"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:17:59 +00:00
parent 7903d5f270
commit fe48c42d81
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 4372 additions and 4372 deletions

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2006-0011",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "20060111 eStara Softphone SIP stack Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/421596/100/0/threaded"
},
{
"name" : "16213",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16213"
"name": "22348",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22348"
},
{
"name": "ADV-2006-0167",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0167"
},
{
"name" : "22348",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22348"
},
{
"name" : "1015481",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015481"
},
{
"name": "18410",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18410"
},
{
"name": "20060111 eStara Softphone SIP stack Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/421596/100/0/threaded"
},
{
"name": "estara-sip-sdp-bo(24090)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24090"
},
{
"name": "16213",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16213"
},
{
"name": "1015481",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015481"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-0749",
"STATE": "PUBLIC"
},
@ -52,35 +52,100 @@
},
"references": {
"reference_data": [
{
"name" : "20060417 ZDI-06-009: Mozilla Firefox Tag Parsing Code Execution Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/431126/100/0/threaded"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-06-009.html",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-06-009.html"
},
{
"name": "http://www.mozilla.org/security/announce/2006/mfsa2006-18.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-18.html"
},
{
"name": "USN-275-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/275-1/"
},
{
"name": "oval:org.mitre.oval:def:11704",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11704"
},
{
"name": "RHSA-2006:0330",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0330.html"
},
{
"name": "SSRT061145",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
},
{
"name": "19902",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19902"
},
{
"name": "20060404-01-U",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc"
},
{
"name": "USN-276-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/276-1/"
},
{
"name": "HPSBUX02122",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name": "19941",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19941"
},
{
"name": "19780",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19780"
},
{
"name": "RHSA-2006:0328",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0328.html"
},
{
"name": "19821",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19821"
},
{
"name": "GLSA-200604-12",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml"
},
{
"name": "21622",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21622"
},
{
"name": "19862",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19862"
},
{
"name": "MDKSA-2006:075",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:075"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm"
},
{
"name" : "DSA-1044",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1044"
},
{
"name" : "DSA-1046",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1046"
"name": "19823",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19823"
},
{
"name": "DSA-1051",
@ -92,235 +157,40 @@
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html"
},
{
"name" : "FEDORA-2006-411",
"refsource" : "FEDORA",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html"
},
{
"name" : "FLSA:189137-1",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/436296/100/0/threaded"
},
{
"name" : "FLSA:189137-2",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/436338/100/0/threaded"
},
{
"name" : "GLSA-200604-12",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml"
},
{
"name" : "GLSA-200604-18",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml"
},
{
"name" : "GLSA-200605-09",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml"
},
{
"name" : "HPSBTU02118",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
},
{
"name" : "SSRT061145",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
},
{
"name" : "HPSBUX02122",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name" : "SSRT061158",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name" : "MDKSA-2006:075",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:075"
},
{
"name" : "MDKSA-2006:076",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:076"
},
{
"name" : "MDKSA-2006:078",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:078"
},
{
"name" : "RHSA-2006:0328",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0328.html"
},
{
"name" : "RHSA-2006:0329",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0329.html"
},
{
"name" : "RHSA-2006:0330",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0330.html"
},
{
"name" : "SCOSA-2006.26",
"refsource" : "SCO",
"url" : "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt"
},
{
"name" : "20060404-01-U",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc"
},
{
"name" : "102550",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1"
},
{
"name" : "228526",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1"
},
{
"name" : "SUSE-SA:2006:022",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_04_25.html"
},
{
"name" : "SUSE-SA:2006:021",
"refsource" : "SUSE",
"url" : "http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html"
},
{
"name" : "USN-275-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/275-1/"
},
{
"name" : "USN-276-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/276-1/"
},
{
"name": "USN-271-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/271-1/"
},
{
"name" : "TA06-107A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-107A.html"
},
{
"name" : "VU#736934",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/736934"
},
{
"name" : "17516",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17516"
