"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:45:10 +00:00
parent 1e4dc7bede
commit f484f56d72
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
49 changed files with 4365 additions and 4365 deletions

View File

@ -52,31 +52,41 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060126 [Argeniss] Oracle Database Buffer overflows vulnerabilities in public procedures of XDB.DBMS_XMLSCHEMA{_INT}",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0893.html"
},
{
"name" : "http://www.argeniss.com/research/ARGENISS-ADV-010601.txt",
"refsource" : "MISC",
"url" : "http://www.argeniss.com/research/ARGENISS-ADV-010601.txt"
},
{ {
"name": "http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf", "name": "http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf" "url": "http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html", "name": "oracle-january2006-update(24321)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24321"
}, },
{ {
"name": "http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html", "name": "http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html" "url": "http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html"
}, },
{
"name": "20060126 [Argeniss] Oracle Database Buffer overflows vulnerabilities in public procedures of XDB.DBMS_XMLSCHEMA{_INT}",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0893.html"
},
{
"name": "18493",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18493"
},
{
"name": "ADV-2006-0323",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0323"
},
{
"name": "16287",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16287"
},
{ {
"name": "TA06-018A", "name": "TA06-018A",
"refsource": "CERT", "refsource": "CERT",
@ -88,14 +98,9 @@
"url": "http://www.kb.cert.org/vuls/id/545804" "url": "http://www.kb.cert.org/vuls/id/545804"
}, },
{ {
"name" : "VU#891644", "name": "1015499",
"refsource" : "CERT-VN", "refsource": "SECTRACK",
"url" : "http://www.kb.cert.org/vuls/id/891644" "url": "http://securitytracker.com/id?1015499"
},
{
"name" : "16287",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16287"
}, },
{ {
"name": "ADV-2006-0243", "name": "ADV-2006-0243",
@ -103,19 +108,9 @@
"url": "http://www.vupen.com/english/advisories/2006/0243" "url": "http://www.vupen.com/english/advisories/2006/0243"
}, },
{ {
"name" : "ADV-2006-0323", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2006/0323" "url": "http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html"
},
{
"name" : "1015499",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015499"
},
{
"name" : "18493",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18493"
}, },
{ {
"name": "18608", "name": "18608",
@ -123,9 +118,14 @@
"url": "http://secunia.com/advisories/18608" "url": "http://secunia.com/advisories/18608"
}, },
{ {
"name" : "oracle-january2006-update(24321)", "name": "VU#891644",
"refsource" : "XF", "refsource": "CERT-VN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24321" "url": "http://www.kb.cert.org/vuls/id/891644"
},
{
"name": "http://www.argeniss.com/research/ARGENISS-ADV-010601.txt",
"refsource": "MISC",
"url": "http://www.argeniss.com/research/ARGENISS-ADV-010601.txt"
}, },
{ {
"name": "oracle-xdbdbmx-xmlschema-bo(24376)", "name": "oracle-xdbdbmx-xmlschema-bo(24376)",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-0292", "ID": "CVE-2006-0292",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,265 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2006/mfsa2006-01.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2006/mfsa2006-01.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=316885",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=316885"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm"
},
{
"name" : "DSA-1044",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1044"
},
{
"name" : "DSA-1046",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1046"
},
{
"name" : "DSA-1051",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1051"
},
{
"name" : "FEDORA-2006-075",
"refsource" : "FEDORA",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00005.html"
},
{
"name" : "FEDORA-2006-076",
"refsource" : "FEDORA",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00006.html"
},
{
"name" : "FLSA-2006:180036-2",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/425978/100/0/threaded"
},
{
"name" : "FLSA:180036-1",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/425975/100/0/threaded"
},
{
"name" : "GLSA-200604-12",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml"
},
{
"name" : "GLSA-200604-18",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml"
},
{
"name" : "GLSA-200605-09",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml"
},
{
"name" : "HPSBUX02122",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name" : "SSRT061158",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name" : "HPSBUX02156",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name" : "SSRT061236",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{ {
"name": "MDKSA-2006:036", "name": "MDKSA-2006:036",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:036" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:036"
}, },
{
"name" : "MDKSA-2006:078",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:078"
},
{
"name" : "MDKSA-2006:037",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:037"
},
{
"name" : "RHSA-2006:0199",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0199.html"
},
{
"name" : "RHSA-2006:0200",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0200.html"
},
{
"name" : "RHSA-2006:0330",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0330.html"
},
{
"name" : "SCOSA-2006.26",
"refsource" : "SCO",
"url" : "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt"
},
{
"name" : "20060201-01-U",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"
},
{
"name" : "102550",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1"
},
{
"name" : "228526",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1"
},
{
"name" : "SUSE-SA:2006:022",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_04_25.html"
},
{ {
"name": "USN-275-1", "name": "USN-275-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/275-1/" "url": "https://usn.ubuntu.com/275-1/"
}, },
{ {
"name" : "USN-276-1", "name": "RHSA-2006:0330",
"refsource" : "UBUNTU", "refsource": "REDHAT",
"url" : "https://usn.ubuntu.com/276-1/" "url": "http://www.redhat.com/support/errata/RHSA-2006-0330.html"
},
{
"name" : "USN-271-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/271-1/"
},
{
"name" : "16476",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16476"
},
{
"name" : "oval:org.mitre.oval:def:10016",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10016"
},
{
"name" : "ADV-2006-0413",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0413"
},
{
"name" : "ADV-2006-3391",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3391"
},
{
"name" : "ADV-2006-3749",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3749"
},
{
"name" : "oval:org.mitre.oval:def:670",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A670"
},
{
"name" : "1015570",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015570"
},
{
"name" : "18700",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18700"
},
{
"name" : "18703",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18703"
},
{
"name" : "18704",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18704"
},
{
"name" : "18708",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18708"
},
{
"name" : "18709",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18709"
},
{
"name" : "18705",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18705"
},
{
"name" : "18706",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18706"
},
{
"name" : "19230",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19230"
},
{
"name" : "19759",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19759"
},
{
"name" : "19821",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19821"
},
{
"name" : "19823",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19823"
},
{
"name" : "19852",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19852"
},
{
