mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
819077d6c3
commit
0b95d249fd
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070111 easy-content filemanager",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/456622/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "33463",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33463"
|
||||
},
|
||||
{
|
||||
"name": "20070111 easy-content filemanager",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/456622/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "GLSA-200701-19",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200701-19.xml"
|
||||
"name": "ADV-2007-0305",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0305"
|
||||
},
|
||||
{
|
||||
"name": "23881",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23881"
|
||||
},
|
||||
{
|
||||
"name": "22195",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22195"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-0305",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0305"
|
||||
},
|
||||
{
|
||||
"name": "31617",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/31617"
|
||||
},
|
||||
{
|
||||
"name" : "23881",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23881"
|
||||
"name": "GLSA-200701-19",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200701-19.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070206 rPSA-2007-0025-1 postgresql postgresql-server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/459280/100/0/threaded"
|
||||
"name": "https://issues.rpath.com/browse/RPL-1025",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-1025"
|
||||
},
|
||||
{
|
||||
"name": "24050",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24050"
|
||||
},
|
||||
{
|
||||
"name": "22387",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22387"
|
||||
},
|
||||
{
|
||||
"name": "24513",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24513"
|
||||
},
|
||||
{
|
||||
"name": "24315",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24315"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11353",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11353"
|
||||
},
|
||||
{
|
||||
"name": "postgresql-datatype-information-disclosure(32191)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32191"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0068",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0068.html"
|
||||
},
|
||||
{
|
||||
"name": "20070208 rPSA-2007-0025-2 postgresql postgresql-server",
|
||||
@ -63,14 +98,49 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/459448/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[security-announce] 20070206 rPSA-2007-0025-1 postgresql postgresql-server",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.rpath.com/pipermail/security-announce/2007-February/000141.html"
|
||||
"name": "ADV-2007-0774",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0774"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.postgresql.org/support/security",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.postgresql.org/support/security"
|
||||
"name": "20070206 rPSA-2007-0025-1 postgresql postgresql-server",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/459280/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0478",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0478"
|
||||
},
|
||||
{
|
||||
"name": "24151",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24151"
|
||||
},
|
||||
{
|
||||
"name": "USN-417-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-417-2"
|
||||
},
|
||||
{
|
||||
"name": "24577",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24577"
|
||||
},
|
||||
{
|
||||
"name": "24033",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24033"
|
||||
},
|
||||
{
|
||||
"name": "1017597",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017597"
|
||||
},
|
||||
{
|
||||
"name": "USN-417-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/417-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-830",
|
||||
@ -78,14 +148,14 @@
|
||||
"url": "https://issues.rpath.com/browse/RPL-830"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.rpath.com/browse/RPL-1025",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.rpath.com/browse/RPL-1025"
|
||||
"name": "SUSE-SR:2007:010",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_10_sr.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm",
|
||||
"name": "http://www.postgresql.org/support/security",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm"
|
||||
"url": "http://www.postgresql.org/support/security"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2007-198",
|
||||
@ -93,9 +163,14 @@
|
||||
"url": "http://fedoranews.org/cms/node/2554"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200703-15",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200703-15.xml"
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm"
|
||||
},
|
||||
{
|
||||
"name": "2007-0007",
|
||||
"refsource": "TRUSTIX",
|
||||
"url": "http://www.trustix.org/errata/2007/0007"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:037",
|
||||
@ -107,120 +182,45 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0067.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0068",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0068.html"
|
||||
},
|
||||
{
|
||||
"name" : "102825",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102825-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2007:010",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_10_sr.html"
|
||||
},
|
||||
{
|
||||
"name" : "2007-0007",
|
||||
"refsource" : "TRUSTIX",
|
||||
"url" : "http://www.trustix.org/errata/2007/0007"
|
||||
},
|
||||
{
|
||||
"name" : "USN-417-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/417-1/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-417-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-417-2"
|
||||
},
|
||||
{
|
||||
"name" : "22387",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22387"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11353",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11353"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-0478",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0478"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-0774",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0774"
|
||||
},
|
||||
{
|
||||
"name" : "33302",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/33302"
|
||||
},
|
||||
{
|
||||
"name" : "1017597",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1017597"
|
||||
},
|
||||
{
|
||||
"name" : "24033",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24033"
|
||||
},
|
||||
{
|
||||
"name" : "24028",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24028"
|
||||
},
|
||||
{
|
||||
"name": "24057",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24057"
|
||||
},
|
||||
{
|
||||
"name" : "24050",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24050"
|
||||
},
|
||||
{
|
||||
"name" : "24042",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24042"
|
||||
},
|
||||
{
|
