"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:00:03 +00:00
parent 7e2b728fff
commit ee74876aa5
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
55 changed files with 5051 additions and 5051 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secteam@freebsd.org",
"ID": "CVE-2006-0055",
"STATE": "PUBLIC"
},
@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "FreeBSD-SA-06:02",
"refsource" : "FREEBSD",
"url" : "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:02.ee.asc"
},
{
"name": "16207",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16207"
},
{
"name" : "22320",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22320"
"name": "FreeBSD-SA-06:02",
"refsource": "FREEBSD",
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:02.ee.asc"
},
{
"name": "ee-ispell-op-symlink(24074)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24074"
},
{
"name": "1015469",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015469"
},
{
"name": "22320",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22320"
},
{
"name": "18404",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18404"
},
{
"name" : "ee-ispell-op-symlink(24074)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24074"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.soulblack.com.ar/repo/papers/advisory/nkads_advisory.txt",
"refsource" : "MISC",
"url" : "http://www.soulblack.com.ar/repo/papers/advisory/nkads_advisory.txt"
},
{
"name": "ADV-2006-0040",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0040"
},
{
"name": "http://www.soulblack.com.ar/repo/papers/advisory/nkads_advisory.txt",
"refsource": "MISC",
"url": "http://www.soulblack.com.ar/repo/papers/advisory/nkads_advisory.txt"
},
{
"name": "22206",
"refsource": "OSVDB",

View File

@ -53,44 +53,34 @@
"references": {
"reference_data": [
{
"name" : "20060112 [eVuln] TankLogger SQL Injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/421743/100/0/threaded"
},
{
"name" : "20060113 Verified TankLogger SQl inject by source inspection",
"refsource" : "VIM",
"url" : "http://attrition.org/pipermail/vim/2006-January/000480.html"
},
{
"name" : "http://evuln.com/vulns/26/summary.html",
"refsource" : "MISC",
"url" : "http://evuln.com/vulns/26/summary.html"
},
{
"name" : "16228",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16228"
},
{
"name" : "ADV-2006-0153",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0153"
"name": "tanklogger-generalfunctions-sql-injection(24080)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24080"
},
{
"name": "22368",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22368"
},
{
"name": "18441",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18441"
},
{
"name": "16228",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16228"
},
{
"name": "22369",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22369"
},
{
"name" : "18441",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18441"
"name": "20060113 Verified TankLogger SQl inject by source inspection",
"refsource": "VIM",
"url": "http://attrition.org/pipermail/vim/2006-January/000480.html"
},
{
"name": "341",
@ -98,9 +88,19 @@
"url": "http://securityreason.com/securityalert/341"
},
{
"name" : "tanklogger-generalfunctions-sql-injection(24080)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24080"
"name": "20060112 [eVuln] TankLogger SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/421743/100/0/threaded"
},
{
"name": "http://evuln.com/vulns/26/summary.html",
"refsource": "MISC",
"url": "http://evuln.com/vulns/26/summary.html"
},
{
"name": "ADV-2006-0153",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0153"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2006-0564",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0564"
},
{
"name": "http://secunia.com/secunia_research/2006-3/advisory/",
"refsource": "MISC",
@ -68,19 +73,14 @@
"url": "http://www.securityfocus.com/bid/16651"
},
{
"name" : "ADV-2006-0564",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0564"
"name": "neomail-neomailprefs-bypass-security(24737)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24737"
},
{
"name": "18785",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18785"
},
{
"name" : "neomail-neomailprefs-bypass-security(24737)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24737"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20060620 Somechess v1.5 rc1 - XSS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/438009/100/0/threaded"
"name": "1016360",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016360"
},
{
"name": "1162",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1162"
},
{
"name": "18557",
@ -63,20 +68,15 @@
"url": "http://www.securityfocus.com/bid/18557"
},
{
"name" : "1016360",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016360"
"name": "20060620 Somechess v1.5 rc1 - XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/438009/100/0/threaded"
},
{
"name": "20770",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20770"
},
{
"name" : "1162",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1162"
},
{
"name": "somechess-menu-xss(27307)",
"refsource": "XF",

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0180.html"
},
{
"name": "1249",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1249"
},
{
"name": "http://advisories.echo.or.id/adv/adv38-matdhule-2006.txt",
"refsource": "MISC",
@ -72,11 +77,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19047"
},
{
"name" : "1249",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1249"
},
{
"name": "imagemanager-configinc-file-include(27721)",
"refsource": "XF",