"name" : "19862",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19862"
},
{
"name" : "19863",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19863"
}, },
{ {
"name": "19902", "name": "19902",
@ -318,15 +73,135 @@
"url": "http://secunia.com/advisories/19902" "url": "http://secunia.com/advisories/19902"
}, },
{ {
"name" : "19950", "name": "mozilla-javascript-memory-corruption(24430)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/19950" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24430"
},
{
"name": "MDKSA-2006:037",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:037"
},
{
"name": "USN-276-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/276-1/"
},
{
"name": "HPSBUX02122",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
}, },
{ {
"name": "19941", "name": "19941",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19941" "url": "http://secunia.com/advisories/19941"
}, },
{
"name": "19780",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19780"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=316885",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=316885"
},
{
"name": "19821",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19821"
},
{
"name": "oval:org.mitre.oval:def:10016",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10016"
},
{
"name": "FEDORA-2006-075",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00005.html"
},
{
"name": "GLSA-200604-12",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml"
},
{
"name": "21622",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21622"
},
{
"name": "19862",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19862"
},
{
"name": "19230",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19230"
},
{
"name": "18704",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18704"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm"
},
{
"name": "19823",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19823"
},
{
"name": "DSA-1051",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1051"
},
{
"name": "18709",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18709"
},
{
"name": "ADV-2006-3749",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3749"
},
{
"name": "USN-271-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/271-1/"
},
{
"name": "18705",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18705"
},
{
"name": "GLSA-200604-18",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml"
},
{
"name": "16476",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16476"
},
{
"name": "ADV-2006-0413",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0413"
},
{
"name": "1015570",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015570"
},
{ {
"name": "19746", "name": "19746",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -338,29 +213,154 @@
"url": "http://secunia.com/advisories/21033" "url": "http://secunia.com/advisories/21033"
}, },
{ {
"name" : "21622", "name": "18700",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/21622" "url": "http://secunia.com/advisories/18700"
}, },
{ {
"name" : "19780", "name": "102550",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1"
},
{
"name": "19759",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19780" "url": "http://secunia.com/advisories/19759"
},
{
"name": "SSRT061236",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name": "RHSA-2006:0200",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0200.html"
},
{
"name": "oval:org.mitre.oval:def:670",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A670"
},
{
"name": "18706",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18706"
},
{
"name": "SSRT061158",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name": "FEDORA-2006-076",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00006.html"
},
{
"name": "MDKSA-2006:078",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:078"
},
{
"name": "RHSA-2006:0199",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0199.html"
}, },
{ {
"name": "20051", "name": "20051",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20051" "url": "http://secunia.com/advisories/20051"
}, },
{
"name": "19863",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19863"
},
{
"name": "HPSBUX02156",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name": "FLSA-2006:180036-2",
"refsource": "FEDORA",
"url": "http://www.securityfocus.com/archive/1/425978/100/0/threaded"
},
{
"name": "http://www.mozilla.org/security/announce/2006/mfsa2006-01.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-01.html"
},
{
"name": "20060201-01-U",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"
},
{
"name": "SCOSA-2006.26",
"refsource": "SCO",
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt"
},
{
"name": "18708",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18708"
},
{
"name": "FLSA:180036-1",
"refsource": "FEDORA",
"url": "http://www.securityfocus.com/archive/1/425975/100/0/threaded"
},
{
"name": "228526",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1"
},
{
"name": "19852",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19852"
},
{
"name": "SUSE-SA:2006:022",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_04_25.html"
},
{
"name": "GLSA-200605-09",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml"
},
{
"name": "ADV-2006-3391",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3391"
},
{
"name": "18703",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18703"
},
{ {
"name": "22065", "name": "22065",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22065" "url": "http://secunia.com/advisories/22065"
}, },
{ {
"name" : "mozilla-javascript-memory-corruption(24430)", "name": "19950",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24430" "url": "http://secunia.com/advisories/19950"
},
{
"name": "DSA-1046",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1046"
},
{
"name": "DSA-1044",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1044"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060201 [eVuln] Vanilla Guestbook Multiple XSS & SQL Injection Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/423957/100/0/threaded"
},
{ {
"name": "http://www.evuln.com/vulns/54/summary.html", "name": "http://www.evuln.com/vulns/54/summary.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.evuln.com/vulns/54/summary.html" "url": "http://www.evuln.com/vulns/54/summary.html"
}, },
{
"name" : "16464",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16464"
},
{ {
"name": "vanillaguestbook-messages-sql-injection(24412)", "name": "vanillaguestbook-messages-sql-injection(24412)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24412" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24412"
},
{
"name": "20060201 [eVuln] Vanilla Guestbook Multiple XSS & SQL Injection Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/423957/100/0/threaded"
},
{
"name": "16464",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16464"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "noahs-search-sql-injection(24896)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24896"
},
{ {
"name": "20060222 [KAPDA::#29]Noah's classifieds multiple vulnerabilities", "name": "20060222 [KAPDA::#29]Noah's classifieds multiple vulnerabilities",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/425783/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/425783/100/0/threaded"
}, },
{
"name" : "http://www.kapda.ir/advisory-268.html",
"refsource" : "MISC",
"url" : "http://www.kapda.ir/advisory-268.html"
},
{
"name" : "16773",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16773"
},
{
"name" : "ADV-2006-0703",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0703"
},
{ {
"name": "1015667", "name": "1015667",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015667" "url": "http://securitytracker.com/id?1015667"
}, },
{ {
"name" : "noahs-search-sql-injection(24896)", "name": "16773",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24896" "url": "http://www.securityfocus.com/bid/16773"
},
{
"name": "http://www.kapda.ir/advisory-268.html",
"refsource": "MISC",
"url": "http://www.kapda.ir/advisory-268.html"
},
{
"name": "ADV-2006-0703",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0703"
} }
] ]
} }