||||
"name" : "24151",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24151"
|
||||
},
|
||||
{
|
||||
"name" : "24315",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24315"
|
||||
},
|
||||
{
|
||||
"name" : "24513",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24513"
|
||||
},
|
||||
{
|
||||
"name" : "24577",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24577"
|
||||
},
|
||||
{
|
||||
"name": "25220",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25220"
|
||||
},
|
||||
{
|
||||
"name" : "postgresql-datatype-information-disclosure(32191)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32191"
|
||||
"name": "24042",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24042"
|
||||
},
|
||||
{
|
||||
"name": "24028",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24028"
|
||||
},
|
||||
{
|
||||
"name": "33302",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33302"
|
||||
},
|
||||
{
|
||||
"name": "[security-announce] 20070206 rPSA-2007-0025-1 postgresql postgresql-server",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.rpath.com/pipermail/security-announce/2007-February/000141.html"
|
||||
},
|
||||
{
|
||||
"name": "102825",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102825-1"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200703-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200703-15.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "34155",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/34155"
|
||||
},
|
||||
{
|
||||
"name": "20070513 MyBB version 1.2.4 Multiple Path Disclosure Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/468549/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "mybb-eventmembercaptcha-info-disclosure(34336)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34336"
|
||||
},
|
||||
{
|
||||
"name": "35549",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35549"
|
||||
},
|
||||
{
|
||||
"name": "35548",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35548"
|
||||
},
|
||||
{
|
||||
"name": "20070513 MyBB version 1.2.4 Multiple Path Disclosure Vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
@ -66,26 +86,6 @@
|
||||
"name": "http://www.netvigilance.com/advisory0017",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.netvigilance.com/advisory0017"
|
||||
},
|
||||
{
|
||||
"name" : "34155",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/34155"
|
||||
},
|
||||
{
|
||||
"name" : "35548",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35548"
|
||||
},
|
||||
{
|
||||
"name" : "35549",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35549"
|
||||
},
|
||||
{
|
||||
"name" : "mybb-eventmembercaptcha-info-disclosure(34336)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34336"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,25 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://lostmon.blogspot.com/2007/02/mail-searchpl-keywords-variable-cross.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://lostmon.blogspot.com/2007/02/mail-searchpl-keywords-variable-cross.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://kb.atmail.com/?p=410",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://kb.atmail.com/?p=410"
|
||||
"name": "@mail-search-xss(32483)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32483"
|
||||
},
|
||||
{
|
||||
"name": "22552",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22552"
|
||||
},
|
||||
{
|
||||
"name": "http://kb.atmail.com/?p=410",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.atmail.com/?p=410"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0603",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0603"
|
||||
},
|
||||
{
|
||||
"name": "http://lostmon.blogspot.com/2007/02/mail-searchpl-keywords-variable-cross.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://lostmon.blogspot.com/2007/02/mail-searchpl-keywords-variable-cross.html"
|
||||
},
|
||||
{
|
||||
"name": "33193",
|
||||
"refsource": "OSVDB",
|
||||
@ -81,11 +86,6 @@
|
||||
"name": "24155",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24155"
|
||||
},
|
||||
{
|
||||
"name" : "@mail-search-xss(32483)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32483"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,35 +57,35 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/461073/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "22698",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22698"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-0746",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0746"
|
||||
},
|
||||
{
|
||||
"name": "33758",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33758"
|
||||
},
|
||||
{
|
||||
"name" : "24301",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24301"
|
||||
},
|
||||
{
|
||||
"name": "2294",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2294"
|
||||
},
|
||||
{
|
||||
"name": "24301",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24301"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0746",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0746"
|
||||
},
|
||||
{
|
||||
"name": "xtcommerce-index-file-include(32656)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32656"
|
||||
},
|
||||
{
|
||||
"name": "22698",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22698"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3545",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3545"
|
||||
"name": "ADV-2007-1086",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1086"
|
||||
},
|
||||
{
|
||||
"name": "20070426 true: 2 distinct LMS RFI, one old, one new; and vague ACK",
|
||||
@ -67,25 +67,25 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23099"
|
||||
},
|
||||
{
|
||||
"name": "lms-userpanelwelcome-file-include(33158)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33158"
|
||||
},
|
||||
{
|
||||
"name": "23100",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23100"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1086",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1086"
|
||||
"name": "3545",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3545"
|
||||
},
|
||||
{
|
||||
"name": "24621",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24621"
|
||||
},
|
||||
{
|
||||
"name" : "lms-userpanelwelcome-file-include(33158)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33158"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2007-1743",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,11 +57,6 @@
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511"
|
||||
},
|
||||
{
|
||||
"name" : "[apache-http-dev] 20070328 [Fwd: iDefense Final Notice [IDEF1445]]",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2"
|
||||
},
|
||||
{
|
||||
"name": "[apache-http-dev] 20070328 Re: [Fwd: iDefense Final Notice [IDEF1445]]",
|
||||
"refsource": "MLIST",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "1017904",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1017904"
|
||||
},
|
||||
{
|
||||
"name": "[apache-http-dev] 20070328 [Fwd: iDefense Final Notice [IDEF1445]]",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Dror"