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://krusader.sourceforge.net/phpBB/viewtopic.php?p=7965",
"refsource" : "CONFIRM",
"url" : "http://krusader.sourceforge.net/phpBB/viewtopic.php?p=7965"
"name": "19194",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19194"
},
{
"name": "http://groups.google.com/group/krusader-news/browse_thread/thread/ec719041ed4a1a14",
"refsource": "CONFIRM",
"url": "http://groups.google.com/group/krusader-news/browse_thread/thread/ec719041ed4a1a14"
},
{
"name" : "19194",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19194"
},
{
"name": "ADV-2006-2992",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2992"
},
{
"name": "http://krusader.sourceforge.net/phpBB/viewtopic.php?p=7965",
"refsource": "CONFIRM",
"url": "http://krusader.sourceforge.net/phpBB/viewtopic.php?p=7965"
}
]
}

View File

@ -53,54 +53,54 @@
"references": {
"reference_data": [
{
"name" : "20060801 [vuln.sg] Lhaplus LHA Extended Header Handling Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/441822/100/0/threaded"
},
{
"name" : "http://vuln.sg/lhaplus152-en.html",
"refsource" : "MISC",
"url" : "http://vuln.sg/lhaplus152-en.html"
},
{
"name" : "http://www7a.biglobe.ne.jp/~schezo/",
"refsource" : "CONFIRM",
"url" : "http://www7a.biglobe.ne.jp/~schezo/"
},
{
"name" : "19263",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19263"
},
{
"name" : "ADV-2006-3076",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3076"
},
{
"name" : "27667",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27667"
},
{
"name" : "1016615",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016615"
"name": "lhaplus-lzh-header-bo(28102)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28102"
},
{
"name": "21256",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21256"
},
{
"name": "20060801 [vuln.sg] Lhaplus LHA Extended Header Handling Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/441822/100/0/threaded"
},
{
"name": "19263",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19263"
},
{
"name": "27667",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27667"
},
{
"name": "http://www7a.biglobe.ne.jp/~schezo/",
"refsource": "CONFIRM",
"url": "http://www7a.biglobe.ne.jp/~schezo/"
},
{
"name": "1016615",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016615"
},
{
"name": "http://vuln.sg/lhaplus152-en.html",
"refsource": "MISC",
"url": "http://vuln.sg/lhaplus152-en.html"
},
{
"name": "1351",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1351"
},
{
"name" : "lhaplus-lzh-header-bo(28102)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28102"
"name": "ADV-2006-3076",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3076"
}
]
}

View File

@ -53,24 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20060909 PHP 5.1.6 / 4.4.4 Critical php_admin* bypass by ini_restore()",
"refsource" : "SREASONRES",
"url" : "http://securityreason.com/achievement_securityalert/42"
"name": "ADV-2007-1991",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1991"
},
{
"name" : "20060909 Re: PHP 5.1.6 / 4.4.4 Critical php_admin* bypass by ini_restore()",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/445712/100/0/threaded"
},
{
"name" : "20060913 Re: PHP 5.1.6 / 4.4.4 Critical php_admin* bypass by ini_restore()",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/445882/100/0/threaded"
},
{
"name" : "HPSBMA02215",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
"name": "22338",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22338"
},
{
"name": "SSRT071423",
@ -78,19 +68,9 @@
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
},
{
"name" : "HPSBTU02232",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
},
{
"name" : "SSRT071429",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
},
{
"name" : "MDKSA-2006:185",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:185"
"name": "20060909 Re: PHP 5.1.6 / 4.4.4 Critical php_admin* bypass by ini_restore()",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/445712/100/0/threaded"
},
{
"name": "OpenPKG-SA-2006.023",
@ -98,9 +78,9 @@
"url": "http://www.securityfocus.com/archive/1/448953/100/0/threaded"
},
{
"name" : "SUSE-SA:2006:059",
"refsource" : "SUSE",
"url" : "http://lists.suse.com/archive/suse-security-announce/2006-Oct/0002.html"
"name": "1519",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1519"
},
{
"name": "TLSA-2006-38",
@ -113,59 +93,79 @@
"url": "http://www.ubuntu.com/usn/usn-362-1"
},
{
"name" : "19933",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19933"
"name": "20060913 Re: PHP 5.1.6 / 4.4.4 Critical php_admin* bypass by ini_restore()",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/445882/100/0/threaded"
},
{
"name" : "ADV-2007-1991",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1991"
"name": "HPSBTU02232",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
},
{
"name": "SSRT071429",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
},
{
"name": "ADV-2007-2374",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2374"
},
{
"name": "25423",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25423"
},
{
"name": "22282",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22282"
},
{
"name" : "22338",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22338"
"name": "19933",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19933"
},
{
"name" : "22424",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22424"
"name": "php-inirestore-security-bypass(28853)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28853"
},
{
"name": "HPSBMA02215",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
},
{
"name": "SUSE-SA:2006:059",
"refsource": "SUSE",
"url": "http://lists.suse.com/archive/suse-security-announce/2006-Oct/0002.html"
},
{
"name": "MDKSA-2006:185",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:185"
},
{
"name": "22331",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22331"
},
{
"name" : "25423",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25423"
},
{
"name": "25850",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25850"
},
{
"name" : "1519",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1519"
"name": "20060909 PHP 5.1.6 / 4.4.4 Critical php_admin* bypass by ini_restore()",
"refsource": "SREASONRES",
"url": "http://securityreason.com/achievement_securityalert/42"
},
{
"name" : "php-inirestore-security-bypass(28853)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28853"
"name": "22424",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22424"
}
]
}

