"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:20:00 +00:00
parent a455059926
commit ff34eeec9b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 3828 additions and 3828 deletions

View File

@ -52,30 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "22140",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22140"
},
{
"name": "20060101 [eVuln] VEGO Web Forum SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/420661/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/1/summary.html",
"refsource" : "MISC",
"url" : "http://evuln.com/vulns/1/summary.html"
},
{
"name" : "16107",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16107"
},
{
"name": "ADV-2006-0003",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0003"
},
{
"name" : "22140",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22140"
"name": "315",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/315"
},
{
"name": "18273",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/18273"
},
{
"name" : "315",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/315"
"name": "16107",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16107"
},
{
"name": "http://evuln.com/vulns/1/summary.html",
"refsource": "MISC",
"url": "http://evuln.com/vulns/1/summary.html"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "22929",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22929"
},
{
"name": "ADV-2006-0445",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0445"
},
{
"name": "18693",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18693"
},
{
"name": "20060203 phpBB 2.0.19 Cross Site Request Forgeries and XSS Admin",
"refsource": "FULLDISC",
@ -63,29 +78,14 @@
"url": "http://securityreason.com/achievement_securityalert/31"
},
{
"name" : "ADV-2006-0445",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0445"
},
{
"name" : "22929",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22929"
},
{
"name" : "18693",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18693"
"name": "phpbb-referer-header-http-xss(24497)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24497"
},
{
"name": "406",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/406"
},
{
"name" : "phpbb-referer-header-http-xss(24497)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24497"
}
]
}

View File

@ -52,6 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "23027",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23027"
},
{
"name": "phphd-add-xss(24513)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24513"
},
{
"name": "18793",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18793"
},
{
"name": "16586",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16586"
},
{
"name": "20060212 [eVuln] phphd Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
@ -61,26 +81,6 @@
"name": "http://www.evuln.com/vulns/60/summary.html",
"refsource": "MISC",
"url": "http://www.evuln.com/vulns/60/summary.html"
},
{
"name" : "16586",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16586"
},
{
"name" : "23027",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23027"
},
{
"name" : "18793",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18793"
},
{
"name" : "phphd-add-xss(24513)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24513"
}
]
}

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20060220 vendor dispute for CVE-2006-0669",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2006-February/000561.html"
},
{
"name": "16563",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16563"
},
{
"name" : "23509",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23509"
"name": "gasforumlight-archive-sql-injection(24616)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24616"
},
{
"name": "1015600",
@ -73,9 +68,14 @@
"url": "http://securitytracker.com/id?1015600"
},
{
"name" : "gasforumlight-archive-sql-injection(24616)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24616"
"name": "20060220 vendor dispute for CVE-2006-0669",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2006-February/000561.html"
},
{
"name": "23509",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23509"
}
]
}