},
{
"name" : "oval:org.mitre.oval:def:11704",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11704"
},
{
"name" : "ADV-2006-1356",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1356"
},
{
"name" : "ADV-2006-3391",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3391"
},
{
"name" : "oval:org.mitre.oval:def:1848",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1848"
},
{
"name" : "19631",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19631"
},
{
"name" : "19759",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19759"
},
{
"name" : "19794",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19794"
},
{
"name" : "19821",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19821"
},
{
"name" : "19811",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19811"
},
{
"name" : "19823",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19823"
},
{
"name" : "19852",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19852"
},
{
"name" : "19862",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19862"
},
{
"name" : "19863",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19863"
},
{
"name" : "19902",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19902"
},
{
"name" : "19950",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19950"
},
{
"name" : "19941",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19941"
},
{
"name": "19714",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19714"
},
{
"name" : "19721",
"name": "RHSA-2006:0329",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0329.html"
},
{
"name": "GLSA-200604-18",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml"
},
{
"name": "19811",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19721"
"url": "http://secunia.com/advisories/19811"
},
{
"name": "HPSBTU02118",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
},
{
"name": "19794",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19794"
},
{
"name": "19746",
@ -333,39 +203,169 @@
"url": "http://secunia.com/advisories/21033"
},
{
"name" : "21622",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21622"
"name": "102550",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1"
},
{
"name": "19696",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19696"
},
{
"name": "20060417 ZDI-06-009: Mozilla Firefox Tag Parsing Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/431126/100/0/threaded"
},
{
"name": "19759",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19759"
},
{
"name": "SUSE-SA:2006:021",
"refsource": "SUSE",
"url": "http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html"
},
{
"name": "FLSA:189137-2",
"refsource": "FEDORA",
"url": "http://www.securityfocus.com/archive/1/436338/100/0/threaded"
},
{
"name": "ADV-2006-1356",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1356"
},
{
"name": "mozilla-nshtmlcontentsink-memory-corruption(25819)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25819"
},
{
"name": "SSRT061158",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name": "VU#736934",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/736934"
},
{
"name": "MDKSA-2006:078",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:078"
},
{
"name": "19729",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19729"
},
{
"name" : "19780",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19780"
},
{
"name" : "20051",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20051"
},
{
"name": "729",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/729"
},
{
"name" : "mozilla-nshtmlcontentsink-memory-corruption(25819)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25819"
"name": "oval:org.mitre.oval:def:1848",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1848"
},
{
"name": "20051",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20051"
},
{
"name": "19863",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19863"
},
{
"name": "SCOSA-2006.26",
"refsource": "SCO",
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt"
},
{
"name": "TA06-107A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-107A.html"
},
{
"name": "FLSA:189137-1",
"refsource": "FEDORA",
"url": "http://www.securityfocus.com/archive/1/436296/100/0/threaded"
},
{
"name": "17516",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17516"
},
{
"name": "228526",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1"
},
{
"name": "FEDORA-2006-411",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html"
},
{
"name": "19852",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19852"
},
{
"name": "19721",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19721"
},
{
"name": "SUSE-SA:2006:022",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_04_25.html"
},
{
"name": "GLSA-200605-09",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml"
},
{
"name": "ADV-2006-3391",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3391"
},
{
"name": "19631",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19631"
},
{
"name": "19950",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19950"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-009.html",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-009.html"
},
{
"name": "MDKSA-2006:076",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:076"
},
{
"name": "DSA-1046",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1046"
},
{
"name": "DSA-1044",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1044"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://osvdb.org/ref/23/23469-limbo.txt",
"refsource" : "MISC",
"url" : "http://osvdb.org/ref/23/23469-limbo.txt"
},
{
"name" : "16811",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16811"
"name": "18723",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18723"
},
{
"name": "ADV-2006-0721",
@ -73,9 +68,14 @@
"url": "http://www.osvdb.org/23469"
},
{
"name" : "18723",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18723"
"name": "http://osvdb.org/ref/23/23469-limbo.txt",
"refsource": "MISC",
"url": "http://osvdb.org/ref/23/23469-limbo.txt"
},
{
"name": "16811",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16811"
},
{
"name": "webinsta-limbo-contact-form-xss(24877)",