View File

@ -52,16 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "20060907 DokuWiki <= 2006-03-09brel /bin/dwpage.php remote commands execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/445516/100/0/threaded"
},
{
"name": "http://retrogod.altervista.org/dokuwiki_2006-03-09b_cmd.html",
"refsource": "MISC",
"url": "http://retrogod.altervista.org/dokuwiki_2006-03-09b_cmd.html"
},
{
"name": "1537",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1537"
},
{
"name": "dokuwiki-doku-information-disclosure(28819)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28819"
},
{
"name": "GLSA-200609-10",
"refsource": "GENTOO",
@ -73,14 +78,9 @@
"url": "http://secunia.com/advisories/21936"
},
{
"name" : "1537",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1537"
},
{
"name" : "dokuwiki-doku-information-disclosure(28819)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28819"
"name": "20060907 DokuWiki <= 2006-03-09brel /bin/dwpage.php remote commands execution",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/445516/100/0/threaded"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-7230",
"STATE": "PUBLIC"
},
@ -52,75 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "30219",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30219"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=384801",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=384801"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=198976",
"refsource" : "MISC",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=198976"
},
{
"name" : "http://www.pcre.org/changelog.txt",
"refsource" : "CONFIRM",
"url" : "http://www.pcre.org/changelog.txt"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm"
},
{
"name" : "DSA-1570",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1570"
},
{
"name": "GLSA-200711-30",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200711-30.xml"
},
{
"name" : "GLSA-200801-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200801-02.xml"
},
{
"name" : "GLSA-200801-18",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200801-18.xml"
},
{
"name" : "GLSA-200801-19",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200801-19.xml"
},
{
"name" : "GLSA-200805-11",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200805-11.xml"
},
{
"name": "MDVSA-2008:030",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:030"
},
{
"name" : "RHSA-2007:1059",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1059.html"
},
{
"name" : "RHSA-2007:1068",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1068.html"
},
{
"name" : "SUSE-SA:2007:062",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_62_pcre.html"
"name": "DSA-1570",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1570"
},
{
"name": "SUSE-SA:2008:004",
@ -128,54 +83,69 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html"
},
{
"name" : "26550",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26550"
},
{
"name" : "oval:org.mitre.oval:def:10911",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10911"
},
{
"name" : "27741",
"name": "28658",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/27741"
"url": "http://secunia.com/advisories/28658"
},
{
"name": "27773",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27773"
},
{
"name" : "28041",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28041"
},
{
"name": "28406",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28406"
},
{
"name" : "28414",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28414"
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm"
},
{
"name" : "28658",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28658"
"name": "RHSA-2007:1068",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1068.html"
},
{
"name" : "28714",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28714"
"name": "GLSA-200805-11",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200805-11.xml"
},
{
"name" : "28720",
"name": "oval:org.mitre.oval:def:10911",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10911"
},
{
"name": "RHSA-2007:1059",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1059.html"
},
{
"name": "26550",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26550"
},
{
"name": "28041",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/28720"
"url": "http://secunia.com/advisories/28041"
},
{
"name": "27741",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27741"
},
{
"name": "SUSE-SA:2007:062",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_62_pcre.html"
},
{
"name": "http://www.pcre.org/changelog.txt",
"refsource": "CONFIRM",
"url": "http://www.pcre.org/changelog.txt"
},
{
"name": "30155",
@ -183,14 +153,44 @@
"url": "http://secunia.com/advisories/30155"
},
{
"name" : "30219",
"name": "28720",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/30219"
"url": "http://secunia.com/advisories/28720"
},
{
"name": "GLSA-200801-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200801-02.xml"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=198976",
"refsource": "MISC",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198976"
},
{
"name": "GLSA-200801-19",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200801-19.xml"
},
{
"name": "GLSA-200801-18",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200801-18.xml"
},
{
"name": "28414",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28414"
},
{
"name": "30106",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30106"
},
{
"name": "28714",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28714"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "12482",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/12482"
},
{
"name" : "12530",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/12530"
},
{
"name": "39872",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39872"
},
{
"name": "12482",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/12482"
},
{
"name": "tftpgui-mode-bo(58283)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58283"
},
{
"name": "12530",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/12530"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "40072",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40072"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=43304",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=43304"
},
{
"name" : "http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html"
},
{
"name": "oval:org.mitre.oval:def:14154",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14154"
},
{
"name" : "40072",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40072"
"name": "http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2537",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20100721 CVE request: kernel: btrfs",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/07/21/4"
"name": "USN-1041-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1041-1"
},
{
"name": "[oss-security] 20100721 Re: CVE request: kernel: btrfs",
@ -63,44 +63,44 @@
"url": "http://www.openwall.com/lists/oss-security/2010/07/21/10"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2ebc3464781ad24474abcbd2274e6254689853b5",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2ebc3464781ad24474abcbd2274e6254689853b5"
"name": "SUSE-SA:2010:040",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=616998",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=616998"
},
{
"name" : "SUSE-SA:2010:040",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html"
},
{
"name" : "USN-1041-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1041-1"
},
{
"name" : "41847",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/41847"
},
{
"name": "42758",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42758"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=616998",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=616998"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2ebc3464781ad24474abcbd2274e6254689853b5",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2ebc3464781ad24474abcbd2274e6254689853b5"
},
{
"name": "ADV-2011-0070",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0070"
},
{
"name": "[oss-security] 20100721 CVE request: kernel: btrfs",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/07/21/4"
},
{
"name": "41847",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41847"
}
]
}