View File

@ -58,34 +58,34 @@
"url": "http://www.securityfocus.com/archive/1/424729/100/0/threaded"
},
{
"name" : "http://retrogod.altervista.org/linpha_10_local.html",
"refsource" : "MISC",
"url" : "http://retrogod.altervista.org/linpha_10_local.html"
"name": "18808",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18808"
},
{
"name": "linpha-index-file-include(24663)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24663"
},
{
"name": "16592",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16592"
},
{
"name" : "ADV-2006-0535",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0535"
},
{
"name" : "18808",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18808"
},
{
"name": "426",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/426"
},
{
"name" : "linpha-index-file-include(24663)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24663"
"name": "http://retrogod.altervista.org/linpha_10_local.html",
"refsource": "MISC",
"url": "http://retrogod.altervista.org/linpha_10_local.html"
},
{
"name": "ADV-2006-0535",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0535"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23599"
},
{
"name" : "19074",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19074"
},
{
"name": "lettermerger-files-disclose-information(25020)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25020"
},
{
"name": "19074",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19074"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-1726",
"STATE": "PUBLIC"
},
@ -53,14 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2006/mfsa2006-28.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2006/mfsa2006-28.html"
"name": "ADV-2006-3748",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3748"
},
{
"name" : "HPSBTU02118",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
"name": "mozilla-valuetofunctionobject-sec-bypass(25825)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25825"
},
{
"name": "SSRT061145",
@ -68,9 +68,44 @@
"url": "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
},
{
"name" : "HPSBUX02153",
"name": "1015933",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015933"
},
{
"name": "1015932",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015932"
},
{
"name": "1015931",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015931"
},
{
"name": "ADV-2006-3749",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3749"
},
{
"name": "HPSBTU02118",
"refsource": "HP",
"url" : "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
"url": "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:1968",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1968"
},
{
"name": "ADV-2008-0083",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name": "VU#968814",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/968814"
},
{
"name": "SSRT061181",
@ -78,12 +113,27 @@
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name" : "HPSBUX02156",
"name": "ADV-2006-1356",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1356"
},
{
"name": "SSRT061236",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name" : "SSRT061236",
"name": "HPSBUX02153",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name": "19649",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19649"
},
{
"name": "HPSBUX02156",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
@ -92,80 +142,30 @@
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-107A.html"
},
{
"name" : "VU#968814",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/968814"
},
{
"name": "17516",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17516"
},
{
"name" : "ADV-2006-1356",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1356"
},
{
"name" : "ADV-2006-3748",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3748"
},
{
"name" : "ADV-2006-3749",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3749"
},
{
"name" : "ADV-2008-0083",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name" : "oval:org.mitre.oval:def:1968",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1968"
},
{
"name" : "1015931",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015931"
},
{
"name" : "1015932",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015932"
},
{
"name" : "1015933",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015933"
},
{
"name" : "19631",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19631"
},
{
"name" : "19649",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19649"
},
{
"name" : "22065",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22065"
},
{
"name": "22066",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22066"
},
{
"name" : "mozilla-valuetofunctionobject-sec-bypass(25825)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25825"
"name": "22065",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22065"
},
{
"name": "19631",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19631"
},
{
"name": "http://www.mozilla.org/security/announce/2006/mfsa2006-28.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-28.html"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "1682",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1682"
},
{
"name": "17572",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17572"
},
{
"name": "1682",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1682"
},
{
"name": "ADV-2006-1374",
"refsource": "VUPEN",