View File

@ -52,15 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "FEDORA-2006-188",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00047.html"
},
{
"name": "beagle-beagle-status-privilege-escalation(25303)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25303"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=357392",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=357392"
},
{
"name" : "FEDORA-2006-188",
"refsource" : "FEDORA",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00047.html"
"name": "19278",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19278"
},
{
"name": "17195",
@ -72,20 +82,10 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23942"
},
{
"name" : "19278",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19278"
},
{
"name": "19336",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19336"
},
{
"name" : "beagle-beagle-status-privilege-escalation(25303)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25303"
}
]
}

View File

@ -57,25 +57,25 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26707"
},
{
"name": "docebo-multiple-file-include(26633)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26633"
},
{
"name": "26708",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26708"
},
{
"name" : "26709",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26709"
},
{
"name": "1016259",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016259"
},
{
"name" : "docebo-multiple-file-include(26633)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26633"
"name": "26709",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26709"
}
]
}

View File

@ -52,30 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20060629 Digital Armaments Security Advisory 29.06.2006: Siemens Speedstream Wireless Router Password Protection Bypass Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/438708/100/0/threaded"
},
{
"name" : "http://www.digitalarmaments.com/2006290674551938.html",
"refsource" : "MISC",
"url" : "http://www.digitalarmaments.com/2006290674551938.html"
},
{
"name" : "18843",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18843"
},
{
"name": "ADV-2006-2610",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2610"
},
{
"name" : "1016412",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016412"
"name": "20060629 Digital Armaments Security Advisory 29.06.2006: Siemens Speedstream Wireless Router Password Protection Bypass Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/438708/100/0/threaded"
},
{
"name": "20896",
@ -83,14 +68,29 @@
"url": "http://secunia.com/advisories/20896"
},
{
"name" : "1183",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1183"
"name": "18843",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18843"
},
{
"name": "http://www.digitalarmaments.com/2006290674551938.html",
"refsource": "MISC",
"url": "http://www.digitalarmaments.com/2006290674551938.html"
},
{
"name": "1016412",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016412"
},
{
"name": "speedstream-upnp-security-bypass(27582)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27582"
},
{
"name": "1183",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1183"
}
]
}