|
||||
},
|
||||
{
|
||||
"name" : "20070330 NACATTACK Presentation",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/en/US/products/products_security_response09186a00808110da.html"
|
||||
},
|
||||
{
|
||||
"name": "34123",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34123"
|
||||
},
|
||||
{
|
||||
"name": "20070330 NACATTACK Presentation",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/en/US/products/products_security_response09186a00808110da.html"
|
||||
},
|
||||
{
|
||||
"name": "cisco-acs-cta-unauthorized-access(33557)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/476283/100/0/threaded"
|
||||
"name": "3036",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3036"
|
||||
},
|
||||
{
|
||||
"name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html"
|
||||
},
|
||||
{
|
||||
"name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/476283/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://wouter.coekaerts.be/site/security/nowplaying",
|
||||
"refsource": "MISC",
|
||||
"url": "http://wouter.coekaerts.be/site/security/nowplaying"
|
||||
},
|
||||
{
|
||||
"name" : "3036",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3036"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,6 +62,11 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://pstgroup.blogspot.com/2007/09/exploitimail-iaspamdll-80x-remote-heap.html"
|
||||
},
|
||||
{
|
||||
"name": "ipswitch-imail-bo(36723)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36723"
|
||||
},
|
||||
{
|
||||
"name": "25762",
|
||||
"refsource": "BID",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "39390",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/39390"
|
||||
},
|
||||
{
|
||||
"name" : "ipswitch-imail-bo(36723)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36723"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=194713",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=194713"
|
||||
},
|
||||
{
|
||||
"name" : "[emacs-devel] 20071003 temp file hole?",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.gnu.org/archive/html/emacs-devel/2007-10/msg00132.html"
|
||||
},
|
||||
{
|
||||
"name": "[emacs-devel] 20071004 Re: temp file hole?",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.gnu.org/archive/html/emacs-devel/2007-10/msg00158.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200710-22",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200710-22.xml"
|
||||
},
|
||||
{
|
||||
"name" : "26072",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26072"
|
||||
},
|
||||
{
|
||||
"name" : "41752",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/41752"
|
||||
},
|
||||
{
|
||||
"name": "27244",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27244"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=194713",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=194713"
|
||||
},
|
||||
{
|
||||
"name": "27343",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27343"
|
||||
},
|
||||
{
|
||||
"name": "[emacs-devel] 20071003 temp file hole?",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.gnu.org/archive/html/emacs-devel/2007-10/msg00132.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200710-22",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-22.xml"
|
||||
},
|
||||
{
|
||||
"name": "41752",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/41752"
|
||||
},
|
||||
{
|
||||
"name": "26072",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26072"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4548",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4548"
|
||||
},
|
||||
{
|
||||
"name" : "http://lussumo.com/community/discussion/7214/vanilla-113-new-remote-blind-sql-injection-exploit-/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://lussumo.com/community/discussion/7214/vanilla-113-new-remote-blind-sql-injection-exploit-/"
|
||||
},
|
||||
{
|
||||
"name": "http://lussumo.com/swell/168/Vanilla-114-Released/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -82,10 +72,20 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27348"
|
||||
},
|
||||
{
|
||||
"name": "http://lussumo.com/community/discussion/7214/vanilla-113-new-remote-blind-sql-injection-exploit-/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://lussumo.com/community/discussion/7214/vanilla-113-new-remote-blind-sql-injection-exploit-/"
|
||||
},
|
||||
{
|
||||
"name": "vanilla-categoryid-sql-injection(37345)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37345"
|
||||
},
|
||||
{
|
||||
"name": "4548",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4548"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-3242",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -57,30 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782450"
|
||||
},
|
||||
{
|
||||
"name" : "http://advisories.mageia.org/MGASA-2015-0173.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://advisories.mageia.org/MGASA-2015-0173.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3228",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3228"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201701-50",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201701-50"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2015:222",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:222"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:2121",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-11/msg00147.html"
|
||||
"name": "DSA-3228",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3228"
|
||||
},
|
||||
{
|
||||
"name": "USN-2595-1",
|
||||
@ -91,6 +76,21 @@
|
||||
"name": "74163",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/74163"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-50",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-50"
|
||||
},
|
||||
{
|
||||
"name": "http://advisories.mageia.org/MGASA-2015-0173.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://advisories.mageia.org/MGASA-2015-0173.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:2121",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00147.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-3738",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/kb/HT205030",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/kb/HT205030"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/kb/HT205033",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/kb/HT205033"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205221",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205221"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-08-13-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
|
||||
"name": "1033274",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033274"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-08-13-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-09-16-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
|
||||