View File

@ -58,69 +58,69 @@
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-176/"
},
{
"name" : "http://www.mozilla.org/security/announce/2010/mfsa2010-57.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2010/mfsa2010-57.html"
"name": "SUSE-SA:2010:049",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=580445",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=580445"
},
{
"name": "43100",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43100"
},
{
"name": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox",
"refsource": "CONFIRM",
"url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox"
},
{
"name" : "http://support.avaya.com/css/P8/documents/100112690",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100112690"
},
{
"name" : "DSA-2106",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2106"
},
{
"name": "FEDORA-2010-14362",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047282.html"
},
{
"name" : "MDVSA-2010:173",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:173"
},
{
"name" : "SUSE-SA:2010:049",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html"
},
{
"name" : "43100",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/43100"
},
{
"name" : "oval:org.mitre.oval:def:11778",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11778"
"name": "http://support.avaya.com/css/P8/documents/100112690",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100112690"
},
{
"name": "42867",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42867"
},
{
"name": "ADV-2011-0061",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0061"
},
{
"name": "oval:org.mitre.oval:def:11778",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11778"
},
{
"name": "http://www.mozilla.org/security/announce/2010/mfsa2010-57.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2010/mfsa2010-57.html"
},
{
"name": "MDVSA-2010:173",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:173"
},
{
"name": "ADV-2010-2323",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2323"
},
{
"name" : "ADV-2011-0061",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0061"
"name": "DSA-2106",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2106"
}
]
}