View File

@ -52,6 +52,101 @@
},
"references": {
"reference_data": [
{
"name": "21586",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21586"
},
{
"name": "https://issues.rpath.com/browse/RPL-577",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-577"
},
{
"name": "ADV-2007-2732",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2732"
},
{
"name": "DSA-1154",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1154"
},
{
"name": "21354",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21354"
},
{
"name": "22487",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22487"
},
{
"name": "1016689",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016689"
},
{
"name": "SUSE-SR:2006:023",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"name": "APPLE-SA-2007-07-31",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
},
{
"name": "ADV-2006-3271",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3271"
},
{
"name": "21444",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21444"
},
{
"name": "squirrelmail-compose-variable-overwrite(28365)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28365"
},
{
"name": "22080",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22080"
},
{
"name": "20060811 SquirrelMail issue is dynamic variable evaluation",
"refsource": "VIM",
"url": "http://attrition.org/pipermail/vim/2006-August/000970.html"
},
{
"name": "19486",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19486"
},
{
"name": "RHSA-2006:0668",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0668.html"
},
{
"name": "http://www.squirrelmail.org/patches/sqm1.4.7-expired-post-fix-full.patch",
"refsource": "MISC",
"url": "http://www.squirrelmail.org/patches/sqm1.4.7-expired-post-fix-full.patch"
},
{
"name": "http://www.squirrelmail.org/security/issue/2006-08-11",
"refsource": "CONFIRM",
"url": "http://www.squirrelmail.org/security/issue/2006-08-11"
},
{
"name": "22104",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22104"
},
{
"name": "20060811 SquirrelMail 1.4.8 released - fixes variable overwriting attack",
"refsource": "BUGTRAQ",
@ -68,69 +163,9 @@
"url": "http://marc.info/?l=full-disclosure&m=115532449024178&w=2"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=306172",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=306172"
},
{
"name" : "APPLE-SA-2007-07-31",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
},
{
"name" : "20060811 SquirrelMail issue is dynamic variable evaluation",
"refsource" : "VIM",
"url" : "http://attrition.org/pipermail/vim/2006-August/000970.html"
},
{
"name" : "https://issues.rpath.com/browse/RPL-577",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-577"
},
{
"name" : "http://www.squirrelmail.org/security/issue/2006-08-11",
"refsource" : "CONFIRM",
"url" : "http://www.squirrelmail.org/security/issue/2006-08-11"
},
{
"name" : "http://www.squirrelmail.org/patches/sqm1.4.7-expired-post-fix-full.patch",
"refsource" : "MISC",
"url" : "http://www.squirrelmail.org/patches/sqm1.4.7-expired-post-fix-full.patch"
},
{
"name" : "DSA-1154",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1154"
},
{
"name" : "MDKSA-2006:147",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:147"
},
{
"name" : "RHSA-2006:0668",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0668.html"
},
{
"name" : "20061001-01-P",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc"
},
{
"name" : "SUSE-SR:2006:023",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"name" : "19486",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19486"
},
{
"name" : "25159",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25159"
"name": "27917",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27917"
},
{
"name": "oval:org.mitre.oval:def:11533",
@ -138,64 +173,29 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11533"
},
{
"name" : "ADV-2006-3271",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3271"
"name": "http://docs.info.apple.com/article.html?artnum=306172",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=306172"
},
{
"name" : "ADV-2007-2732",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2732"
"name": "25159",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25159"
},
{
"name" : "27917",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27917"
"name": "20061001-01-P",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc"
},
{
"name" : "1016689",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016689"
},
{
"name" : "21354",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21354"
},
{
"name" : "21444",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21444"
},
{
"name" : "21586",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21586"
},
{
"name" : "22104",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22104"
},
{
"name" : "22487",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22487"
},
{
"name" : "22080",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22080"
"name": "MDKSA-2006:147",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:147"
},
{
"name": "26235",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26235"
},
{
"name" : "squirrelmail-compose-variable-overwrite(28365)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28365"
}
]
}

View File

@ -57,16 +57,16 @@
"refsource": "CONFIRM",
"url": "http://bugs.splitbrain.org/?do=details&id=926"
},
{
"name" : "GLSA-200609-20",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200609-20.xml"
},
{
"name": "ADV-2006-3851",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3851"
},
{
"name": "GLSA-200609-20",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200609-20.xml"
},
{
"name": "22192",
"refsource": "SECUNIA",