View File

@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060612 [MajorSecurity #17] SixCMS <= 6 - Multiple XSS and directory traversal vulnerabilities", "name": "sixcms-detail-directory-traversal(27107)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/437047/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27107"
},
{
"name" : "20060619 Re: [MajorSecurity #17] SixCMS <= 6 - Multiple XSS and directory traversal vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/437639/100/0/threaded"
},
{
"name" : "http://www.majorsecurity.de/advisory/major_rls17.txt",
"refsource" : "MISC",
"url" : "http://www.majorsecurity.de/advisory/major_rls17.txt"
}, },
{ {
"name": "18395", "name": "18395",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/18395" "url": "http://www.securityfocus.com/bid/18395"
}, },
{
"name": "http://www.majorsecurity.de/advisory/major_rls17.txt",
"refsource": "MISC",
"url": "http://www.majorsecurity.de/advisory/major_rls17.txt"
},
{ {
"name": "1016282", "name": "1016282",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016282" "url": "http://securitytracker.com/id?1016282"
}, },
{
"name": "20060619 Re: [MajorSecurity #17] SixCMS <= 6 - Multiple XSS and directory traversal vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/437639/100/0/threaded"
},
{ {
"name": "1101", "name": "1101",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1101" "url": "http://securityreason.com/securityalert/1101"
}, },
{ {
"name" : "sixcms-detail-directory-traversal(27107)", "name": "20060612 [MajorSecurity #17] SixCMS <= 6 - Multiple XSS and directory traversal vulnerabilities",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27107" "url": "http://www.securityfocus.com/archive/1/437047/100/0/threaded"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://pridels0.blogspot.com/2006/06/anthill-sql-injection-vuln.html", "name": "anthill-buglist-query-sql-injection(27373)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://pridels0.blogspot.com/2006/06/anthill-sql-injection-vuln.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27373"
},
{
"name" : "18661",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18661"
}, },
{ {
"name": "ADV-2006-2529", "name": "ADV-2006-2529",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2529" "url": "http://www.vupen.com/english/advisories/2006/2529"
}, },
{
"name": "18661",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18661"
},
{ {
"name": "20838", "name": "20838",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20838" "url": "http://secunia.com/advisories/20838"
}, },
{ {
"name" : "anthill-buglist-query-sql-injection(27373)", "name": "http://pridels0.blogspot.com/2006/06/anthill-sql-injection-vuln.html",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27373" "url": "http://pridels0.blogspot.com/2006/06/anthill-sql-injection-vuln.html"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20060717 osDate 1.1.7 multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440490/100/0/threaded"
},
{
"name" : "20060719 Re: osDate 1.1.7 multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/440592/100/0/threaded"
},
{ {
"name": "20060813 osDate 1.1.8 - Multiple HTML Injection Vulnerability - fixed", "name": "20060813 osDate 1.1.8 - Multiple HTML Injection Vulnerability - fixed",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -71,6 +61,16 @@
"name": "1016700", "name": "1016700",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016700" "url": "http://securitytracker.com/id?1016700"
},
{
"name": "20060719 Re: osDate 1.1.7 multiple vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440592/100/0/threaded"
},
{
"name": "20060717 osDate 1.1.7 multiple vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440490/100/0/threaded"
} }
] ]
} }