View File

@ -58,64 +58,64 @@
"url": "http://www.mozilla.org/security/announce/2010/mfsa2010-62.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=520189",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=520189"
"name": "SUSE-SA:2010:049",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html"
},
{
"name": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox",
"refsource": "CONFIRM",
"url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox"
},
{
"name" : "http://support.avaya.com/css/P8/documents/100112690",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100112690"
},
{
"name" : "DSA-2106",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2106"
},
{
"name": "FEDORA-2010-14362",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047282.html"
},
{
"name" : "MDVSA-2010:173",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:173"
},
{
"name" : "SUSE-SA:2010:049",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html"
"name": "http://support.avaya.com/css/P8/documents/100112690",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100112690"
},
{
"name": "43106",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43106"
},
{
"name" : "oval:org.mitre.oval:def:12192",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12192"
},
{
"name": "42867",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42867"
},
{
"name": "ADV-2011-0061",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0061"
},
{
"name": "MDVSA-2010:173",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:173"
},
{
"name": "oval:org.mitre.oval:def:12192",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12192"
},
{
"name": "ADV-2010-2323",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2323"
},
{
"name" : "ADV-2011-0061",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0061"
"name": "DSA-2106",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2106"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=520189",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=520189"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2886",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2010-2718",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2718"
},
{
"name": "41870",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41870"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-23.html",
"refsource": "CONFIRM",
@ -61,16 +71,6 @@
"name": "1024611",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024611"
},
{
"name" : "41870",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41870"
},
{
"name" : "ADV-2010-2718",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2718"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "68062",
"refsource": "OSVDB",
"url": "http://osvdb.org/68062"
},
{
"name": "http://pridels-team.blogspot.com/2010/09/netartmedia-real-estate-portal-v20-xss.html",
"refsource": "MISC",
@ -62,11 +67,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43266"
},
{
"name" : "68062",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/68062"
},
{
"name": "41377",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-3820",
"STATE": "PUBLIC"
},
@ -52,45 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "http://support.apple.com/kb/HT4455",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4455"
},
{
"name" : "http://support.apple.com/kb/HT4456",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4456"
},
{
"name" : "APPLE-SA-2010-11-18-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html"
},
{
"name" : "APPLE-SA-2010-11-22-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
},
{
"name" : "SUSE-SR:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name" : "oval:org.mitre.oval:def:11972",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11972"
},
{
"name" : "42314",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42314"
},
{
"name" : "43068",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43068"
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "ADV-2010-3046",
@ -98,9 +73,34 @@
"url": "http://www.vupen.com/english/advisories/2010/3046"
},
{
"name" : "ADV-2011-0212",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0212"
"name": "oval:org.mitre.oval:def:11972",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11972"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "APPLE-SA-2010-11-18-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html"
},
{
"name": "42314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42314"
},
{
"name": "http://support.apple.com/kb/HT4456",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4456"
},
{
"name": "APPLE-SA-2010-11-22-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-3971",
"STATE": "PUBLIC"
},
@ -53,54 +53,69 @@
"references": {
"reference_data": [
{
"name" : "15708",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/15708"
},
{
"name" : "15746",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/15746"
},
{
"name" : "20101208 IE CSS parser dos bug",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2010/Dec/110"
},
{
"name" : "http://www.breakingpointsystems.com/community/blog/ie-vulnerability/",
"refsource" : "MISC",
"url" : "http://www.breakingpointsystems.com/community/blog/ie-vulnerability/"
},
{
"name" : "http://www.wooyun.org/bugs/wooyun-2010-0885",
"refsource" : "MISC",
"url" : "http://www.wooyun.org/bugs/wooyun-2010-0885"
"name": "VU#634956",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/634956"
},
{
"name": "http://www.microsoft.com/technet/security/advisory/2488013.mspx",
"refsource": "MISC",
"url": "http://www.microsoft.com/technet/security/advisory/2488013.mspx"
},
{
"name": "15746",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15746"
},
{
"name": "http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx",
"refsource": "MISC",
"url": "http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx"
},
{
"name": "http://www.breakingpointsystems.com/community/blog/ie-vulnerability/",
"refsource": "MISC",
"url": "http://www.breakingpointsystems.com/community/blog/ie-vulnerability/"
},
{
"name": "http://support.avaya.com/css/P8/documents/100127294",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100127294"
},
{
"name": "ADV-2011-0318",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0318"
},
{
"name": "15708",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15708"
},
{
"name": "ADV-2010-3156",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3156"
},
{
"name": "MS11-003",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-003"
},
{
"name" : "VU#634956",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/634956"
"name": "1024922",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024922"
},
{
"name": "http://www.wooyun.org/bugs/wooyun-2010-0885",
"refsource": "MISC",
"url": "http://www.wooyun.org/bugs/wooyun-2010-0885"
},
{