View File

@ -53,14 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20061025 [KAPDA::#61] - PacPoll <= 4.0 Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/449668/100/0/threaded"
"name": "1788",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1788"
},
{
"name" : "http://www.kapda.ir/advisory-445.html",
"refsource" : "MISC",
"url" : "http://www.kapda.ir/advisory-445.html"
"name": "pacpoll-addpoll-auth-bypass(29801)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29801"
},
{
"name": "20742",
@ -72,20 +72,20 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4208"
},
{
"name": "http://www.kapda.ir/advisory-445.html",
"refsource": "MISC",
"url": "http://www.kapda.ir/advisory-445.html"
},
{
"name": "20061025 [KAPDA::#61] - PacPoll <= 4.0 Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/449668/100/0/threaded"
},
{
"name": "22576",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22576"
},
{
"name" : "1788",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1788"
},
{
"name" : "pacpoll-addpoll-auth-bypass(29801)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29801"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-0289",
"STATE": "PUBLIC"
},
@ -57,6 +57,16 @@
"refsource": "CONFIRM",
"url": "http://bugs.splitbrain.org/index.php?do=details&task_id=1853"
},
{
"name": "FEDORA-2010-0770",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034729.html"
},
{
"name": "GLSA-201301-07",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201301-07.xml"
},
{
"name": "http://www.splitbrain.org/blog/2010-01/17-dokuwiki-security",
"refsource": "CONFIRM",
@ -73,25 +83,15 @@
"url": "http://www.debian.org/security/2010/dsa-1976"
},
{
"name" : "FEDORA-2010-0770",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034729.html"
"name": "61708",
"refsource": "OSVDB",
"url": "http://osvdb.org/61708"
},
{
"name": "FEDORA-2010-0800",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034831.html"
},
{
"name" : "GLSA-201301-07",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201301-07.xml"
},
{
"name" : "61708",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/61708"
},
{
"name": "38205",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-0522",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT4077",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4077"
},
{
"name": "APPLE-SA-2010-03-29-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT4077",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4077"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20100115 SEC Consult SA-20100115-0 :: Local file inclusion/execution and multiple CSRF vulnerabilities in LetoDMS (formerly MyDMS)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/508947/100/0/threaded"
"name": "38237",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38237"
},
{
"name": "https://www.sec-consult.com/files/20100115-0_mydms_file_inclusion.txt",
@ -63,24 +63,9 @@
"url": "https://www.sec-consult.com/files/20100115-0_mydms_file_inclusion.txt"
},
{
"name" : "DSA-2146",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2146"
},
{
"name" : "37828",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37828"
},
{
"name" : "61834",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/61834"
},
{
"name" : "38237",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38237"
"name": "letodms-oplogin-file-include(55709)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55709"
},
{
"name": "42900",
@ -88,9 +73,24 @@
"url": "http://secunia.com/advisories/42900"
},
{
"name" : "letodms-oplogin-file-include(55709)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55709"
"name": "37828",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37828"
},
{
"name": "20100115 SEC Consult SA-20100115-0 :: Local file inclusion/execution and multiple CSRF vulnerabilities in LetoDMS (formerly MyDMS)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/508947/100/0/threaded"
},
{
"name": "61834",
"refsource": "OSVDB",
"url": "http://osvdb.org/61834"
},
{
"name": "DSA-2146",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2146"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-2370",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2497",
"STATE": "PUBLIC"
},
@ -52,61 +52,61 @@
},
"references": {
"reference_data": [
{
"name" : "[freetype] 20100712 FreeType 2.4.0 has been released",
"refsource" : "MLIST",
"url" : "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
},
{
"name" : "[oss-security] 20100713 Multiple bugs in freetype",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=127905701201340&w=2"
},
{
"name" : "[oss-security] 20100714 Re: Multiple bugs in freetype",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=127909326909362&w=2"
},
{
"name" : "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc",
"refsource" : "CONFIRM",
"url" : "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=613154",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=613154"
},
{
"name": "https://savannah.nongnu.org/bugs/?30082",
"refsource": "CONFIRM",
"url": "https://savannah.nongnu.org/bugs/?30082"
},
{
"name" : "https://savannah.nongnu.org/bugs/?30083",
"refsource" : "CONFIRM",
"url" : "https://savannah.nongnu.org/bugs/?30083"
},
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4435"
},
{
"name": "[freetype] 20100712 FreeType 2.4.0 has been released",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
},
{
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "[oss-security] 20100714 Re: Multiple bugs in freetype",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
},
{
"name": "DSA-2070",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2070"
},
{
"name": "[oss-security] 20100713 Multiple bugs in freetype",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
},
{
"name": "MDVSA-2010:137",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613154",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613154"
},
{
"name": "https://savannah.nongnu.org/bugs/?30083",
"refsource": "CONFIRM",
"url": "https://savannah.nongnu.org/bugs/?30083"
},
{
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc"
},
{
"name": "48951",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3306",
"STATE": "PUBLIC"
},
@ -52,31 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "14925",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/14925/"
},
{
"name": "[oss-security] 20100916 CVE request: weborf: directory traversal",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/09/17/3"
},
{
"name" : "[oss-security] 20100917 Re: CVE request: weborf: directory traversal",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/09/17/8"
},
{
"name" : "http://code.google.com/p/weborf/source/detail?r=464",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/weborf/source/detail?r=464"
},
{
"name" : "http://galileo.dmi.unict.it/wiki/weborf/doku.php?id=news:released_0.12.3",
"refsource" : "CONFIRM",
"url" : "http://galileo.dmi.unict.it/wiki/weborf/doku.php?id=news:released_0.12.3"
},
{
"name": "67840",
"refsource": "OSVDB",
@ -86,6 +66,26 @@
"name": "41286",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41286"
},
{
"name": "http://code.google.com/p/weborf/source/detail?r=464",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/weborf/source/detail?r=464"
},
{
"name": "[oss-security] 20100917 Re: CVE request: weborf: directory traversal",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/09/17/8"
},
{
"name": "14925",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14925/"
},
{
"name": "http://galileo.dmi.unict.it/wiki/weborf/doku.php?id=news:released_0.12.3",
"refsource": "CONFIRM",
"url": "http://galileo.dmi.unict.it/wiki/weborf/doku.php?id=news:released_0.12.3"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2010-3409",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-3597",
"STATE": "PUBLIC"
},
@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
"name": "ADV-2011-0143",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0143"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640"