View File

@ -53,20 +53,40 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2006-101315.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2006-101315.html"
"name": "1016529",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016529"
},
{
"name" : "http://www.red-database-security.com/advisory/oracle_cpu_july_2006.html",
"refsource" : "MISC",
"url" : "http://www.red-database-security.com/advisory/oracle_cpu_july_2006.html"
"name": "19054",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19054"
},
{
"name": "oracle-cpu-july-2006(27897)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27897"
},
{
"name": "21165",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21165"
},
{
"name": "HPSBMA02133",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/440758/100/100/threaded"
},
{
"name": "ADV-2006-2947",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2947"
},
{
"name": "http://www.red-database-security.com/advisory/oracle_cpu_july_2006.html",
"refsource": "MISC",
"url": "http://www.red-database-security.com/advisory/oracle_cpu_july_2006.html"
},
{
"name": "SSRT061201",
"refsource": "HP",
@ -77,40 +97,20 @@
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-200A.html"
},
{
"name" : "19054",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19054"
},
{
"name" : "ADV-2006-2863",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2863"
},
{
"name" : "ADV-2006-2947",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2947"
},
{
"name" : "1016529",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016529"
},
{
"name": "21111",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21111"
},
{
"name" : "21165",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21165"
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2006-101315.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2006-101315.html"
},
{
"name" : "oracle-cpu-july-2006(27897)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27897"
"name": "ADV-2006-2863",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2863"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20060708 ATutor 1.5.3 Cross Site Scripting",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/439522"
"name": "28187",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/displayvuln.php?osvdb_id=28187"
},
{
"name": "atutor-registration-xss(27619)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27619"
},
{
"name": "20060711 Re: ATutor 1.5.3 Cross Site Scripting",
@ -63,14 +68,9 @@
"url": "http://www.securityfocus.com/archive/1/439873/100/100/threaded"
},
{
"name" : "28186",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/28186"
},
{
"name" : "28187",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/displayvuln.php?osvdb_id=28187"
"name": "20060708 ATutor 1.5.3 Cross Site Scripting",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/439522"
},
{
"name": "21008",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/21008"
},
{
"name" : "atutor-registration-xss(27619)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27619"
"name": "28186",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28186"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "yacscms-article-file-include(28682)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28682"
},
{
"name": "http://www.yetanothercommunitysystem.com/yacs/articles/view.php/1664",
"refsource": "CONFIRM",
"url": "http://www.yetanothercommunitysystem.com/yacs/articles/view.php/1664"
},
{
"name" : "2282",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2282"
},
{
"name": "ADV-2006-3425",
"refsource": "VUPEN",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/21680"
},
{
"name" : "yacscms-article-file-include(28682)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28682"
"name": "2282",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2282"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "20471",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20471"
},
{
"name": "ADV-2006-4016",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4016"
},
{
"name": "20061011 Sun Microsystems Solaris NSPR Library Arbitrary File Creation Vulnerability",
"refsource": "IDEFENSE",
@ -68,29 +78,9 @@
"url": "https://www.exploit-db.com/exploits/45433/"
},
{
"name" : "102658",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102658-1"
},
{
"name" : "20471",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20471"
},
{
"name" : "ADV-2006-4016",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4016"
},
{
"name" : "oval:org.mitre.oval:def:1819",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1819"
},
{
"name" : "1017050",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017050"
"name": "nspr-api-file-create(29489)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29489"
},
{
"name": "22348",
@ -98,9 +88,19 @@
"url": "http://secunia.com/advisories/22348"
},
{
"name" : "nspr-api-file-create(29489)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29489"
"name": "oval:org.mitre.oval:def:1819",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1819"
},
{
"name": "102658",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102658-1"
},
{
"name": "1017050",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017050"
}
]
}

View File

@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060916 BizDirectory all version xss",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/446223/100/0/threaded"
},
{
"name" : "20081",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20081"
},
{
"name" : "ADV-2006-3691",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3691"
},
{
"name" : "1016876",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016876"
},
{
"name": "21911",
"refsource": "SECUNIA",
@ -82,6 +62,26 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1611"
},
{
"name": "1016876",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016876"
},
{
"name": "ADV-2006-3691",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3691"
},
{
"name": "20060916 BizDirectory all version xss",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/446223/100/0/threaded"
},
{
"name": "20081",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20081"
},
{
"name": "bizdirectory-feed-xss(29002)",
"refsource": "XF",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "2665",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2665"
},
{
"name": "20785",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20785"
},
{
"name": "2665",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2665"
},
{
"name": "freepbx-upgrade-file-include(29879)",
"refsource": "XF",