"name": "20101208 IE CSS parser dos bug",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2010/Dec/110"
},
{
"name": "45246",
@ -112,25 +127,10 @@
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12382"
},
{
"name" : "1024922",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024922"
},
{
"name": "42510",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42510"
},
{
"name" : "ADV-2010-3156",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/3156"
},
{
"name" : "ADV-2011-0318",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0318"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-0039",
"STATE": "PUBLIC"
},
@ -52,26 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "MS11-014",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-014"
},
{
"name": "46152",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46152"
},
{
"name" : "oval:org.mitre.oval:def:12537",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12537"
},
{
"name" : "1025049",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025049"
},
{
"name": "43253",
"refsource": "SECUNIA",
@ -81,6 +66,21 @@
"name": "ADV-2011-0327",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0327"
},
{
"name": "MS11-014",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-014"
},
{
"name": "1025049",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025049"
},
{
"name": "oval:org.mitre.oval:def:12537",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12537"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-0848",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
},
{
"name": "TA11-201A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-1229",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
"refsource" : "MISC",
"url" : "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
},
{
"name" : "http://support.avaya.com/css/P8/documents/100133352",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100133352"
},
{
"name" : "MS11-034",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
"name": "47229",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47229"
},
{
"name": "TA11-102A",
@ -73,29 +63,14 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
},
{
"name" : "47229",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/47229"
"name": "mswin-win32k-var17-priv-escalation(66411)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411"
},
{
"name" : "71735",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/71735"
},
{
"name" : "oval:org.mitre.oval:def:12503",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503"
},
{
"name" : "1025345",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025345"
},
{
"name" : "44156",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44156"
"name": "MS11-034",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
},
{
"name": "ADV-2011-0952",
@ -103,9 +78,34 @@
"url": "http://www.vupen.com/english/advisories/2011/0952"
},
{
"name" : "mswin-win32k-var17-priv-escalation(66411)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411"
"name": "oval:org.mitre.oval:def:12503",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503"
},
{
"name": "http://support.avaya.com/css/P8/documents/100133352",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100133352"
},
{
"name": "44156",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44156"
},
{
"name": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
"refsource": "MISC",
"url": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
},
{
"name": "1025345",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025345"
},
{
"name": "71735",
"refsource": "OSVDB",
"url": "http://osvdb.org/71735"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg24029663",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg24029663"
},
{
"name": "IO11882",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11882"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg24029663",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1958",
"STATE": "PUBLIC"
},
@ -53,44 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110531 CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/05/31/20"
},
{
"name" : "[oss-security] 20110601 Re: CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/06/01/1"
},
{
"name" : "[oss-security] 20110601 Re: CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/06/01/11"
},
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2011-07.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2011-07.html"
},
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2011-08.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2011-08.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=710184",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=710184"
},
{
"name" : "DSA-2274",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2274"
},
{
"name" : "FEDORA-2011-7821",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html"
"name": "44958",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44958"
},
{
"name": "FEDORA-2011-7846",
@ -98,49 +63,84 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html"
},
{
"name" : "FEDORA-2011-7858",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html"
"name": "http://www.wireshark.org/security/wnpa-sec-2011-07.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2011-07.html"
},
{
"name": "RHSA-2013:0125",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0125.html"
},
{
"name": "48947",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48947"
},
{
"name": "48066",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48066"
},
{
"name" : "oval:org.mitre.oval:def:15045",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15045"
"name": "http://www.wireshark.org/security/wnpa-sec-2011-08.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2011-08.html"
},
{
"name": "wireshark-diameter-dos(67791)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67791"
},
{
"name": "DSA-2274",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2274"
},
{
"name": "44449",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44449"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=710184",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=710184"
},
{
"name": "[oss-security] 20110601 Re: CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/06/01/11"
},
{
"name": "oval:org.mitre.oval:def:15045",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15045"
},
{
"name": "[oss-security] 20110601 Re: CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/06/01/1"
},
{
"name": "FEDORA-2011-7821",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html"
},
{
"name": "[oss-security] 20110531 CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/05/31/20"
},
{
"name": "FEDORA-2011-7858",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html"
},
{