View File

@ -53,14 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060508 Unfiltered Header Injection in Apache 1.3.34/2.0.57/2.2.1", "name": "20060801-01-P",
"refsource" : "BUGTRAQ", "refsource": "SGI",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-05/0151.html" "url": "ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P"
}, },
{ {
"name" : "20060724 Write-up by Amit Klein: \"Forging HTTP request headers with Flash\"", "name": "ADV-2010-1572",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-07/0425.html" "url": "http://www.vupen.com/english/advisories/2010/1572"
}, },
{ {
"name": "http://svn.apache.org/viewvc?view=rev&revision=394965", "name": "http://svn.apache.org/viewvc?view=rev&revision=394965",
@ -68,209 +68,44 @@
"url": "http://svn.apache.org/viewvc?view=rev&revision=394965" "url": "http://svn.apache.org/viewvc?view=rev&revision=394965"
}, },
{ {
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-194.htm", "name": "28749",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-194.htm" "url": "http://secunia.com/advisories/28749"
},
{
"name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117",
"refsource" : "CONFIRM",
"url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117"
},
{
"name" : "http://kb.vmware.com/KanisaPlatform/Publishing/466/5915871_f.SAL_Public.html",
"refsource" : "CONFIRM",
"url" : "http://kb.vmware.com/KanisaPlatform/Publishing/466/5915871_f.SAL_Public.html"
}, },
{ {
"name": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-2.html", "name": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-2.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-2.html" "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-2.html"
}, },
{
"name" : "PK24631",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631"
},
{
"name" : "PK27875",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg24013080"
},
{ {
"name": "DSA-1167", "name": "DSA-1167",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1167" "url": "http://www.debian.org/security/2006/dsa-1167"
}, },
{
"name" : "HPSBUX02465",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=125631037611762&w=2"
},
{
"name" : "SSRT090192",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=125631037611762&w=2"
},
{
"name" : "HPSBUX02612",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=129190899612998&w=2"
},
{
"name" : "SSRT100345",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=129190899612998&w=2"
},
{
"name" : "HPSBOV02683",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
},
{
"name" : "SSRT090208",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
},
{
"name" : "[3.9] 012: SECURITY FIX: October 7, 2006",
"refsource" : "OPENBSD",
"url" : "http://openbsd.org/errata.html#httpd2"
},
{
"name" : "RHSA-2006:0618",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2006-0618.html"
},
{
"name" : "RHSA-2006:0619",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0619.html"
},
{
"name" : "RHSA-2006:0692",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2006-0692.html"
},
{
"name" : "20060801-01-P",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P"
},
{
"name" : "SUSE-SA:2006:051",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_51_apache.html"
},
{
"name" : "SUSE-SA:2008:021",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html"
},
{
"name" : "USN-575-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-575-1"
},
{ {
"name": "19661", "name": "19661",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/19661" "url": "http://www.securityfocus.com/bid/19661"
}, },
{
"name" : "oval:org.mitre.oval:def:10352",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10352"
},
{
"name" : "oval:org.mitre.oval:def:12238",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12238"
},
{
"name" : "1024144",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024144"
},
{
"name" : "40256",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40256"
},
{
"name" : "ADV-2006-2963",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2963"
},
{
"name" : "ADV-2006-2964",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2964"
},
{
"name" : "ADV-2006-3264",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3264"
},
{
"name" : "ADV-2006-4207",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4207"
},
{
"name" : "ADV-2006-5089",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/5089"
},
{
"name" : "1016569",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016569"
},
{
"name" : "21172",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21172"
},
{
"name" : "21174",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21174"
},
{
"name" : "21399",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21399"
},
{
"name" : "21478",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21478"
},
{
"name" : "21848",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21848"
},
{
"name" : "21598",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21598"
},
{ {
"name": "21744", "name": "21744",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21744" "url": "http://secunia.com/advisories/21744"
}, },
{ {
"name" : "21986", "name": "20060724 Write-up by Amit Klein: \"Forging HTTP request headers with Flash\"",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/21986" "url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0425.html"
}, },
{ {
"name" : "22140", "name": "HPSBUX02465",
"refsource" : "SECUNIA", "refsource": "HP",
"url" : "http://secunia.com/advisories/22140" "url": "http://marc.info/?l=bugtraq&m=125631037611762&w=2"
},
{
"name": "1024144",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024144"
}, },
{ {
"name": "22317", "name": "22317",
@ -283,9 +118,144 @@
"url": "http://secunia.com/advisories/22523" "url": "http://secunia.com/advisories/22523"
}, },
{ {
"name" : "28749", "name": "SSRT090208",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
},
{
"name": "ADV-2006-5089",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5089"
},
{
"name": "ADV-2006-3264",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3264"
},
{
"name": "20060508 Unfiltered Header Injection in Apache 1.3.34/2.0.57/2.2.1",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-05/0151.html"
},
{
"name": "21598",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/28749" "url": "http://secunia.com/advisories/21598"
},
{
"name": "21399",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21399"
},
{
"name": "SSRT090192",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=125631037611762&w=2"
},
{
"name": "oval:org.mitre.oval:def:10352",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10352"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-194.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-194.htm"
},
{
"name": "21478",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21478"
},
{
"name": "RHSA-2006:0619",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0619.html"
},
{
"name": "21986",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21986"
},
{
"name": "HPSBUX02612",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=129190899612998&w=2"
},
{
"name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117",
"refsource": "CONFIRM",
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117"
},
{
"name": "ADV-2006-4207",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4207"
},
{
"name": "HPSBOV02683",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
},
{
"name": "21848",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21848"
},
{
"name": "RHSA-2006:0618",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0618.html"
},
{
"name": "PK24631",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631"
},
{
"name": "SUSE-SA:2008:021",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html"
},
{
"name": "RHSA-2006:0692",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0692.html"
},
{
"name": "40256",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40256"
},
{
"name": "SUSE-SA:2006:051",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_51_apache.html"
},
{
"name": "ADV-2006-2963",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2963"
},
{
"name": "21174",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21174"
},
{
"name": "SSRT100345",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=129190899612998&w=2"
},
{
"name": "USN-575-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-575-1"
},
{
"name": "oval:org.mitre.oval:def:12238",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12238"
}, },
{ {
"name": "29640", "name": "29640",
@ -298,9 +268,39 @@
"url": "http://securityreason.com/securityalert/1294" "url": "http://securityreason.com/securityalert/1294"
}, },
{ {
"name" : "ADV-2010-1572", "name": "[3.9] 012: SECURITY FIX: October 7, 2006",
"refsource": "OPENBSD",
"url": "http://openbsd.org/errata.html#httpd2"
},
{
"name": "PK27875",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg24013080"
},
{
"name": "21172",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21172"
},
{
"name": "http://kb.vmware.com/KanisaPlatform/Publishing/466/5915871_f.SAL_Public.html",
"refsource": "CONFIRM",
"url": "http://kb.vmware.com/KanisaPlatform/Publishing/466/5915871_f.SAL_Public.html"
},
{
"name": "1016569",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016569"
},
{
"name": "ADV-2006-2964",
"refsource": "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1572" "url": "http://www.vupen.com/english/advisories/2006/2964"
},
{
"name": "22140",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22140"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060815 otopholder 1.8 suffers from a local file inclusion,XSS and directory listing vuln", "name": "fotopholder-index-obtain-information(28399)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-08/0316.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28399"
},
{
"name" : "28243",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/28243"
},
{
"name" : "1016702",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016702"
}, },
{ {
"name": "1421", "name": "1421",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1421" "url": "http://securityreason.com/securityalert/1421"
}, },
{
"name" : "fotopholder-index-obtain-information(28399)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28399"
},
{ {
"name": "fotopholder-index-file-include(28398)", "name": "fotopholder-index-file-include(28398)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28398" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28398"
},
{
"name": "28243",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28243"
},
{
"name": "20060815 otopholder 1.8 suffers from a local file inclusion,XSS and directory listing vuln",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-08/0316.html"
},
{
"name": "1016702",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016702"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "phpbb-alltopics-sql-injection(28538)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28538"
},
{ {
"name": "2248", "name": "2248",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "19682", "name": "19682",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/19682" "url": "http://www.securityfocus.com/bid/19682"
},
{
"name" : "phpbb-alltopics-sql-injection(28538)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28538"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2010-1247",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1247"
},
{ {
"name": "FreeBSD-SA-10:04", "name": "FreeBSD-SA-10:04",
"refsource": "FREEBSD", "refsource": "FREEBSD",
@ -66,11 +71,6 @@
"name": "1024038", "name": "1024038",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024038" "url": "http://securitytracker.com/id?1024038"
},
{
"name" : "ADV-2010-1247",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1247"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://drupal.org/node/802508", "name": "heartbeat-unspecified-xss(58702)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://drupal.org/node/802508" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58702"
}, },
{ {
"name": "http://drupal.org/node/803570", "name": "http://drupal.org/node/803570",
@ -63,9 +63,9 @@
"url": "http://drupal.org/node/803570" "url": "http://drupal.org/node/803570"
}, },
{ {
"name" : "40268", "name": "http://drupal.org/node/802508",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/40268" "url": "http://drupal.org/node/802508"
}, },
{ {
"name": "39893", "name": "39893",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/39893" "url": "http://secunia.com/advisories/39893"
}, },
{ {
"name" : "heartbeat-unspecified-xss(58702)", "name": "40268",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58702" "url": "http://www.securityfocus.com/bid/40268"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2244", "ID": "CVE-2010-2244",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,36 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20100623 CVE Request: avahi DoS",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/06/23/4"
},
{ {
"name": "[oss-security] 20100625 Re: CVE Request: avahi DoS", "name": "[oss-security] 20100625 Re: CVE Request: avahi DoS",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127748459505200&w=2" "url": "http://marc.info/?l=oss-security&m=127748459505200&w=2"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=607293", "name": "[oss-security] 20100623 CVE Request: avahi DoS",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=607293" "url": "http://www.openwall.com/lists/oss-security/2010/06/23/4"
},
{
"name" : "DSA-2086",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2086"
},
{
"name" : "FEDORA-2010-10581",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043820.html"
}, },
{ {
"name": "FEDORA-2010-10584", "name": "FEDORA-2010-10584",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043800.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043800.html"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=607293",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=607293"
},
{ {
"name": "MDVSA-2010:204", "name": "MDVSA-2010:204",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
@ -91,6 +81,16 @@
"name": "1024200", "name": "1024200",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024200" "url": "http://www.securitytracker.com/id?1024200"
},
{
"name": "DSA-2086",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2086"
},
{
"name": "FEDORA-2010-10581",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043820.html"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/13888" "url": "http://www.exploit-db.com/exploits/13888"
}, },
{
"name" : "65544",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/65544"
},
{ {
"name": "40214", "name": "40214",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40214" "url": "http://secunia.com/advisories/40214"
},
{
"name": "65544",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/65544"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://aluigi.altervista.org/adv/bf2urlz-adv.txt", "name": "40334",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://aluigi.altervista.org/adv/bf2urlz-adv.txt" "url": "http://secunia.com/advisories/40334"
},
{
"name" : "41262",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/41262"
}, },
{ {
"name": "65863", "name": "65863",
@ -68,9 +63,14 @@
"url": "http://osvdb.org/65863" "url": "http://osvdb.org/65863"
}, },
{ {
"name" : "40334", "name": "41262",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/40334" "url": "http://www.securityfocus.com/bid/41262"
},
{
"name": "http://aluigi.altervista.org/adv/bf2urlz-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/bf2urlz-adv.txt"
} }
] ]
} }

