include in Xtreme Downloads v.1.0",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26961" "url": "http://www.securityfocus.com/archive/1/436104/100/0/threaded"
},
{
"name": "26644",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26644"
},
{
"name": "26648",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26648"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20061126 uPhotoGallery (v 1.1) SQL Injection", "name": "1950",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/452827/100/0/threaded" "url": "http://securityreason.com/securityalert/1950"
}, },
{ {
"name": "20070204 Uphotogallery Multiple Cross-Site Scripting Vulnerability", "name": "20070204 Uphotogallery Multiple Cross-Site Scripting Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459187/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/459187/100/0/threaded"
}, },
{
"name" : "http://www.aria-security.com/forum/showthread.php?t=53",
"refsource" : "MISC",
"url" : "http://www.aria-security.com/forum/showthread.php?t=53"
},
{ {
"name": "21319", "name": "21319",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/21319" "url": "http://www.securityfocus.com/bid/21319"
}, },
{
"name" : "1950",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1950"
},
{ {
"name": "uphotogallery-multiple-sql-injection(30556)", "name": "uphotogallery-multiple-sql-injection(30556)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30556" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30556"
},
{
"name": "20061126 uPhotoGallery (v 1.1) SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/452827/100/0/threaded"
},
{
"name": "http://www.aria-security.com/forum/showthread.php?t=53",
"refsource": "MISC",
"url": "http://www.aria-security.com/forum/showthread.php?t=53"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20061215 Bypassing process identification of several personal firewalls and HIPS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/454522/100/0/threaded"
},
{
"name" : "http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip",
"refsource" : "MISC",
"url" : "http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip"
},
{ {
"name": "http://www.matousec.com/info/advisories/Bypassing-process-identification-serveral-personal-firewalls-HIPS.php", "name": "http://www.matousec.com/info/advisories/Bypassing-process-identification-serveral-personal-firewalls-HIPS.php",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.matousec.com/info/advisories/Bypassing-process-identification-serveral-personal-firewalls-HIPS.php" "url": "http://www.matousec.com/info/advisories/Bypassing-process-identification-serveral-personal-firewalls-HIPS.php"
}, },
{
"name": "20061215 Bypassing process identification of several personal firewalls and HIPS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/454522/100/0/threaded"
},
{ {
"name": "21615", "name": "21615",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/21615" "url": "http://www.securityfocus.com/bid/21615"
},
{
"name": "http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip",
"refsource": "MISC",
"url": "http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "7533",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7533"
},
{
"name" : "http://www.ntinternals.org/ntiadv0810/ntiadv0810.html",
"refsource" : "MISC",
"url" : "http://www.ntinternals.org/ntiadv0810/ntiadv0810.html"
},
{ {
"name": "32961", "name": "32961",
"refsource": "BID", "refsource": "BID",
@ -72,11 +62,21 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33249" "url": "http://secunia.com/advisories/33249"
}, },
{
"name": "http://www.ntinternals.org/ntiadv0810/ntiadv0810.html",
"refsource": "MISC",
"url": "http://www.ntinternals.org/ntiadv0810/ntiadv0810.html"
},
{ {
"name": "4809", "name": "4809",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4809" "url": "http://securityreason.com/securityalert/4809"
}, },
{
"name": "7533",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7533"
},
{ {
"name": "powerstrip-pstrip-priv-escalation(47532)", "name": "powerstrip-pstrip-priv-escalation(47532)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-2059", "ID": "CVE-2011-2059",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavor",
"refsource" : "CONFIRM",
"url" : "http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavor"
},
{ {
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signatureSubId=0", "name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signatureSubId=0",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signatureSubId=0" "url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signatureSubId=0"
},
{
"name": "http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavor",
"refsource": "CONFIRM",
"url": "http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavor"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2423", "ID": "CVE-2011-2423",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "name": "74429",
"refsource" : "CONFIRM", "refsource": "OSVDB",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-19.html" "url": "http://osvdb.org/74429"
}, },
{ {
"name": "TA11-222A", "name": "TA11-222A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html"
}, },
{
"name" : "74429",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/74429"
},
{ {
"name": "asp-msvcr90-code-execution(69133)", "name": "asp-msvcr90-code-execution(69133)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69133" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69133"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2905", "ID": "CVE-2011-2905",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20110809 Re: CVE request: perf: may parse user-controlled config file",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/08/09/6"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=aba8d056078e47350d85b06a9cabd5afcc4b72ea",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=aba8d056078e47350d85b06a9cabd5afcc4b72ea"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=729808", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=729808",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -76,6 +61,21 @@