"name": "45149",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45149"
},
{
"name" : "44958",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44958"
},
{
"name" : "48947",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48947"
},
{
"name" : "wireshark-diameter-dos(67791)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67791"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://blog.pfsense.org/?p=633",
"refsource" : "MISC",
"url" : "http://blog.pfsense.org/?p=633"
},
{
"name": "51169",
"refsource": "BID",
@ -67,15 +62,20 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/77981"
},
{
"name" : "46780",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46780"
},
{
"name": "pfsense-style-xss(72090)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72090"
},
{
"name": "http://blog.pfsense.org/?p=633",
"refsource": "MISC",
"url": "http://blog.pfsense.org/?p=633"
},
{
"name": "46780",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46780"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2014-3182",
"STATE": "PUBLIC"
},
@ -53,14 +53,19 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140911 Multiple Linux USB driver CVE assignment",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/09/11/21"
"name": "RHSA-2014:1318",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1318.html"
},
{
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=89",
"refsource" : "MISC",
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=89"
"name": "https://github.com/torvalds/linux/commit/ad3e14d7c5268c2e24477c6ef54bbdf88add5d36",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/ad3e14d7c5268c2e24477c6ef54bbdf88add5d36"
},
{
"name": "69770",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69770"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ad3e14d7c5268c2e24477c6ef54bbdf88add5d36",
@ -72,25 +77,20 @@
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2"
},
{
"name": "[oss-security] 20140911 Multiple Linux USB driver CVE assignment",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/09/11/21"
},
{
"name": "https://code.google.com/p/google-security-research/issues/detail?id=89",
"refsource": "MISC",
"url": "https://code.google.com/p/google-security-research/issues/detail?id=89"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1141210",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141210"
},
{
"name" : "https://github.com/torvalds/linux/commit/ad3e14d7c5268c2e24477c6ef54bbdf88add5d36",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/ad3e14d7c5268c2e24477c6ef54bbdf88add5d36"
},
{
"name" : "RHSA-2014:1318",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1318.html"
},
{
"name" : "69770",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69770"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3490",
"STATE": "PUBLIC"
},
@ -57,6 +57,26 @@
"refsource": "MISC",
"url": "https://github.com/ronsigal/Resteasy/commit/9b7d0f574cafdcf3bea5428f3145ab4908fc6d83"
},
{
"name": "RHSA-2015:0765",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html"
},
{
"name": "RHSA-2015:0675",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html"
},
{
"name": "60019",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60019"
},
{
"name": "RHSA-2015:0720",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html"
},
{
"name": "https://github.com/resteasy/Resteasy/pull/521",
"refsource": "CONFIRM",
@ -67,6 +87,26 @@
"refsource": "CONFIRM",
"url": "https://github.com/resteasy/Resteasy/pull/533"
},
{
"name": "RHSA-2014:1039",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1039.html"
},
{
"name": "69058",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69058"
},
{
"name": "RHSA-2015:0125",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0125.html"
},
{
"name": "RHSA-2014:1040",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1040.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
@ -77,50 +117,10 @@
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1011.html"
},
{
"name" : "RHSA-2014:1039",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1039.html"
},
{
"name" : "RHSA-2014:1040",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1040.html"
},
{
"name": "RHSA-2014:1298",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1298.html"
},
{
"name" : "RHSA-2015:0125",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0125.html"
},
{
"name" : "RHSA-2015:0675",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0675.html"
},
{
"name" : "RHSA-2015:0720",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0720.html"
},
{
"name" : "RHSA-2015:0765",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0765.html"
},
{
"name" : "69058",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69058"
},
{
"name" : "60019",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60019"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3604",
"STATE": "PUBLIC"
},
@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "http://juliusdavies.ca/svn/viewvc.cgi/not-yet-commons-ssl?view=rev&revision=172",
"refsource": "CONFIRM",
"url": "http://juliusdavies.ca/svn/viewvc.cgi/not-yet-commons-ssl?view=rev&revision=172"
},
{
"name": "notyetcommons-cve20143604-sec-bypass(97659)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97659"
},
{
"name": "RHSA-2015:1888",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1888.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1131803",
"refsource": "MISC",
@ -61,21 +76,6 @@
"name": "https://github.com/victims/victims-cve-db/blob/master/database/java/2014/3604.yaml",
"refsource": "MISC",
"url": "https://github.com/victims/victims-cve-db/blob/master/database/java/2014/3604.yaml"
},
{
"name" : "http://juliusdavies.ca/svn/viewvc.cgi/not-yet-commons-ssl?view=rev&revision=172",
"refsource" : "CONFIRM",
"url" : "http://juliusdavies.ca/svn/viewvc.cgi/not-yet-commons-ssl?view=rev&revision=172"
},
{
"name" : "RHSA-2015:1888",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1888.html"
},
{
"name" : "notyetcommons-cve20143604-sec-bypass(97659)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/97659"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6020",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "VU#202601",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/202601"
},
{
"name" : "VU#582497",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/582497"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6943",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#383441",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2014-7207",
"STATE": "PUBLIC"
},
@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "USN-2418-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2418-1"
},
{
"name": "USN-2417-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2417-1"
},
{
"name": "DSA-3060",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3060"
