"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 07:06:45 +00:00
parent 9e527d1afe
commit 0ee4edbcd3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 2824 additions and 2824 deletions

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS99-038",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-038"
},
{
"name": "Q238453",
"refsource": "MSKB",
@ -66,6 +61,11 @@
"name": "646",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/646"
},
{
"name": "MS99-038",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-038"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "19971126 Xyplex terminal server bug",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/8134"
},
{
"name": "xyplex-controlz-login(1825)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1825"
},
{
"name": "19971126 Xyplex terminal server bug",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/8134"
},
{
"name": "xyplex-question-login(1826)",
"refsource": "XF",

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20070125 Re: phpCOIN <= RC-1 (modules/mail/index.php) Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/458064/100/200/threaded"
},
{
"name": "20070125 phpCOIN <= RC-1 (modules/mail/index.php) Remote File Include Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/458080/100/200/threaded"
},
{
"name" : "33591",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33591"
"name": "20070125 Re: phpCOIN <= RC-1 (modules/mail/index.php) Remote File Include Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/458064/100/200/threaded"
},
{
"name": "2230",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2230"
},
{
"name": "33591",
"refsource": "OSVDB",
"url": "http://osvdb.org/33591"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf",
"refsource": "MISC",
"url": "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf"
},
{
"name": "20070313 New report on Windows Vista network attack surface",
"refsource": "BUGTRAQ",
@ -62,11 +67,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464617/100/0/threaded"
},
{
"name" : "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf",
"refsource" : "MISC",
"url" : "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf"
},
{
"name": "http://www.symantec.com/enterprise/security_response/weblog/2007/04/microsofts_inaccurate_teredo_d.html",
"refsource": "MISC",