},
{
"name" : "45901",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/45901"
},
{
"name": "1024981",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024981"
},
{
"name": "oracle-outside-viewer-dos(64778)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64778"
},
{
"name": "45901",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45901"
},
{
"name": "42992",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42992"
},
{
"name" : "ADV-2011-0143",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0143"
},
{
"name" : "oracle-outside-viewer-dos(64778)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64778"
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-3619",
"STATE": "PUBLIC"
},
@ -53,9 +53,19 @@
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-21.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-21.html"
"name": "SUSE-SA:2010:048",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html"
},
{
"name": "ADV-2011-0191",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0191"
},
{
"name": "43025",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43025"
},
{
"name": "GLSA-201101-08",
@ -68,34 +78,24 @@
"url": "http://www.redhat.com/support/errata/RHSA-2010-0743.html"
},
{
"name" : "SUSE-SA:2010:048",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html"
},
{
"name" : "SUSE-SR:2010:019",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
"name": "http://www.adobe.com/support/security/bulletins/apsb10-21.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html"
},
{
"name": "TA10-279A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-279A.html"
},
{
"name": "SUSE-SR:2010:019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name": "oval:org.mitre.oval:def:7385",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7385"
},
{
"name" : "43025",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43025"
},
{
"name" : "ADV-2011-0191",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0191"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2010-3932",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,16 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "IO13306",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1IO13306"
},
{
"name": "44604",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44604"
},
{
"name": "ibm-tds-ber-ldap-dos(62977)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62977"
},
{
"name": "IO13306",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13306"
},
{
"name": "42116",
"refsource": "SECUNIA",
@ -71,11 +76,6 @@
"name": "ADV-2010-2863",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2863"
},
{
"name" : "ibm-tds-ber-ldap-dos(62977)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62977"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4541",
"STATE": "PUBLIC"
},
@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110103 CVE request for buffer overflows in gimp",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/01/03/2"
},
{
"name" : "[oss-security] 20110104 Re: CVE request for buffer overflows in gimp",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/01/04/7"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497",
"refsource" : "MISC",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=666793"
},
{
"name": "DSA-2426",
"refsource": "DEBIAN",
@ -83,64 +63,84 @@
"url": "http://security.gentoo.org/glsa/glsa-201209-23.xml"
},
{
"name" : "MDVSA-2011:103",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:103"
},
{
"name" : "RHSA-2011:0837",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0837.html"
},
{
"name" : "RHSA-2011:0838",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0838.html"
},
{
"name" : "RHSA-2011:0839",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0839.html"
},
{
"name" : "SUSE-SR:2011:005",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name" : "70281",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/70281"
},
{
"name" : "42771",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42771"
},
{
"name" : "44750",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/44750"
},
{
"name" : "50737",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50737"
},
{
"name" : "48236",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48236"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793"
},
{
"name": "ADV-2011-0016",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0016"
},
{
"name": "RHSA-2011:0839",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0839.html"
},
{
"name": "RHSA-2011:0837",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0837.html"
},
{
"name": "SUSE-SR:2011:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "RHSA-2011:0838",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0838.html"
},
{
"name": "[oss-security] 20110104 Re: CVE request for buffer overflows in gimp",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/04/7"
},
{
"name": "44750",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44750"
},
{
"name": "42771",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42771"
},
{
"name": "70281",
"refsource": "OSVDB",
"url": "http://osvdb.org/70281"
},
{
"name": "50737",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50737"
},
{
"name": "[oss-security] 20110103 CVE request for buffer overflows in gimp",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/01/03/2"
},
{
"name": "48236",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48236"
},
{
"name": "gimp-sphere-designer-bo(64581)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64581"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"
},
{
"name": "MDVSA-2011:103",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:103"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "http://blog.mybb.com/2010/04/13/mybb-1-4-12-released-security-maintenance-update/",
"refsource": "CONFIRM",
"url": "http://blog.mybb.com/2010/04/13/mybb-1-4-12-released-security-maintenance-update/"
},
{
"name": "http://dev.mybboard.net/issues/728",
"refsource": "CONFIRM",
"url": "http://dev.mybboard.net/issues/728"
},
{
"name": "[oss-security] 20101008 CVE request: mybb before 1.4.11 and before 1.4.12",
"refsource": "MLIST",
@ -67,16 +77,6 @@
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/12/06/2"
},
{
"name" : "http://blog.mybb.com/2010/04/13/mybb-1-4-12-released-security-maintenance-update/",
"refsource" : "CONFIRM",
"url" : "http://blog.mybb.com/2010/04/13/mybb-1-4-12-released-security-maintenance-update/"
},
{
"name" : "http://dev.mybboard.net/issues/728",
"refsource" : "CONFIRM",
"url" : "http://dev.mybboard.net/issues/728"
},
{
"name": "mybb-mycodes-security-bypass(64518)",
"refsource": "XF",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "15585",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/15585"
},
{
"name": "44992",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44992"
},
{
"name": "15585",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15585"
},
{
"name": "42324",
"refsource": "SECUNIA",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20100921 [ISecAuditors Security Advisories] Reflected XSS in Atmail WebMail < v6.2.0",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/513890/100/0/threaded"
},
{
"name" : "43377",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/43377"
"name": "41555",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41555"
},
{
"name": "68183",
@ -68,15 +63,20 @@
"url": "http://osvdb.org/68183"
},
{
"name" : "41555",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41555"
"name": "43377",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43377"
},
{
"name": "8455",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8455"
},
{
"name": "20100921 [ISecAuditors Security Advisories] Reflected XSS in Atmail WebMail < v6.2.0",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/513890/100/0/threaded"
},
{
"name": "atmail-index-xss(61958)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3582",
"STATE": "PUBLIC"
},