},
{
"name": "[oss-security] 20141102 CVE-2014-7207 assignment: Debian-specific Linux 3.2 backport issue",
"refsource": "MLIST",
@ -62,21 +77,6 @@
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766195"
},
{
"name" : "DSA-3060",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-3060"
},
{
"name" : "USN-2417-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2417-1"
},
{
"name" : "USN-2418-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2418-1"
},
{
"name": "70867",
"refsource": "BID",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-7311",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-7843",
"STATE": "PUBLIC"
},
@ -57,31 +57,31 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/11/13/5"
},
{
"name": "https://github.com/torvalds/linux/commit/97fc15436b36ee3956efad83e22a557991f7d19d",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/97fc15436b36ee3956efad83e22a557991f7d19d"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=97fc15436b36ee3956efad83e22a557991f7d19d",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=97fc15436b36ee3956efad83e22a557991f7d19d"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1163744",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163744"
},
{
"name" : "https://github.com/torvalds/linux/commit/97fc15436b36ee3956efad83e22a557991f7d19d",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/97fc15436b36ee3956efad83e22a557991f7d19d"
},
{
"name": "71082",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71082"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"
},
{
"name": "62305",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2014-7920",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://android.googlesource.com/platform/frameworks/av/+/36d1577%5E!/",
"refsource" : "CONFIRM",
"url" : "https://android.googlesource.com/platform/frameworks/av/+/36d1577%5E!/"
},
{
"name": "https://bits-please.blogspot.com/2016/01/android-privilege-escalation-to.html",
"refsource": "CONFIRM",
"url": "https://bits-please.blogspot.com/2016/01/android-privilege-escalation-to.html"
},
{
"name": "https://android.googlesource.com/platform/frameworks/av/+/36d1577%5E!/",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/36d1577%5E!/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-8000",
"STATE": "PUBLIC"
},
@ -62,6 +62,11 @@
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8000"
},
{
"name": "62558",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62558"
},
{
"name": "71173",
"refsource": "BID",
@ -72,11 +77,6 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031240"
},
{
"name" : "62558",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62558"
},
{
"name": "cisco-ucm-cve20148000-info-disc(98786)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2016-2282",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2016-2311",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2016-2342",
"STATE": "PUBLIC"
},
@ -53,49 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442",
"refsource" : "CONFIRM",
"url" : "http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442"
},
{
"name" : "http://nongnu.askapache.com//quagga/quagga-1.0.20160309.changelog.txt",
"refsource" : "CONFIRM",
"url" : "http://nongnu.askapache.com//quagga/quagga-1.0.20160309.changelog.txt"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "DSA-3532",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3532"
},
{
"name" : "GLSA-201610-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201610-03"
"name": "84318",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84318"
},
{
"name": "RHSA-2017:0794",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0794.html"
},
{
"name" : "openSUSE-SU-2016:0888",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-03/msg00117.html"
},
{
"name": "openSUSE-SU-2016:0863",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00102.html"
},
{
"name" : "USN-2941-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2941-1"
"name": "DSA-3532",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3532"
},
{
"name": "VU#270232",
@ -103,9 +78,34 @@
"url": "http://www.kb.cert.org/vuls/id/270232"
},
{
"name" : "84318",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/84318"
"name": "http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442"
},
{
"name": "GLSA-201610-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-03"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "openSUSE-SU-2016:0888",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00117.html"
},
{
"name": "http://nongnu.askapache.com//quagga/quagga-1.0.20160309.changelog.txt",
"refsource": "CONFIRM",
"url": "http://nongnu.askapache.com//quagga/quagga-1.0.20160309.changelog.txt"
},
{
"name": "USN-2941-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2941-1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-2498",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2615",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html",
"refsource" : "MISC",
"url" : "https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html"
},
{
"name": "https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-progress-sitefinity/index.html",
"refsource": "MISC",
"url": "https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-progress-sitefinity/index.html"
},
{
"name": "https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html"
}
]
}

View File

@ -53,25 +53,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://twitter.com/PTsecurity_UK/status/938447926128291842",
"refsource" : "MISC",
"url" : "https://twitter.com/PTsecurity_UK/status/938447926128291842"
},
{
"name" : "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
"refsource" : "CONFIRM",
"url" : "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr"
},
{
"name": "https://security.netapp.com/advisory/ntap-20171120-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171120-0001/"
},
{
"name" : "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
"name": "https://twitter.com/PTsecurity_UK/status/938447926128291842",
"refsource": "MISC",
"url": "https://twitter.com/PTsecurity_UK/status/938447926128291842"
},
{
"name": "101919",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101919"
},
{
"name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
"refsource": "CONFIRM",
"url" : "https://www.asus.com/News/wzeltG5CjYaIwGJ0"
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr"
},
{
"name": "https://www.synology.com/support/security/Synology_SA_17_73",
@ -84,9 +84,9 @@
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf"
},
{
"name" : "101919",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101919"
"name": "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
"refsource": "CONFIRM",
"url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0"
}
]
}