View File

@ -57,16 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/512132/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/512132/100/0/threaded"
}, },
{
"name" : "20100701 DDIVRT-2010-29 ALPHA Ethernet Adapter II Web-Manager 3.40.2 Authentication Bypass",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-07/0010.html"
},
{
"name" : "41288",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/41288"
},
{ {
"name": "66015", "name": "66015",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -76,6 +66,16 @@
"name": "40369", "name": "40369",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40369" "url": "http://secunia.com/advisories/40369"
},
{
"name": "20100701 DDIVRT-2010-29 ALPHA Ethernet Adapter II Web-Manager 3.40.2 Authentication Bypass",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-07/0010.html"
},
{
"name": "41288",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41288"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-3567", "ID": "CVE-2010-3567",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,80 +53,30 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "name": "http://support.avaya.com/css/P8/documents/100114327",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/516397/100/0/threaded" "url": "http://support.avaya.com/css/P8/documents/100114327"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html", "name": "RHSA-2010:0865",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html" "url": "http://www.redhat.com/support/errata/RHSA-2010-0865.html"
},
{
"name": "oval:org.mitre.oval:def:11714",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11714"
}, },
{ {
"name": "http://support.avaya.com/css/P8/documents/100114315", "name": "http://support.avaya.com/css/P8/documents/100114315",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100114315" "url": "http://support.avaya.com/css/P8/documents/100114315"
}, },
{
"name" : "http://support.avaya.com/css/P8/documents/100114327",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100114327"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=642197",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=642197"
},
{
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html"
},
{
"name" : "http://support.avaya.com/css/P8/documents/100123193",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100123193"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name" : "FEDORA-2010-16240",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html"
},
{
"name" : "FEDORA-2010-16294",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html"
},
{
"name" : "FEDORA-2010-16312",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html"
},
{ {
"name": "GLSA-201406-32", "name": "GLSA-201406-32",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
}, },
{
"name" : "HPSBUX02608",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
},
{
"name" : "SSRT100333",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
},
{ {
"name": "HPSBMU02799", "name": "HPSBMU02799",
"refsource": "HP", "refsource": "HP",
@ -138,24 +88,9 @@
"url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html" "url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html"
}, },
{ {
"name" : "RHSA-2010:0768", "name": "SSRT100333",
"refsource" : "REDHAT", "refsource": "HP",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0768.html" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
},
{
"name" : "RHSA-2010:0865",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0865.html"
},
{
"name" : "SUSE-SR:2010:019",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name" : "USN-1010-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1010-1"
}, },
{ {
"name": "43992", "name": "43992",
@ -163,9 +98,14 @@
"url": "http://www.securityfocus.com/bid/43992" "url": "http://www.securityfocus.com/bid/43992"
}, },
{ {
"name" : "oval:org.mitre.oval:def:11714", "name": "RHSA-2010:0768",
"refsource" : "OVAL", "refsource": "REDHAT",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11714" "url": "http://www.redhat.com/support/errata/RHSA-2010-0768.html"
},
{
"name": "FEDORA-2010-16240",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html"
}, },
{ {
"name": "oval:org.mitre.oval:def:12153", "name": "oval:org.mitre.oval:def:12153",
@ -173,24 +113,84 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12153" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12153"
}, },
{ {
"name" : "41972", "name": "USN-1010-1",
"refsource" : "SECUNIA", "refsource": "UBUNTU",
"url" : "http://secunia.com/advisories/41972" "url": "http://www.ubuntu.com/usn/USN-1010-1"
}, },
{ {
"name" : "42377", "name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/42377" "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
}, },
{ {
"name": "42974", "name": "42974",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42974" "url": "http://secunia.com/advisories/42974"
}, },
{
"name": "41972",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41972"
},
{ {
"name": "ADV-2010-3086", "name": "ADV-2010-3086",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3086" "url": "http://www.vupen.com/english/advisories/2010/3086"
},
{
"name": "HPSBUX02608",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=642197",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=642197"
},
{
"name": "http://support.avaya.com/css/P8/documents/100123193",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100123193"
},
{
"name": "42377",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42377"
},
{
"name": "SUSE-SR:2010:019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "FEDORA-2010-16312",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html"
},
{
"name": "FEDORA-2010-16294",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3848", "ID": "CVE-2010-3848",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "43056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43056"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=644156",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=644156"
},
{
"name": "SUSE-SA:2011:007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{ {
"name": "[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET", "name": "[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/30/1" "url": "http://openwall.com/lists/oss-security/2010/11/30/1"
}, },
{
"name": "ADV-2011-0298",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0298"
},
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a27e13d370415add3487949c60810e36069a23a6", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a27e13d370415add3487949c60810e36069a23a6",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,16 +87,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2" "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
}, },
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=644156",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=644156"
},
{
"name" : "DSA-2126",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2126"
},
{ {
"name": "MDVSA-2010:257", "name": "MDVSA-2010:257",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
@ -88,14 +98,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html"
}, },
{ {
"name" : "SUSE-SA:2011:007", "name": "ADV-2011-0375",
"refsource" : "SUSE", "refsource": "VUPEN",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" "url": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"name" : "SUSE-SA:2011:008",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
}, },
{ {
"name": "USN-1023-1", "name": "USN-1023-1",
@ -103,9 +108,9 @@
"url": "http://www.ubuntu.com/usn/USN-1023-1" "url": "http://www.ubuntu.com/usn/USN-1023-1"
}, },
{ {
"name" : "43056", "name": "SUSE-SA:2011:008",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/43056" "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
}, },
{ {
"name": "43291", "name": "43291",
@ -118,14 +123,9 @@
"url": "http://www.vupen.com/english/advisories/2011/0213" "url": "http://www.vupen.com/english/advisories/2011/0213"
}, },
{ {
"name" : "ADV-2011-0298", "name": "DSA-2126",
"refsource" : "VUPEN", "refsource": "DEBIAN",
"url" : "http://www.vupen.com/english/advisories/2011/0298" "url": "http://www.debian.org/security/2010/dsa-2126"
},
{
"name" : "ADV-2011-0375",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0375"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-3939", "ID": "CVE-2010-3939",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS10-098",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-098"
},
{ {
"name": "TA10-348A", "name": "TA10-348A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-348A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA10-348A.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:12252", "name": "MS10-098",
"refsource" : "OVAL", "refsource": "MS",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12252" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-098"
}, },
{ {
"name": "1024880", "name": "1024880",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024880" "url": "http://www.securitytracker.com/id?1024880"
},
{
"name": "oval:org.mitre.oval:def:12252",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12252"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2011-0890", "ID": "CVE-2011-0890",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBMA02647", "name": "hp-discovery-snmp-info-disclosure(66242)",
"refsource" : "HP", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=130082163516878&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66242"
},
{
"name" : "SSRT100383",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=130082163516878&w=2"
},
{
"name" : "46981",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/46981"
}, },
{ {
"name": "1025239", "name": "1025239",
@ -77,15 +67,25 @@
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8163" "url": "http://securityreason.com/securityalert/8163"
}, },
{
"name": "SSRT100383",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=130082163516878&w=2"
},
{
"name": "HPSBMA02647",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=130082163516878&w=2"
},
{ {
"name": "ADV-2011-0755", "name": "ADV-2011-0755",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0755" "url": "http://www.vupen.com/english/advisories/2011/0755"
}, },
{ {
"name" : "hp-discovery-snmp-info-disclosure(66242)", "name": "46981",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66242" "url": "http://www.securityfocus.com/bid/46981"
} }
] ]
} }