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://drupal.org/node/2267485",
"refsource" : "MISC",
"url" : "https://drupal.org/node/2267485"
},
{
"name": "https://drupal.org/node/2267475",
"refsource": "CONFIRM",
@ -67,6 +62,11 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67545"
},
{
"name": "https://drupal.org/node/2267485",
"refsource": "MISC",
"url": "https://drupal.org/node/2267485"
},
{
"name": "58399",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-4141",
"STATE": "PUBLIC"
},
@ -57,25 +57,25 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40685/"
},
{
"name" : "MS14-056",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056"
},
{
"name": "70342",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70342"
},
{
"name": "60968",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60968"
},
{
"name": "1031018",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031018"
},
{
"name" : "60968",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60968"
"name": "MS14-056",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "108851",
"refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/108851"
},
{
"name": "[oss-security] 20140704 X.Org intel driver dev snapshots, backlight helper issue",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q3/39"
},
{
"name" : "[oss-security] 20140711 Re: X.Org intel driver dev snapshots, backlight helper issue",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q3/138"
},
{
"name": "[xorg-commit] 20140704 xf86-video-intel: tools/backlight_helper.c",
"refsource": "MLIST",
"url": "http://lists.x.org/archives/xorg-commit/2014-July/036840.html"
},
{
"name" : "108851",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/show/osvdb/108851"
},
{
"name": "xorg-x86-driver-dir-traversal(94746)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94746"
},
{
"name": "[oss-security] 20140711 Re: X.Org intel driver dev snapshots, backlight helper issue",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q3/138"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8205",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8283",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-8832",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "macosx-cve20148832-info-disc(100528)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100528"
},
{
"name": "1031650",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031650"
},
{
"name": "http://support.apple.com/HT204244",
"refsource": "CONFIRM",
@ -61,16 +71,6 @@
"name": "APPLE-SA-2015-01-27-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html"
},
{
"name" : "1031650",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031650"
},
{
"name" : "macosx-cve20148832-info-disc(100528)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/100528"
}
]
}