"name": "https://support.apple.com/kb/HT205030",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT205030"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0761",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-09-16-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-08-13-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "76338",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/76338"
|
||||
},
|
||||
{
|
||||
"name" : "1033274",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033274"
|
||||
"name": "APPLE-SA-2015-08-13-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/kb/HT205033",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT205033"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-3746",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/kb/HT205030",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/kb/HT205030"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/kb/HT205033",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/kb/HT205033"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205221",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205221"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-08-13-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
|
||||
"name": "1033274",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033274"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-08-13-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-09-16-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
|
||||
"name": "https://support.apple.com/kb/HT205030",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT205030"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0761",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-09-16-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-08-13-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "76338",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/76338"
|
||||
},
|
||||
{
|
||||
"name" : "1033274",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033274"
|
||||
"name": "APPLE-SA-2015-08-13-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/kb/HT205033",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT205033"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-3771",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/kb/HT205031",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/kb/HT205031"
|
||||
"name": "76340",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/76340"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-08-13-2",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "76340",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/76340"
|
||||
"name": "https://support.apple.com/kb/HT205031",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT205031"
|
||||
},
|
||||
{
|
||||
"name": "1033276",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2015-6471",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2015-6623",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2015-6699",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-477",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-477"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1033796",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033796"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-477",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-477"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2015-7652",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,49 +53,49 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "39020",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/39020/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-557",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-557"
|
||||
},
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201511-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201511-02"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:2023",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
|
||||
"name": "1034111",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034111"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:2024",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html"
|
||||
},
|
||||
{
|
||||
"name": "39020",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/39020/"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1984",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201511-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201511-02"
|
||||
},
|
||||
{
|
||||
"name": "77533",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/77533"
|
||||
},
|
||||
{
|
||||
"name" : "1034111",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1034111"
|
||||
"name": "RHSA-2015:2023",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-557",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-557"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "USN-2788-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2788-2"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150907 Heap overflow and DoS in unzip 6.0",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/09/07/4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20150915 Re: Heap overflow and DoS in unzip 6.0",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/09/15/6"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20151011 Re: Heap overflow and DoS in unzip 6.0",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/10/11/5"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/p/infozip/patches/23/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://sourceforge.net/p/infozip/patches/23/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3386",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3386"
|
||||
},
|
||||
{
|
||||
"name": "1034027",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034027"
|
||||
},
|
||||
{
|
||||
"name": "USN-2788-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2788-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2788-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2788-2"
|
||||
"name": "http://sourceforge.net/p/infozip/patches/23/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://sourceforge.net/p/infozip/patches/23/"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150915 Re: Heap overflow and DoS in unzip 6.0",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/09/15/6"
|
||||
},
|
||||
{
|
||||
"name": "76863",
|
||||
@ -93,9 +93,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/76863"
|
||||
},
|
||||
{
|
||||
"name" : "1034027",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1034027"
|
||||
"name": "[oss-security] 20151011 Re: Heap overflow and DoS in unzip 6.0",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/10/11/5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20151029 CVE-2015-7724 - Privilege Escalation Via Symlink Attacks On POSIX Shared Memory With Insecure Permissions In AMD fglrx-driver",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/536782/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20151029 CVE-2015-7724 - Privilege Escalation Via Symlink Attacks On POSIX Shared Memory With Insecure Permissions In AMD fglrx-driver",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Oct/103"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/134120/AMD-fglrx-driver-15.7-Privilege-Escalation.html",