"name": "https://github.com/torvalds/linux/commit/aba8d056078e47350d85b06a9cabd5afcc4b72ea", "name": "https://github.com/torvalds/linux/commit/aba8d056078e47350d85b06a9cabd5afcc4b72ea",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/aba8d056078e47350d85b06a9cabd5afcc4b72ea" "url": "https://github.com/torvalds/linux/commit/aba8d056078e47350d85b06a9cabd5afcc4b72ea"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=aba8d056078e47350d85b06a9cabd5afcc4b72ea",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=aba8d056078e47350d85b06a9cabd5afcc4b72ea"
},
{
"name": "[oss-security] 20110809 Re: CVE request: perf: may parse user-controlled config file",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/09/6"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=121734",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=121734"
},
{
"name" : "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html"
},
{ {
"name": "GLSA-201205-03", "name": "GLSA-201205-03",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -73,24 +63,34 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html"
}, },
{ {
"name" : "53540", "name": "1027067",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/53540" "url": "http://www.securitytracker.com/id?1027067"
}, },
{ {
"name": "oval:org.mitre.oval:def:15196", "name": "oval:org.mitre.oval:def:15196",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15196" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15196"
}, },
{
"name" : "1027067",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1027067"
},
{ {
"name": "chrome-indexeddb-code-exec(75596)", "name": "chrome-indexeddb-code-exec(75596)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75596" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75596"
},
{
"name": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html"
},
{
"name": "53540",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53540"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=121734",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=121734"
} }
] ]
} }

View File

@ -52,21 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "MDVSA-2012:076",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
},
{ {
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=bd968d260aef322fb32e254a3de0d2036c57bd56", "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=bd968d260aef322fb32e254a3de0d2036c57bd56",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=bd968d260aef322fb32e254a3de0d2036c57bd56" "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=bd968d260aef322fb32e254a3de0d2036c57bd56"
}, },
{
"name" : "http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog",
"refsource" : "CONFIRM",
"url" : "http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog"
},
{
"name" : "http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog",
"refsource" : "CONFIRM",
"url" : "http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog"
},
{ {
"name": "MDVSA-2012:074", "name": "MDVSA-2012:074",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
@ -78,9 +73,14 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
}, },
{ {
"name" : "MDVSA-2012:076", "name": "http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog",
"refsource" : "MANDRIVA", "refsource": "CONFIRM",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076" "url": "http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog"
},
{
"name": "http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog",
"refsource": "CONFIRM",
"url": "http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-3995", "ID": "CVE-2011-3995",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN50227837/index.html" "url": "http://jvn.jp/en/jp/JVN50227837/index.html"
}, },
{
"name" : "JVNDB-2011-000089",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000089"
},
{ {
"name": "touhouhisouten-unspecified-dos(71027)", "name": "touhouhisouten-unspecified-dos(71027)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71027" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71027"
},
{
"name": "JVNDB-2011-000089",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000089"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2011-4531", "ID": "CVE-2011-4531",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://support.automation.siemens.com/WW/view/en/114358",
"refsource": "CONFIRM",
"url": "http://support.automation.siemens.com/WW/view/en/114358"
},
{ {
"name": "http://aluigi.altervista.org/adv/almsrvx_1-adv.txt", "name": "http://aluigi.altervista.org/adv/almsrvx_1-adv.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/almsrvx_1-adv.txt" "url": "http://aluigi.altervista.org/adv/almsrvx_1-adv.txt"
}, },
{
"name" : "http://www.us-cert.gov/control_systems/pdf/ICSA-11-361-01.pdf",
"refsource" : "MISC",
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-11-361-01.pdf"
},
{ {
"name": "http://support.automation.siemens.com/WW/llisapi.dll/57252401?func=ll&objId=57252401&objAction=csView&nodeid0=17323948&lang=en&siteid=cseus&aktprim=0&extranet=standard&viewreg=WW&load=content", "name": "http://support.automation.siemens.com/WW/llisapi.dll/57252401?func=ll&objId=57252401&objAction=csView&nodeid0=17323948&lang=en&siteid=cseus&aktprim=0&extranet=standard&viewreg=WW&load=content",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.automation.siemens.com/WW/llisapi.dll/57252401?func=ll&objId=57252401&objAction=csView&nodeid0=17323948&lang=en&siteid=cseus&aktprim=0&extranet=standard&viewreg=WW&load=content" "url": "http://support.automation.siemens.com/WW/llisapi.dll/57252401?func=ll&objId=57252401&objAction=csView&nodeid0=17323948&lang=en&siteid=cseus&aktprim=0&extranet=standard&viewreg=WW&load=content"