View File

@ -52,35 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20110304 CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/04/16"
},
{
"name" : "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/04/17"
},
{
"name" : "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/04/18"
},
{ {
"name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/04/19" "url": "http://openwall.com/lists/oss-security/2011/03/04/19"
}, },
{ {
"name" : "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110304 CVE Request -- logrotate -- nine issues",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/04/22" "url": "http://openwall.com/lists/oss-security/2011/03/04/16"
},
{
"name" : "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/04/24"
}, },
{ {
"name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
@ -90,12 +70,17 @@
{ {
"name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/04/26" "url": "http://openwall.com/lists/oss-security/2011/03/04/30"
}, },
{ {
"name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/04/27" "url": "http://openwall.com/lists/oss-security/2011/03/04/26"
},
{
"name": "[oss-security] 20110310 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/10/3"
}, },
{ {
"name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
@ -103,14 +88,14 @@
"url": "http://openwall.com/lists/oss-security/2011/03/04/28" "url": "http://openwall.com/lists/oss-security/2011/03/04/28"
}, },
{ {
"name" : "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110308 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/04/29" "url": "http://openwall.com/lists/oss-security/2011/03/08/5"
}, },
{ {
"name" : "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110307 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/04/30" "url": "http://openwall.com/lists/oss-security/2011/03/07/5"
}, },
{ {
"name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
@ -120,77 +105,7 @@
{ {
"name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/04/32" "url": "http://openwall.com/lists/oss-security/2011/03/04/17"
},
{
"name" : "[oss-security] 20110305 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/04/33"
},
{
"name" : "[oss-security] 20110305 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/05/4"
},
{
"name" : "[oss-security] 20110305 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/05/6"
},
{
"name" : "[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/05/8"
},
{
"name" : "[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/06/3"
},
{
"name" : "[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/06/4"
},
{
"name" : "[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/06/5"
},
{
"name" : "[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/06/6"
},
{
"name" : "[oss-security] 20110307 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/07/5"
},
{
"name" : "[oss-security] 20110307 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/07/6"
},
{
"name" : "[oss-security] 20110307 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/07/11"
},
{
"name" : "[oss-security] 20110308 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/08/5"
},
{
"name" : "[oss-security] 20110310 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/10/2"
},
{
"name" : "[oss-security] 20110310 Re: CVE Request -- logrotate -- nine issues",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/10/3"
}, },
{ {
"name": "[oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues",
@ -198,29 +113,114 @@
"url": "http://openwall.com/lists/oss-security/2011/03/10/6" "url": "http://openwall.com/lists/oss-security/2011/03/10/6"
}, },
{ {
"name" : "[oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/10/7" "url": "http://openwall.com/lists/oss-security/2011/03/06/3"
},
{
"name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/04/29"
},
{
"name": "[oss-security] 20110307 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/07/6"
},
{
"name": "[oss-security] 20110305 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/05/6"
},
{
"name": "[oss-security] 20110305 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/05/4"
},
{
"name": "[oss-security] 20110307 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/07/11"
},
{
"name": "[oss-security] 20110323 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/23/11"
},
{
"name": "[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/06/5"
},
{
"name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/04/18"
},
{
"name": "[oss-security] 20110310 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/10/2"
}, },
{ {
"name": "[oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/11/3" "url": "http://openwall.com/lists/oss-security/2011/03/11/3"
}, },
{
"name": "[oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/10/7"
},
{
"name": "[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/05/8"
},
{
"name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/04/22"
},
{ {
"name": "[oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/11/5" "url": "http://openwall.com/lists/oss-security/2011/03/11/5"
}, },
{
"name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/04/27"
},
{
"name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/04/32"
},
{ {
"name": "[oss-security] 20110314 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110314 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/14/26" "url": "http://openwall.com/lists/oss-security/2011/03/14/26"
}, },
{ {
"name" : "[oss-security] 20110323 Re: CVE Request -- logrotate -- nine issues", "name": "[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/03/23/11" "url": "http://openwall.com/lists/oss-security/2011/03/04/24"
},
{
"name": "[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/06/4"
},
{
"name": "[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/06/6"
},
{
"name": "[oss-security] 20110305 Re: CVE Request -- logrotate -- nine issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/04/33"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2011-1734", "ID": "CVE-2011-1734",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -62,6 +62,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-11-150/" "url": "http://zerodayinitiative.com/advisories/ZDI-11-150/"
}, },
{
"name": "47638",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47638"
},
{ {
"name": "HPSBMA02668", "name": "HPSBMA02668",
"refsource": "HP", "refsource": "HP",
@ -73,14 +78,9 @@
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02810240" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02810240"
}, },
{ {
"name" : "47638", "name": "44402",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/47638" "url": "http://secunia.com/advisories/44402"
},
{
"name" : "72193",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/72193"
}, },
{ {
"name": "1025454", "name": "1025454",
@ -88,9 +88,9 @@
"url": "http://www.securitytracker.com/id?1025454" "url": "http://www.securitytracker.com/id?1025454"
}, },
{ {
"name" : "44402", "name": "72193",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/44402" "url": "http://osvdb.org/72193"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2014-3192", "ID": "CVE-2014-3192",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html", "name": "1031647",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html" "url": "http://www.securitytracker.com/id/1031647"
}, },
{ {
"name" : "https://crbug.com/403276", "name": "http://support.apple.com/HT204245",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://crbug.com/403276" "url": "http://support.apple.com/HT204245"
},
{
"name": "RHSA-2014:1626",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1626.html"
},
{
"name": "http://support.apple.com/HT204246",
"refsource": "CONFIRM",
"url": "http://support.apple.com/HT204246"
},
{
"name": "APPLE-SA-2015-06-30-6",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html"
}, },
{ {
"name": "https://src.chromium.org/viewvc/blink?revision=182309&view=revision", "name": "https://src.chromium.org/viewvc/blink?revision=182309&view=revision",
@ -73,14 +88,14 @@
"url": "http://support.apple.com/HT204243" "url": "http://support.apple.com/HT204243"
}, },
{ {
"name" : "http://support.apple.com/HT204245", "name": "APPLE-SA-2015-01-27-2",
"refsource" : "CONFIRM", "refsource": "APPLE",
"url" : "http://support.apple.com/HT204245" "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html"
}, },
{ {
"name" : "http://support.apple.com/HT204246", "name": "APPLE-SA-2015-01-27-3",
"refsource" : "CONFIRM", "refsource": "APPLE",
"url" : "http://support.apple.com/HT204246" "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00002.html"
}, },
{ {
"name": "https://support.apple.com/kb/HT204949", "name": "https://support.apple.com/kb/HT204949",
@ -92,35 +107,20 @@
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html"
}, },
{