|
||||
"refsource": "MISC",
|
||||
@ -72,10 +62,20 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-7724/"
|
||||
},
|
||||
{
|
||||
"name": "20151029 CVE-2015-7724 - Privilege Escalation Via Symlink Attacks On POSIX Shared Memory With Insecure Permissions In AMD fglrx-driver",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/536782/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "77361",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/77361"
|
||||
},
|
||||
{
|
||||
"name": "20151029 CVE-2015-7724 - Privilege Escalation Via Symlink Attacks On POSIX Shared Memory With Insecure Permissions In AMD fglrx-driver",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Oct/103"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2015-8703",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "77421",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/77421"
|
||||
},
|
||||
{
|
||||
"name": "https://www.kb.cert.org/vuls/id/BLUU-9ZDJWA",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "VU#391604",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "https://www.kb.cert.org/vuls/id/391604"
|
||||
},
|
||||
{
|
||||
"name" : "77421",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/77421"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,25 +53,25 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2015-55.html",
|
||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=e3fc691368af60bbbaec9e038ee6a6d3b7707955",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2015-55.html"
|
||||
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=e3fc691368af60bbbaec9e038ee6a6d3b7707955"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11821",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11821"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=e3fc691368af60bbbaec9e038ee6a6d3b7707955",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=e3fc691368af60bbbaec9e038ee6a6d3b7707955"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201604-05",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201604-05"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2015-55.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2015-55.html"
|
||||
},
|
||||
{
|
||||
"name": "1034551",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2015-8863",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,15 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20160423 CVE Request: jq: heap buffer overflow in tokenadd() function",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/04/23/1"
|
||||
"name": "RHSA-2016:1106",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1106.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:1099",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1099.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160423 Re: CVE Request: jq: heap buffer overflow in tokenadd() function",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/04/23/2"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1212",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:1098",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1098.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802231",
|
||||
"refsource": "CONFIRM",
|
||||
@ -78,34 +93,19 @@
|
||||
"url": "https://github.com/stedolan/jq/issues/995"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201612-20",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201612-20"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:1098",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1098.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:1099",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1099.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:1106",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1106.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1212",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00012.html"
|
||||
"name": "[oss-security] 20160423 CVE Request: jq: heap buffer overflow in tokenadd() function",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/04/23/1"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1214",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201612-20",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201612-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-0843",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2016-0868",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-16-026-02",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-16-026-02"
|
||||
},
|
||||
{
|
||||
"name": "1034861",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034861"
|
||||
},
|
||||
{
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-026-02",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-026-02"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://pivotal.io/security/cve-2016-0898",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://pivotal.io/security/cve-2016-0898"
|
||||
},
|
||||
{
|
||||
"name": "95146",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95146"
|
||||
},
|
||||
{
|
||||
"name": "https://pivotal.io/security/cve-2016-0898",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://pivotal.io/security/cve-2016-0898"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2016-1209",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.pritect.net/blog/ninja-forms-2-9-42-critical-security-vulnerabilities",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.pritect.net/blog/ninja-forms-2-9-42-critical-security-vulnerabilities"
|
||||
"name": "https://wordpress.org/plugins/ninja-forms/changelog/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wordpress.org/plugins/ninja-forms/changelog/"
|
||||
},
|
||||
{
|
||||
"name": "https://wpvulndb.com/vulnerabilities/8485",
|
||||
@ -63,14 +63,9 @@
|
||||
"url": "https://wpvulndb.com/vulnerabilities/8485"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/137211/WordPress-Ninja-Forms-Unauthenticated-File-Upload.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/137211/WordPress-Ninja-Forms-Unauthenticated-File-Upload.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.rapid7.com/db/modules/exploit/unix/webapp/wp_ninja_forms_unauthenticated_file_upload",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.rapid7.com/db/modules/exploit/unix/webapp/wp_ninja_forms_unauthenticated_file_upload"
|
||||
"name": "JVNDB-2016-000064",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000064"
|
||||
},
|
||||
{
|
||||
"name": "https://ninjaforms.com/important-security-update-always-hurt-ones-love/",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "https://ninjaforms.com/important-security-update-always-hurt-ones-love/"
|
||||
},
|
||||
{
|
||||
"name" : "https://wordpress.org/plugins/ninja-forms/changelog/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wordpress.org/plugins/ninja-forms/changelog/"
|
||||