}, },
{ {
"name" : "http://support.automation.siemens.com/WW/view/en/114358", "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-361-01.pdf",
"refsource" : "CONFIRM", "refsource": "MISC",
"url" : "http://support.automation.siemens.com/WW/view/en/114358" "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-361-01.pdf"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-0670", "ID": "CVE-2013-0670",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-0986", "ID": "CVE-2013-0986",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "APPLE-SA-2013-05-22-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/May/msg00001.html"
},
{ {
"name": "http://support.apple.com/kb/HT5770", "name": "http://support.apple.com/kb/HT5770",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5784" "url": "http://support.apple.com/kb/HT5784"
}, },
{
"name" : "APPLE-SA-2013-05-22-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/May/msg00001.html"
},
{ {
"name": "APPLE-SA-2013-06-04-1", "name": "APPLE-SA-2013-06-04-1",
"refsource": "APPLE", "refsource": "APPLE",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1179", "ID": "CVE-2013-1179",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1308", "ID": "CVE-2013-1308",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.opera.com/docs/changelogs/unified/1213/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/unified/1213/"
},
{ {
"name": "http://www.opera.com/support/kb/view/1042/", "name": "http://www.opera.com/support/kb/view/1042/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.opera.com/support/kb/view/1042/" "url": "http://www.opera.com/support/kb/view/1042/"
}, },
{
"name": "http://www.opera.com/docs/changelogs/unified/1213/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/unified/1213/"
},
{ {
"name": "openSUSE-SU-2013:0289", "name": "openSUSE-SU-2013:0289",
"refsource": "SUSE", "refsource": "SUSE",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-4068", "ID": "CVE-2013-4068",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21649476",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21649476"
},
{ {
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21650034", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21650034",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21650034" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21650034"
}, },
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21650146",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21650146"
},
{ {
"name": "ibm-inotes-cve20134068-bo(86599)", "name": "ibm-inotes-cve20134068-bo(86599)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86599" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86599"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21649476",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21649476"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21650146",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21650146"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-5063", "ID": "CVE-2013-5063",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20130913 Zimbra Collaboration Suite (ZCS) Session Replay Vulnerability", "name": "97290",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-09/0063.html" "url": "http://osvdb.org/97290"
}, },
{ {
"name": "62407", "name": "62407",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/62407" "url": "http://www.securityfocus.com/bid/62407"
}, },
{ {
"name" : "97290", "name": "20130913 Zimbra Collaboration Suite (ZCS) Session Replay Vulnerability",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://osvdb.org/97290" "url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0063.html"
} }
] ]
} }

View File

@ -52,36 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20130724 [Security-news] SA-CONTRIB-2013-060 - Scald - Cross Site Scripting (XSS)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2013/Jul/224"
},
{
"name" : "https://drupal.org/node/2049415",
"refsource" : "MISC",
"url" : "https://drupal.org/node/2049415"
},
{
"name" : "http://drupalcode.org/project/scald.git/blobdiff/9ce68f67a25200afa5256f567ef89bc4b9fd705e..974a5e29f502a58e6a955d69a85bb5f16c1c8b3e:/mee/mee.module",
"refsource" : "CONFIRM",
"url" : "http://drupalcode.org/project/scald.git/blobdiff/9ce68f67a25200afa5256f567ef89bc4b9fd705e..974a5e29f502a58e6a955d69a85bb5f16c1c8b3e:/mee/mee.module"
},
{
"name" : "http://drupalcode.org/project/scald.git/commitdiff/32db1ee",
"refsource" : "CONFIRM",
"url" : "http://drupalcode.org/project/scald.git/commitdiff/32db1ee"
},
{
"name" : "https://drupal.org/node/2049239",
"refsource" : "CONFIRM",
"url" : "https://drupal.org/node/2049239"
},
{
"name" : "61426",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/61426"
},
{ {
"name": "95625", "name": "95625",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -96,6 +66,36 @@
"name": "scald-atomtitle-xss(85964)", "name": "scald-atomtitle-xss(85964)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85964" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85964"
},
{
"name": "https://drupal.org/node/2049239",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/2049239"
},
{
"name": "http://drupalcode.org/project/scald.git/commitdiff/32db1ee",
"refsource": "CONFIRM",
"url": "http://drupalcode.org/project/scald.git/commitdiff/32db1ee"
},
{
"name": "http://drupalcode.org/project/scald.git/blobdiff/9ce68f67a25200afa5256f567ef89bc4b9fd705e..974a5e29f502a58e6a955d69a85bb5f16c1c8b3e:/mee/mee.module",
"refsource": "CONFIRM",
"url": "http://drupalcode.org/project/scald.git/blobdiff/9ce68f67a25200afa5256f567ef89bc4b9fd705e..974a5e29f502a58e6a955d69a85bb5f16c1c8b3e:/mee/mee.module"
},
{
"name": "20130724 [Security-news] SA-CONTRIB-2013-060 - Scald - Cross Site Scripting (XSS)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Jul/224"
},
{
"name": "https://drupal.org/node/2049415",