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/511751/100/0/threaded"
},
{
"name" : "40691",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40691"
},
{
"name": "di604-iptextfield-xss(59364)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59364"
},
{
"name": "40691",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40691"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2010-2833",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-3572",
"STATE": "PUBLIC"
},
@ -52,100 +52,55 @@
},
"references": {
"reference_data": [
{
"name" : "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html"
},
{
"name": "http://support.avaya.com/css/P8/documents/100114315",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100114315"
},
{
"name" : "http://support.avaya.com/css/P8/documents/100123193",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100123193"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name" : "HPSBUX02608",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
},
{
"name" : "SSRT100333",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
},
{
"name": "HPSBMU02799",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
},
{
"name": "SUSE-SA:2010:061",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html"
},
{
"name": "RHSA-2010:0770",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html"
},
{
"name" : "RHSA-2010:0786",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0786.html"
},
{
"name" : "RHSA-2010:0807",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0807.html"
},
{
"name" : "RHSA-2010:0873",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0873.html"
},
{
"name" : "RHSA-2010:0986",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0986.html"
"name": "SSRT100333",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
},
{
"name": "RHSA-2010:0987",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0987.html"
},
{
"name": "RHSA-2010:0986",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0986.html"
},
{
"name": "44954",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44954"
},
{
"name": "RHSA-2011:0880",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html"
},
{
"name" : "SUSE-SA:2010:061",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html"
},
{
"name" : "SUSE-SR:2010:019",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name" : "oval:org.mitre.oval:def:12240",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12240"
"name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html"
},
{
"name": "oval:org.mitre.oval:def:12544",
@ -153,9 +108,19 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12544"
},
{
"name" : "41967",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41967"
"name": "oval:org.mitre.oval:def:12240",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12240"
},
{
"name": "RHSA-2010:0873",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0873.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "42974",
@ -163,9 +128,44 @@
"url": "http://secunia.com/advisories/42974"
},
{
"name" : "44954",
"name": "HPSBUX02608",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
},
{
"name": "http://support.avaya.com/css/P8/documents/100123193",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100123193"
},
{
"name": "RHSA-2010:0786",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0786.html"
},
{
"name": "SUSE-SR:2010:019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "41967",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/44954"
"url": "http://secunia.com/advisories/41967"
},
{
"name": "RHSA-2010:0807",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0807.html"
},
{
"name": "ADV-2010-2745",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-3593",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
"name": "42925",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42925"
},
{
"name": "45902",
@ -67,16 +67,16 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024977"
},
{
"name" : "42925",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42925"
},
{
"name": "ADV-2011-0148",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0148"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
},
{
"name": "oracle-argus-ldap-unauth-access(64796)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-0103",
"STATE": "PUBLIC"
},
@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "20110412 Microsoft Excel Memory Corruption Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=901"
},
{
"name" : "MS11-021",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021"
},
{
"name": "TA11-102A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
},
{
"name" : "47244",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/47244"
"name": "20110412 Microsoft Excel Memory Corruption Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=901"
},
{
"name" : "71760",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/71760"
"name": "39122",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39122"
},
{
"name": "oval:org.mitre.oval:def:12616",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12616"
},
{
"name": "47244",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47244"
},
{
"name": "1025337",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025337"
},
{
"name" : "39122",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39122"
"name": "MS11-021",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021"
},
{
"name": "71760",
"refsource": "OSVDB",
"url": "http://osvdb.org/71760"
},
{
"name": "ADV-2011-0940",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0377",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
"name": "cisco-endpoint-ipaddress-dos(65616)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
},
{
"name": "1025112",
@ -63,9 +63,9 @@
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name" : "cisco-endpoint-ipaddress-dos(65616)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}