View File

@ -57,6 +57,16 @@
"refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/7692"
},
{
"name": "wp-googleanalyticsbyyoast-xss(99053)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99053"
},
{
"name": "71330",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71330"
},
{
"name": "https://twitter.com/yoast/status/537569224307511296",
"refsource": "CONFIRM",
@ -66,16 +76,6 @@
"name": "https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/"
},
{
"name" : "71330",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71330"
},
{
"name" : "wp-googleanalyticsbyyoast-xss(99053)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/99053"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.com/files/129643/WordPress-twimp-wp-Cross-Site-Request-Forgery-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/129643/WordPress-twimp-wp-Cross-Site-Request-Forgery-Cross-Site-Scripting.html"
},
{
"name": "twimp-twimpwp-csrf(99380)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99380"
},
{
"name": "http://packetstormsecurity.com/files/129643/WordPress-twimp-wp-Cross-Site-Request-Forgery-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/129643/WordPress-twimp-wp-Cross-Site-Request-Forgery-Cross-Site-Scripting.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-2420",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-04-02.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-04-02.html"
},
{
"name": "https://android.googlesource.com/platform/system/core/+/669ecc2f5e80ff924fa20ce7445354a7c5bcfd98",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/system/core/+/669ecc2f5e80ff924fa20ce7445354a7c5bcfd98"
},
{
"name": "http://source.android.com/security/bulletin/2016-04-02.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-04-02.html"
},
{
"name": "https://android.googlesource.com/platform/system/core/+/81df1cc77722000f8d0025c1ab00ced123aa573c",
"refsource": "CONFIRM",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2714",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2746",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -58,15 +58,15 @@
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/118356"
},
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22005824",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22005824"
},
{
"name": "99926",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99926"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22005824",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22005824"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1370955",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1370955"
},
{
"name": "https://github.com/libtom/libtomcrypt/commit/5eb9743410ce4657e9d54fef26a2ee31a1b5dd0",
"refsource": "CONFIRM",
"url": "https://github.com/libtom/libtomcrypt/commit/5eb9743410ce4657e9d54fef26a2ee31a1b5dd0"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1370955",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370955"
},
{
"name": "https://www.op-tee.org/advisories/",
"refsource": "CONFIRM",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-6396",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20160907 Cisco Firepower Management Center and FireSIGHT System Software Malware Bypass Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss1"
},
{
"name": "92826",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1036756",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036756"
},
{
"name": "20160907 Cisco Firepower Management Center and FireSIGHT System Software Malware Bypass Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@symantec.com",
"ID": "CVE-2016-6594",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://bto.bluecoat.com/security-advisory/sa130",
"refsource" : "CONFIRM",
"url" : "https://bto.bluecoat.com/security-advisory/sa130"
},
{
"name": "91404",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91404"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa130",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa130"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.vapidlabs.com/advisory.php?v=172",
"refsource" : "MISC",
"url" : "http://www.vapidlabs.com/advisory.php?v=172"
},
{
"name": "94262",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94262"
},
{
"name": "http://www.vapidlabs.com/advisory.php?v=172",
"refsource": "MISC",
"url": "http://www.vapidlabs.com/advisory.php?v=172"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7593",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7745",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{