"refsource": "MISC",
"url": "https://drupal.org/node/2049415"
},
{
"name": "61426",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61426"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2013-5588", "ID": "CVE-2013-5588",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://bugs.cacti.net/view.php?id=2383",
"refsource" : "CONFIRM",
"url" : "http://bugs.cacti.net/view.php?id=2383"
},
{
"name" : "DSA-2747",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2747"
},
{
"name" : "openSUSE-SU-2015:0479",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-03/msg00034.html"
},
{ {
"name": "62001", "name": "62001",
"refsource": "BID", "refsource": "BID",
@ -76,6 +61,21 @@
"name": "54652", "name": "54652",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54652" "url": "http://secunia.com/advisories/54652"
},
{
"name": "DSA-2747",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2747"
},
{
"name": "http://bugs.cacti.net/view.php?id=2383",
"refsource": "CONFIRM",
"url": "http://bugs.cacti.net/view.php?id=2383"
},
{
"name": "openSUSE-SU-2015:0479",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00034.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2137", "ID": "CVE-2014-2137",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.citrix.com/article/CTX140651",
"refsource" : "CONFIRM",
"url" : "http://support.citrix.com/article/CTX140651"
},
{ {
"name": "1030180", "name": "1030180",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030180" "url": "http://www.securitytracker.com/id/1030180"
},
{
"name": "http://support.citrix.com/article/CTX140651",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX140651"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2017-0411", "ID": "CVE-2017-0411",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -61,9 +61,9 @@
"url": "https://www.exploit-db.com/exploits/41354/" "url": "https://www.exploit-db.com/exploits/41354/"
}, },
{ {
"name" : "https://source.android.com/security/bulletin/2017-02-01.html", "name": "1037798",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://source.android.com/security/bulletin/2017-02-01.html" "url": "http://www.securitytracker.com/id/1037798"
}, },
{ {
"name": "96056", "name": "96056",
@ -71,9 +71,9 @@
"url": "http://www.securityfocus.com/bid/96056" "url": "http://www.securityfocus.com/bid/96056"
}, },
{ {
"name" : "1037798", "name": "https://source.android.com/security/bulletin/2017-02-01.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1037798" "url": "https://source.android.com/security/bulletin/2017-02-01.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-07-05T00:00:00", "DATE_PUBLIC": "2017-07-05T00:00:00",
"ID": "CVE-2017-0710", "ID": "CVE-2017-0710",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.392975", "DATE_ASSIGNED": "2017-08-22T17:29:33.392975",
"ID": "CVE-2017-1000176", "ID": "CVE-2017-1000176",
"REQUESTER": "vuln_reporter@srcms.xyz", "REQUESTER": "vuln_reporter@srcms.xyz",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "swftools", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "latest" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Buffer Overflow" "value": "n/a"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.413120", "DATE_ASSIGNED": "2017-08-22T17:29:33.413120",
"ID": "CVE-2017-1000190", "ID": "CVE-2017-1000190",
"REQUESTER": "exploitcat@foxmail.com", "REQUESTER": "exploitcat@foxmail.com",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "SimpleXML", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "2.7.1 lastest version" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "SimpleXML" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "XML External Entity (XXE)" "value": "n/a"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/ImageMagick/ImageMagick/issues/659",
"refsource" : "CONFIRM",
"url" : "https://github.com/ImageMagick/ImageMagick/issues/659"
},
{ {
"name": "USN-3681-1", "name": "USN-3681-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3681-1/" "url": "https://usn.ubuntu.com/3681-1/"
},
{
"name": "https://github.com/ImageMagick/ImageMagick/issues/659",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/issues/659"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4226", "ID": "CVE-2017-4226",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4393", "ID": "CVE-2017-4393",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -80,16 +80,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html"
}, },
{
"name" : "97163",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97163"
},
{ {
"name": "1038148", "name": "1038148",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038148" "url": "http://www.securitytracker.com/id/1038148"
}, },
{
"name": "97163",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97163"
},
{ {
"name": "1038149", "name": "1038149",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -53,15 +53,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "103386",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103386"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1408194", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1408194",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1408194" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1408194"
}, },
{ {
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-06/", "name": "1040514",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-06/" "url": "http://www.securitytracker.com/id/1040514"
}, },
{ {
"name": "USN-3596-1", "name": "USN-3596-1",
@ -69,14 +74,9 @@
"url": "https://usn.ubuntu.com/3596-1/" "url": "https://usn.ubuntu.com/3596-1/"
}, },
{ {
"name" : "103386", "name": "https://www.mozilla.org/security/advisories/mfsa2018-06/",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/103386" "url": "https://www.mozilla.org/security/advisories/mfsa2018-06/"
},
{
"name" : "1040514",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040514"
} }
] ]
} }