"name" : "APPLE-SA-2015-01-27-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html"
},
{
"name" : "APPLE-SA-2015-01-27-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Jan/msg00002.html"
},
{
"name" : "APPLE-SA-2015-06-30-6",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html"
},
{
"name" : "RHSA-2014:1626",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1626.html"
},
{ {
"name": "70273", "name": "70273",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/70273" "url": "http://www.securityfocus.com/bid/70273"
}, },
{ {
"name" : "1031647", "name": "https://crbug.com/403276",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1031647" "url": "https://crbug.com/403276"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3674", "ID": "CVE-2014-3674",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "RHSA-2014:1796",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1796.html"
},
{ {
"name": "RHSA-2014:1906", "name": "RHSA-2014:1906",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1906.html" "url": "http://rhn.redhat.com/errata/RHSA-2014-1906.html"
},
{
"name": "RHSA-2014:1796",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1796.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3706", "ID": "CVE-2014-3706",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1154977",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1154977"
},
{ {
"name": "101507", "name": "101507",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/101507" "url": "http://www.securityfocus.com/bid/101507"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1154977",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154977"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7455", "ID": "CVE-2014-7455",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#692673",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/692673"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#692673", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/692673" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7702", "ID": "CVE-2014-7702",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#367865", "name": "VU#367865",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "71589",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71589"
},
{ {
"name": "http://unbound.net/downloads/patch_cve_2014_8602.diff", "name": "http://unbound.net/downloads/patch_cve_2014_8602.diff",
"refsource": "MISC", "refsource": "MISC",
@ -63,34 +68,29 @@
"url": "http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html" "url": "http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html"
}, },
{ {
"name" : "https://unbound.net/downloads/CVE-2014-8602.txt", "name": "DSA-3097",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "https://unbound.net/downloads/CVE-2014-8602.txt" "url": "http://www.debian.org/security/2014/dsa-3097"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
}, },
{
"name" : "DSA-3097",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-3097"
},
{
"name" : "USN-2484-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2484-1"
},
{ {
"name": "VU#264212", "name": "VU#264212",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/264212" "url": "http://www.kb.cert.org/vuls/id/264212"
}, },
{ {
"name" : "71589", "name": "https://unbound.net/downloads/CVE-2014-8602.txt",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/71589" "url": "https://unbound.net/downloads/CVE-2014-8602.txt"
},
{
"name": "USN-2484-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2484-1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@suse.com",
"ID": "CVE-2014-8627", "ID": "CVE-2014-8627",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://polarssl.org/tech-updates/releases/polarssl-1.3.9-released",
"refsource" : "CONFIRM",
"url" : "https://polarssl.org/tech-updates/releases/polarssl-1.3.9-released"
},
{ {
"name": "openSUSE-SU-2014:1457", "name": "openSUSE-SU-2014:1457",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00079.html" "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00079.html"
}, },
{
"name": "https://polarssl.org/tech-updates/releases/polarssl-1.3.9-released",
"refsource": "CONFIRM",
"url": "https://polarssl.org/tech-updates/releases/polarssl-1.3.9-released"
},
{ {
"name": "61220", "name": "61220",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -53,15 +53,30 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "35222", "name": "1031216",
"refsource" : "EXPLOIT-DB", "refsource": "SECTRACK",
"url" : "http://www.exploit-db.com/exploits/35222" "url": "http://www.securitytracker.com/id/1031216"
}, },
{ {
"name": "http://packetstormsecurity.com/files/129084/F5-BIG-IP-10.1.0-Directory-Traversal.html", "name": "http://packetstormsecurity.com/files/129084/F5-BIG-IP-10.1.0-Directory-Traversal.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/129084/F5-BIG-IP-10.1.0-Directory-Traversal.html" "url": "http://packetstormsecurity.com/files/129084/F5-BIG-IP-10.1.0-Directory-Traversal.html"
}, },
{
"name": "f5-bigip-cve20148727-dir-trav(98676)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98676"
},
{
"name": "71063",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71063"
},
{
"name": "35222",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/35222"
},
{ {
"name": "https://support.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/product/relnote_11_0_0_ltm.html", "name": "https://support.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/product/relnote_11_0_0_ltm.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,21 +86,6 @@
"name": "https://support.f5.com/kb/en-us/solutions/public/13000/100/sol13109.html", "name": "https://support.f5.com/kb/en-us/solutions/public/13000/100/sol13109.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.f5.com/kb/en-us/solutions/public/13000/100/sol13109.html" "url": "https://support.f5.com/kb/en-us/solutions/public/13000/100/sol13109.html"
},
{
"name" : "71063",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71063"
},
{
"name" : "1031216",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031216"
},
{
"name" : "f5-bigip-cve20148727-dir-trav(98676)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98676"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-2313", "ID": "CVE-2016-2313",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://bugs.cacti.net/view.php?id=2656",
"refsource" : "CONFIRM",
"url" : "http://bugs.cacti.net/view.php?id=2656"
},
{
"name" : "http://www.cacti.net/release_notes_0_8_8g.php",
"refsource" : "CONFIRM",
"url" : "http://www.cacti.net/release_notes_0_8_8g.php"
},
{ {
"name": "GLSA-201607-05", "name": "GLSA-201607-05",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-05" "url": "https://security.gentoo.org/glsa/201607-05"
}, },
{ {
"name" : "GLSA-201711-10", "name": "1037745",
"refsource" : "GENTOO", "refsource": "SECTRACK",
"url" : "https://security.gentoo.org/glsa/201711-10" "url": "http://www.securitytracker.com/id/1037745"
},
{
"name" : "openSUSE-SU-2016:0437",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00077.html"
}, },
{ {
"name": "openSUSE-SU-2016:0438", "name": "openSUSE-SU-2016:0438",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00078.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00078.html"
}, },
{
"name": "http://www.cacti.net/release_notes_0_8_8g.php",
"refsource": "CONFIRM",
"url": "http://www.cacti.net/release_notes_0_8_8g.php"
},
{
"name": "openSUSE-SU-2016:0437",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00077.html"
},
{ {
"name": "openSUSE-SU-2016:0440", "name": "openSUSE-SU-2016:0440",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00080.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00080.html"
}, },
{ {
"name" : "1037745", "name": "http://bugs.cacti.net/view.php?id=2656",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1037745" "url": "http://bugs.cacti.net/view.php?id=2656"
},
{
"name": "GLSA-201711-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201711-10"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-2477", "ID": "CVE-2016-2477",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-06-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-06-01.html"
},
{ {
"name": "https://android.googlesource.com/platform/hardware/qcom/media/+/f22c2a0f0f9e030c240468d9d18b9297f001bcf0", "name": "https://android.googlesource.com/platform/hardware/qcom/media/+/f22c2a0f0f9e030c240468d9d18b9297f001bcf0",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/hardware/qcom/media/+/f22c2a0f0f9e030c240468d9d18b9297f001bcf0" "url": "https://android.googlesource.com/platform/hardware/qcom/media/+/f22c2a0f0f9e030c240468d9d18b9297f001bcf0"
},
{
"name": "http://source.android.com/security/bulletin/2016-06-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-06-01.html"
} }
] ]
} }