View File

@ -52,45 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "70753",
"refsource": "OSVDB",
"url": "http://osvdb.org/70753"
},
{
"name": "http://plone.org/products/plone/security/advisories/cve-2011-0720",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/cve-2011-0720"
},
{
"name" : "RHSA-2011:0393",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0393.html"
},
{
"name" : "RHSA-2011:0394",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0394.html"
},
{
"name": "46102",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46102"
},
{
"name" : "70753",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/70753"
},
{
"name" : "1025258",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025258"
},
{
"name": "43146",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43146"
},
{
"name" : "43914",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43914"
"name": "RHSA-2011:0393",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0393.html"
},
{
"name": "plone-unspec-priv-escalation(65099)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65099"
},
{
"name": "ADV-2011-0796",
@ -98,9 +88,19 @@
"url": "http://www.vupen.com/english/advisories/2011/0796"
},
{
"name" : "plone-unspec-priv-escalation(65099)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65099"
"name": "43914",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43914"
},
{
"name": "1025258",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025258"
},
{
"name": "RHSA-2011:0394",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0394.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-1333",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "http://cybozu.co.jp/products/dl/notice/detail/0019.html"
},
{
"name" : "JVN#80877328",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN80877328/index.html"
"name": "45063",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45063"
},
{
"name": "JVNDB-2011-000045",
@ -72,15 +72,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48446"
},
{
"name": "JVN#80877328",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN80877328/index.html"
},
{
"name": "73327",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/73327"
},
{
"name" : "45063",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/45063"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "maximo-imicon-xss(71996)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71996"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21584666",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21584666"
},
{
"name" : "IV09189",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV09189"
},
{
"name" : "52333",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/52333"
},
{
"name": "48299",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48299"
},
{
"name" : "maximo-imicon-xss(71996)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71996"
"name": "52333",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52333"
},
{
"name": "IV09189",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV09189"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20110322 NSOADV-2011-001: Symantec LiveUpdate Administrator CSRF vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/517109/100/0/threaded"
},
{
"name" : "17026",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/17026"
"name": "symantec-lua-gui-csrf(66213)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66213"
},
{
"name": "http://sotiriu.de/adv/NSOADV-2011-001.txt",
@ -77,25 +72,30 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46856"
},
{
"name" : "1025242",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1025242"
},
{
"name": "8166",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8166"
},
{
"name": "17026",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/17026"
},
{
"name": "ADV-2011-0727",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0727"
},
{
"name" : "symantec-lua-gui-csrf(66213)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66213"
"name": "1025242",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025242"
},
{
"name": "20110322 NSOADV-2011-001: Symantec LiveUpdate Administrator CSRF vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/517109/100/0/threaded"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1604",
"STATE": "PUBLIC"
},
@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "20110502 Re: ZDI-11-143: Cisco Unified CallManager xmldirectorylist.jsp SQL Injection Vulnerability",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html"
},
{
"name" : "20110427 Multiple Vulnerabilities in Cisco Unified Communications Manager",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b79904.shtml"
},
{
"name" : "47609",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/47609"
},
{
"name" : "1025449",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025449"
"name": "ucm-sip-dos(67122)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67122"
},
{
"name": "44331",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44331"
},
{
"name": "20110502 Re: ZDI-11-143: Cisco Unified CallManager xmldirectorylist.jsp SQL Injection Vulnerability",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html"
},
{
"name": "1025449",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025449"
},
{
"name": "47609",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47609"
},
{
"name": "ADV-2011-1122",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1122"
},
{
"name" : "ucm-sip-dos(67122)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67122"
"name": "20110427 Multiple Vulnerabilities in Cisco Unified Communications Manager",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b79904.shtml"
}
]
}