"name": "http://www.rapid7.com/db/modules/exploit/unix/webapp/wp_ninja_forms_unauthenticated_file_upload",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.rapid7.com/db/modules/exploit/unix/webapp/wp_ninja_forms_unauthenticated_file_upload"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/137211/WordPress-Ninja-Forms-Unauthenticated-File-Upload.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/137211/WordPress-Ninja-Forms-Unauthenticated-File-Upload.html"
|
||||
},
|
||||
{
|
||||
"name": "JVN#44657371",
|
||||
@ -88,9 +88,9 @@
|
||||
"url": "http://jvn.jp/en/jp/JVN44657371/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2016-000064",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000064"
|
||||
"name": "http://www.pritect.net/blog/ninja-forms-2-9-42-critical-security-vulnerabilities",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.pritect.net/blog/ninja-forms-2-9-42-critical-security-vulnerabilities"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2016-1217",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.cybozu.com/ja-jp/article/9235",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.cybozu.com/ja-jp/article/9235"
|
||||
},
|
||||
{
|
||||
"name": "JVN#67595539",
|
||||
"refsource": "JVN",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000146.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.cybozu.com/ja-jp/article/9235",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.cybozu.com/ja-jp/article/9235"
|
||||
},
|
||||
{
|
||||
"name": "92601",
|
||||
"refsource": "BID",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2016-1786",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160331 WebKitGTK+ Security Advisory WSA-2016-0003",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/537948/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206166",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206166"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206171",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206171"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-03-21-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-03-21-6",
|
||||
"refsource": "APPLE",
|
||||
@ -81,6 +61,26 @@
|
||||
"name": "1035353",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035353"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-03-21-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "20160331 WebKitGTK+ Security Advisory WSA-2016-0003",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/537948/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206171",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206171"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206166",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206166"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"name": "https://crbug.com/639658",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://crbug.com/639658"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201610-09",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201610-09"
|
||||
"name": "93528",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93528"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2067",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2067.html"
|
||||
},
|
||||
{
|
||||
"name" : "93528",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/93528"
|
||||
"name": "GLSA-201610-09",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201610-09"
|
||||
},
|
||||
{
|
||||
"name": "https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,11 +58,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1296649%2C1298107%2C1300129%2C1305876%2C1314667%2C1301252%2C1277866%2C1307254%2C1252511%2C1264053"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2016-89/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2016-89/"
|
||||
},
|
||||
{
|
||||
"name": "94337",
|
||||
"refsource": "BID",
|
||||
@ -72,6 +67,11 @@
|
||||
"name": "1037298",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037298"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2016-89/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2016-89/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "RHSA-2016:1841",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1841.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:3458",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3458"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1359014",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,26 +72,6 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1838.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:1839",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1839.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:1840",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1840.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:1841",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1841.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:3454",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3454"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:3455",
|
||||
"refsource": "REDHAT",
|
||||
@ -93,9 +83,19 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3456"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:3458",
|
||||
"name": "RHSA-2017:3454",
|
||||
"refsource": "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3458"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3454"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:1839",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1839.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:1840",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1840.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,15 +61,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0643",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0643"
|
||||
},
|
||||
{
|
||||
"name": "106874",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106874"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0643",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0643"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2019-01-22T21:21:10.016652",
|
||||
"DATE_REQUESTED": "2019-01-14T20:30:06",
|
||||
"ID": "CVE-2019-1000008",
|
||||
|
@ -68,15 +68,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20190306 Cisco Nexus 9000 Series Fabric Switches Application-Centric Infrastructure Mode Arbitrary File Read Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-aci-file-read"
|
||||
},
|
||||
{
|
||||
"name": "107316",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/107316"
|
||||
},
|
||||
{
|
||||
"name": "20190306 Cisco Nexus 9000 Series Fabric Switches Application-Centric Infrastructure Mode Arbitrary File Read Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-aci-file-read"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -68,15 +68,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20190206 Cisco Meeting Server SIP Processing Denial of Service Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-meeting-sipdos"
|
||||
},
|
||||
{
|
||||
"name": "106909",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106909"
|
||||
},
|
||||
{
|
||||
"name": "20190206 Cisco Meeting Server SIP Processing Denial of Service Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-meeting-sipdos"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user