View File

@ -60,24 +60,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/113999", "name": "http://www.ibm.com/support/docview.wss?uid=swg22006455",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/113999" "url": "http://www.ibm.com/support/docview.wss?uid=swg22006455"
}, },
{ {
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006393", "name": "http://www.ibm.com/support/docview.wss?uid=swg22006393",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22006393" "url": "http://www.ibm.com/support/docview.wss?uid=swg22006393"
}, },
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22006455",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22006455"
},
{ {
"name": "102891", "name": "102891",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102891" "url": "http://www.securityfocus.com/bid/102891"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/113999",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/113999"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.phpmyadmin.net/security/PMASA-2016-40" "url": "https://www.phpmyadmin.net/security/PMASA-2016-40"
}, },
{
"name" : "GLSA-201701-32",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-32"
},
{ {
"name": "95044", "name": "95044",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95044" "url": "http://www.securityfocus.com/bid/95044"
},
{
"name": "GLSA-201701-32",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-32"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-6696", "ID": "CVE-2016-6696",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://source.android.com/security/bulletin/2016-10-01.html", "name": "93330",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://source.android.com/security/bulletin/2016-10-01.html" "url": "http://www.securityfocus.com/bid/93330"
}, },
{ {
"name": "https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c3c9341bfdf93606983f893a086cb33a487306e5", "name": "https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c3c9341bfdf93606983f893a086cb33a487306e5",
@ -63,9 +63,9 @@
"url": "https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c3c9341bfdf93606983f893a086cb33a487306e5" "url": "https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c3c9341bfdf93606983f893a086cb33a487306e5"
}, },
{ {
"name" : "93330", "name": "http://source.android.com/security/bulletin/2016-10-01.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/93330" "url": "http://source.android.com/security/bulletin/2016-10-01.html"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "40276", "name": "http://fortiguard.com/advisory/FG-IR-16-023",
"refsource" : "EXPLOIT-DB", "refsource": "CONFIRM",
"url" : "https://www.exploit-db.com/exploits/40276/" "url": "http://fortiguard.com/advisory/FG-IR-16-023"
},
{
"name" : "http://packetstormsecurity.com/files/138387/EGREGIOUSBLUNDER-Fortigate-Remote-Code-Execution.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/138387/EGREGIOUSBLUNDER-Fortigate-Remote-Code-Execution.html"
}, },
{ {
"name": "https://musalbas.com/2016/08/16/equation-group-firewall-operations-catalogue.html", "name": "https://musalbas.com/2016/08/16/equation-group-firewall-operations-catalogue.html",
@ -68,19 +63,24 @@
"url": "https://musalbas.com/2016/08/16/equation-group-firewall-operations-catalogue.html" "url": "https://musalbas.com/2016/08/16/equation-group-firewall-operations-catalogue.html"
}, },
{ {
"name" : "http://fortiguard.com/advisory/FG-IR-16-023", "name": "1036643",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://fortiguard.com/advisory/FG-IR-16-023" "url": "http://www.securitytracker.com/id/1036643"
},
{
"name": "http://packetstormsecurity.com/files/138387/EGREGIOUSBLUNDER-Fortigate-Remote-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/138387/EGREGIOUSBLUNDER-Fortigate-Remote-Code-Execution.html"
},
{
"name": "40276",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40276/"
}, },
{ {
"name": "92523", "name": "92523",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92523" "url": "http://www.securityfocus.com/bid/92523"
},
{
"name" : "1036643",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036643"
} }
] ]
} }

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://jira.atlassian.com/browse/JRASERVER-66719",
"refsource" : "CONFIRM",
"url" : "https://jira.atlassian.com/browse/JRASERVER-66719"
},
{ {
"name": "103086", "name": "103086",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103086" "url": "http://www.securityfocus.com/bid/103086"
},
{
"name": "https://jira.atlassian.com/browse/JRASERVER-66719",
"refsource": "CONFIRM",
"url": "https://jira.atlassian.com/browse/JRASERVER-66719"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "43056", "name": "95328",
"refsource" : "EXPLOIT-DB", "refsource": "BID",
"url" : "https://www.exploit-db.com/exploits/43056/" "url": "http://www.securityfocus.com/bid/95328"
}, },
{ {
"name": "http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/", "name": "http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/" "url": "http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/"
}, },
{
"name": "43056",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43056/"
},
{ {
"name": "https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md", "name": "https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md" "url": "https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md"
},
{
"name" : "95328",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95328"
} }
] ]
} }

View File

@ -53,44 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20170201 Multiple memory access issues in gstreamer", "name": "DSA-3822",
"refsource" : "MLIST", "refsource": "DEBIAN",
"url" : "http://www.openwall.com/lists/oss-security/2017/02/01/7" "url": "http://www.debian.org/security/2017/dsa-3822"
}, },
{ {
"name" : "[oss-security] 20170202 Re: Multiple memory access issues in gstreamer", "name": "96001",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2017/02/02/9" "url": "http://www.securityfocus.com/bid/96001"
}, },
{ {
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=777263", "name": "https://bugzilla.gnome.org/show_bug.cgi?id=777263",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=777263" "url": "https://bugzilla.gnome.org/show_bug.cgi?id=777263"
}, },
{
"name": "RHSA-2017:2060",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2060"
},
{
"name": "[oss-security] 20170202 Re: Multiple memory access issues in gstreamer",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/02/02/9"
},
{ {
"name": "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3", "name": "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3" "url": "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3"
}, },
{
"name" : "DSA-3822",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3822"
},
{ {
"name": "GLSA-201705-10", "name": "GLSA-201705-10",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201705-10" "url": "https://security.gentoo.org/glsa/201705-10"
}, },
{ {
"name" : "RHSA-2017:2060", "name": "[oss-security] 20170201 Multiple memory access issues in gstreamer",
"refsource" : "REDHAT", "refsource": "MLIST",
"url" : "https://access.redhat.com/errata/RHSA-2017:2060" "url": "http://www.openwall.com/lists/oss-security/2017/02/01/7"
},
{
"name" : "96001",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96001"
} }
] ]
} }