View File

@ -57,16 +57,16 @@
"refsource": "MISC",
"url": "http://www.androidpolice.com/2011/04/14/exclusive-vulnerability-in-skype-for-android-is-exposing-your-name-phone-number-chat-logs-and-a-lot-more/"
},
{
"name" : "http://www.theregister.co.uk/2011/04/15/skype_for_android_vulnerable/",
"refsource" : "MISC",
"url" : "http://www.theregister.co.uk/2011/04/15/skype_for_android_vulnerable/"
},
{
"name": "http://blogs.skype.com/security/2011/04/privacy_vulnerability_in_skype.html",
"refsource": "CONFIRM",
"url": "http://blogs.skype.com/security/2011/04/privacy_vulnerability_in_skype.html"
},
{
"name": "http://www.theregister.co.uk/2011/04/15/skype_for_android_vulnerable/",
"refsource": "MISC",
"url": "http://www.theregister.co.uk/2011/04/15/skype_for_android_vulnerable/"
},
{
"name": "1025387",
"refsource": "SECTRACK",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://zerodayinitiative.com/advisories/ZDI-11-260/",
"refsource" : "MISC",
"url" : "http://zerodayinitiative.com/advisories/ZDI-11-260/"
},
{
"name": "https://downloads.avaya.com/css/P8/documents/100146108",
"refsource": "CONFIRM",
"url": "https://downloads.avaya.com/css/P8/documents/100146108"
},
{
"name": "http://zerodayinitiative.com/advisories/ZDI-11-260/",
"refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-11-260/"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "DSA-2952",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2952"
},
{
"name" : "FreeBSD-SA-14:08",
"refsource" : "FREEBSD",
"url" : "http://www.freebsd.org/security/advisories/FreeBSD-SA-14:08.tcp.asc"
},
{
"name": "67153",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67153"
},
{
"name" : "1030172",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030172"
},
{
"name": "58293",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58293"
},
{
"name": "DSA-2952",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2952"
},
{
"name": "59034",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59034"
},
{
"name": "1030172",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030172"
},
{
"name": "FreeBSD-SA-14:08",
"refsource": "FREEBSD",
"url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14:08.tcp.asc"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-3105",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3340",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1030748",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030748"
},
{
"name": "20140819 Cisco Webex MeetMeNow Server Directory Traversal Vulnerability",
"refsource": "CISCO",
@ -62,11 +67,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69285"
},
{
"name" : "1030748",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030748"
},
{
"name": "cisco-webex-cve20143340-dir-trav(95358)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3708",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[openstack-announce] 20141028 [OSSA 2014-038] Nova network DoS through API filtering (CVE-2014-3708)",
"refsource" : "MLIST",
"url" : "http://lists.openstack.org/pipermail/openstack-announce/2014-October/000301.html"
},
{
"name" : "https://bugs.launchpad.net/nova/+bug/1358583",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/nova/+bug/1358583"
},
{
"name" : "RHSA-2015:0843",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0843.html"
"name": "70777",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70777"
},
{
"name": "RHSA-2015:0844",
@ -73,9 +63,19 @@
"url": "http://rhn.redhat.com/errata/RHSA-2015-0844.html"
},
{
"name" : "70777",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70777"
"name": "RHSA-2015:0843",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0843.html"
},
{
"name": "https://bugs.launchpad.net/nova/+bug/1358583",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/nova/+bug/1358583"
},
{
"name": "[openstack-announce] 20141028 [OSSA 2014-038] Nova network DoS through API filtering (CVE-2014-3708)",
"refsource": "MLIST",
"url": "http://lists.openstack.org/pipermail/openstack-announce/2014-October/000301.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6015",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#528817",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-6839",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#671641",
"refsource": "CERT-VN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7423",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#763161",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/763161"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#763161",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/763161"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-7501",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#582497",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#946465",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/946465"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -58,24 +58,24 @@
"url": "https://www.drupal.org/node/2236797"
},
{
"name" : "https://www.drupal.org/node/2236251",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/node/2236251"
"name": "bluemasters-drupal-xss(92537)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92537"
},
{
"name": "66782",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66782"
},
{
"name": "https://www.drupal.org/node/2236251",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2236251"
},
{
"name": "57829",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57829"
},
{