View File

@ -58,9 +58,14 @@
"url": "https://www.exploit-db.com/exploits/3629"
},
{
"name" : "23245",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23245"
"name": "34456",
"refsource": "OSVDB",
"url": "http://osvdb.org/34456"
},
{
"name": "xoops-camportail-show-sql-injection(33373)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33373"
},
{
"name": "ADV-2007-1201",
@ -68,19 +73,14 @@
"url": "http://www.vupen.com/english/advisories/2007/1201"
},
{
"name" : "34456",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34456"
"name": "23245",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23245"
},
{
"name": "24748",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24748"
},
{
"name" : "xoops-camportail-show-sql-injection(33373)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33373"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "3620",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3620"
},
{
"name": "23229",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23229"
},
{
"name": "3620",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3620"
},
{
"name": "34469",
"refsource": "OSVDB",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "4446",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4446"
"name": "37223",
"refsource": "OSVDB",
"url": "http://osvdb.org/37223"
},
{
"name": "ADV-2007-3251",
@ -63,9 +63,9 @@
"url": "http://www.vupen.com/english/advisories/2007/3251"
},
{
"name" : "37223",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37223"
"name": "wordsmith-config-file-include(36746)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36746"
},
{
"name": "26924",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/26924"
},
{
"name" : "wordsmith-config-file-include(36746)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36746"
"name": "4446",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4446"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "novus-notas-sql-injection(36795)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36795"
},
{
"name": "4458",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4458"
},
{
"name" : "25815",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25815"
},
{
"name": "37344",
"refsource": "OSVDB",
"url": "http://osvdb.org/37344"
},
{
"name": "25815",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25815"
},
{
"name": "26966",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26966"
},
{
"name" : "novus-notas-sql-injection(36795)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36795"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "20071018 Nortel IP Phone Flooding Denial of Service",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482480/100/0/threaded"
},
{
"name": "http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_flooding_denial_of_service_v1.0.txt",
"refsource": "MISC",
"url": "http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_flooding_denial_of_service_v1.0.txt"
},
{
"name" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654715",
"refsource" : "CONFIRM",
"url" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654715"
},
{
"name" : "26122",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26122"
},
{
"name": "3273",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3273"
},
{
"name": "20071018 Nortel IP Phone Flooding Denial of Service",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482480/100/0/threaded"
},
{
"name": "26122",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26122"
},
{
"name": "nortel-ipphone-spoof-dos(37253)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37253"
},
{
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654715",
"refsource": "CONFIRM",
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654715"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-5759",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "4609",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4609"
},
{
"name": "26334",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "asp-message-printer-sql-injection(38264)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38264"
},
{
"name": "4609",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4609"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-3121",
"STATE": "PUBLIC"
},
@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html"
},
{
"name" : "GLSA-201507-13",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201507-13"
},
{
"name" : "RHSA-2015:1214",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1214.html"
},
{
"name" : "SUSE-SU-2015:1211",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html"
},
{
"name" : "SUSE-SU-2015:1214",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html"
"name": "1032810",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032810"
},
{
"name": "75595",
@ -83,9 +63,29 @@
"url": "http://www.securityfocus.com/bid/75595"
},
{
"name" : "1032810",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032810"
"name": "SUSE-SU-2015:1211",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html"
},
{
"name": "RHSA-2015:1214",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1214.html"
},
{
"name": "SUSE-SU-2015:1214",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html"
},
{
"name": "GLSA-201507-13",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201507-13"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-3977",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-223-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-223-01"
},
{
"name": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-215-01",
"refsource": "CONFIRM",
"url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-215-01"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-223-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-223-01"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4282",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-privmse"
},
{
"name" : "77435",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/77435"
},
{
"name": "1034066",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034066"
},
{
"name": "77435",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77435"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4303",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7060",
"STATE": "PUBLIC"
},
@ -58,24 +58,9 @@
"url": "https://support.apple.com/HT205637"
},
{
"name" : "https://support.apple.com/HT205640",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205640"
},
{
"name" : "https://support.apple.com/HT205641",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205641"
},
{
"name" : "APPLE-SA-2015-12-08-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
},
{
"name" : "APPLE-SA-2015-12-08-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
"name": "1034344",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034344"
},
{
"name": "APPLE-SA-2015-12-08-4",
@ -83,9 +68,24 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html"
},
{
"name" : "1034344",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034344"
"name": "APPLE-SA-2015-12-08-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{
"name": "https://support.apple.com/HT205641",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205641"
},
{
"name": "https://support.apple.com/HT205640",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205640"
},
{
"name": "APPLE-SA-2015-12-08-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-7215",
"STATE": "PUBLIC"
},
@ -52,50 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/whatwg/html/issues/164",
"refsource" : "MISC",
"url" : "https://github.com/whatwg/html/issues/164"
},
{
"name" : "https://github.com/whatwg/html/pull/166",
"refsource" : "MISC",
"url" : "https://github.com/whatwg/html/pull/166"
},
{
"name" : "https://www.w3.org/Bugs/Public/show_bug.cgi?id=28961",
"refsource" : "MISC",
"url" : "https://www.w3.org/Bugs/Public/show_bug.cgi?id=28961"
},
{
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-140.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-140.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1160890",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1160890"
},
{
"name" : "FEDORA-2015-51b1105902",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"
},
{
"name" : "FEDORA-2015-7ab3d3afcf",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"
},
{
"name": "GLSA-201512-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201512-10"
},
{
"name" : "openSUSE-SU-2016:0307",
"name": "openSUSE-SU-2015:2353",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"
},
{
"name": "https://www.w3.org/Bugs/Public/show_bug.cgi?id=28961",
"refsource": "MISC",
"url": "https://www.w3.org/Bugs/Public/show_bug.cgi?id=28961"
},
{
"name": "openSUSE-SU-2016:0308",
@ -103,9 +78,19 @@
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
},
{
"name" : "openSUSE-SU-2015:2353",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"
"name": "FEDORA-2015-7ab3d3afcf",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"
},
{
"name": "https://github.com/whatwg/html/issues/164",
"refsource": "MISC",
"url": "https://github.com/whatwg/html/issues/164"
},
{
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-140.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-140.html"
},
{
"name": "USN-2833-1",
@ -117,6 +102,21 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/79280"
},
{
"name": "openSUSE-SU-2016:0307",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
},
{
"name": "https://github.com/whatwg/html/pull/166",
"refsource": "MISC",
"url": "https://github.com/whatwg/html/pull/166"
},
{
"name": "FEDORA-2015-51b1105902",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"
},
{
"name": "1034426",
"refsource": "SECTRACK",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8120",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8195",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-8279",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8590",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20181220 [SECURITY] [DLA 1611-1] libav security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html"
},
{
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=4ea4d2f438c9a7eba37980c9a87be4b34943e4d5",
"refsource": "CONFIRM",
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=4ea4d2f438c9a7eba37980c9a87be4b34943e4d5"
},
{
"name" : "openSUSE-SU-2016:0089",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00004.html"
},
{
"name": "1034539",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034539"
},
{
"name": "[debian-lts-announce] 20181220 [SECURITY] [DLA 1611-1] libav security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html"
},
{
"name": "openSUSE-SU-2016:0089",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00004.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1087",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
"name": "1035828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "90513",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/90513"
},
{
"name" : "1035828",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035828"
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1363",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20160420 Cisco Wireless LAN Controller HTTP Parsing Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-htrd"
},
{
"name": "1035633",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035633"
},
{
"name": "20160420 Cisco Wireless LAN Controller HTTP Parsing Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-htrd"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1470",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_csrf.pdf",
"refsource" : "MISC",
"url" : "http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_csrf.pdf"
},
{
"name": "20160831 Cisco Small Business 220 Series Smart Plus Switches Web Interface Cross-Site Request Forgery Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-sps"
},
{
"name": "1036722",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036722"
},
{
"name": "92709",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92709"
},
{
"name" : "1036722",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036722"
"name": "http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_csrf.pdf",
"refsource": "MISC",
"url": "http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_csrf.pdf"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5461",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "1036400",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036400"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name" : "91787",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91787"
},
{
"name": "91964",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91964"
},
{
"name" : "1036400",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036400"
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
}
]
}

View File

@ -140,15 +140,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0633",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0633"
},
{
"name": "106916",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106916"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0633",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0633"
}
]
}