"name" : "bluemasters-drupal-xss(92537)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/92537"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-8153",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[openstack-announce] 20150108 [OSSA 2015-001] L3 agent denial of service with radvd 2.0+ (CVE-2014-8153)",
"refsource" : "MLIST",
"url" : "http://lists.openstack.org/pipermail/openstack-announce/2015-January/000320.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1169408",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1169408"
"name": "71961",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71961"
},
{
"name": "https://bugs.launchpad.net/neutron/+bug/1398779",
@ -73,9 +68,14 @@
"url": "https://bugs.launchpad.net/neutron/+bug/1399172"
},
{
"name" : "71961",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71961"
"name": "[openstack-announce] 20150108 [OSSA 2015-001] L3 agent denial of service with radvd 2.0+ (CVE-2014-8153)",
"refsource": "MLIST",
"url": "http://lists.openstack.org/pipermail/openstack-announce/2015-January/000320.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1169408",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169408"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8211",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8225",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "35052",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/35052"
},
{
"name": "113848",
"refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/113848"
},
{
"name": "35052",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/35052"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8849",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,21 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20160224 [KIS-2016-02] Magento <= 1.9.2.2 (RSS Feed) Information Disclosure Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/537601/100/0/threaded"
},
{
"name" : "20160223 [KIS-2016-02] Magento <= 1.9.2.2 (RSS Feed) Information Disclosure Vulnerability",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Feb/105"
},
{
"name": "http://karmainsecurity.com/KIS-2016-02",
"refsource": "MISC",
"url": "http://karmainsecurity.com/KIS-2016-02"
},
{
"name": "20160224 [KIS-2016-02] Magento <= 1.9.2.2 (RSS Feed) Information Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537601/100/0/threaded"
},
{
"name": "http://packetstormsecurity.com/files/135941/Magento-1.9.2.2-RSS-Feed-Information-Disclosure.html",
"refsource": "MISC",
@ -76,6 +71,11 @@
"name": "https://magento.com/security/patches/supee-7405",
"refsource": "CONFIRM",
"url": "https://magento.com/security/patches/supee-7405"
},
{
"name": "20160223 [KIS-2016-02] Magento <= 1.9.2.2 (RSS Feed) Information Disclosure Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Feb/105"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2016-09.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2016-09.html"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11985",
"refsource": "CONFIRM",
@ -67,6 +62,11 @@
"refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=96d585a5e9baef21e1eea8505d78305b034dc80e"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2016-09.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2016-09.html"
},
{
"name": "GLSA-201604-05",
"refsource": "GENTOO",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2755",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2017-5510",
"STATE": "PUBLIC"
},
@ -58,9 +58,14 @@
"url": "http://www.openwall.com/lists/oss-security/2017/01/16/6"
},
{
"name" : "[oss-security] 20170116 Re: CVE Request: Imagemagick: various flaws: memory corruption, out-of-bounds writes, memory leaks, double-frees, off-by-one errors",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/01/17/5"
"name": "https://github.com/ImageMagick/ImageMagick/commit/91cc3f36f2ccbd485a0456bab9aebe63b635da88",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/commit/91cc3f36f2ccbd485a0456bab9aebe63b635da88"
},
{
"name": "95755",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95755"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851376",
@ -68,34 +73,29 @@
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851376"
},
{
"name" : "https://github.com/ImageMagick/ImageMagick/commit/91cc3f36f2ccbd485a0456bab9aebe63b635da88",
"refsource" : "CONFIRM",
"url" : "https://github.com/ImageMagick/ImageMagick/commit/91cc3f36f2ccbd485a0456bab9aebe63b635da88"
},
{
"name" : "https://github.com/ImageMagick/ImageMagick/commit/e87af64b1ff1635a32d9b6162f1b0e260fb54ed9",
"refsource" : "CONFIRM",
"url" : "https://github.com/ImageMagick/ImageMagick/commit/e87af64b1ff1635a32d9b6162f1b0e260fb54ed9"
"name": "GLSA-201702-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-09"
},
{
"name": "https://github.com/ImageMagick/ImageMagick/issues/348",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/issues/348"
},
{
"name": "https://github.com/ImageMagick/ImageMagick/commit/e87af64b1ff1635a32d9b6162f1b0e260fb54ed9",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/commit/e87af64b1ff1635a32d9b6162f1b0e260fb54ed9"
},
{
"name": "DSA-3799",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3799"
},
{
"name" : "GLSA-201702-09",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201702-09"
},
{
"name" : "95755",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95755"
"name": "[oss-security] 20170116 Re: CVE Request: Imagemagick: various flaws: memory corruption, out-of-bounds writes, memory leaks, double-frees, off-by-one errors",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/01/17/5"
}
]
}