mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5a01ff69e8
commit
118a9bbe54
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2007-0033",
|
"ID": "CVE-2007-0033",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,49 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "HPSBST02184",
|
"name": "ADV-2007-0104",
|
||||||
"refsource" : "HP",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/457274/100/0/threaded"
|
"url": "http://www.vupen.com/english/advisories/2007/0104"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT071296",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/457274/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MS07-003",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "TA07-009A",
|
"name": "TA07-009A",
|
||||||
"refsource": "CERT",
|
"refsource": "CERT",
|
||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-009A.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA07-009A.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "VU#476900",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/476900"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "21931",
|
"name": "21931",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/21931"
|
"url": "http://www.securityfocus.com/bid/21931"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2007-0104",
|
"name": "23674",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/0104"
|
"url": "http://secunia.com/advisories/23674"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "31252",
|
"name": "HPSBST02184",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "HP",
|
||||||
"url" : "http://www.osvdb.org/31252"
|
"url": "http://www.securityfocus.com/archive/1/457274/100/0/threaded"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:516",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A516"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1017488",
|
"name": "1017488",
|
||||||
@ -103,9 +83,29 @@
|
|||||||
"url": "http://securitytracker.com/id?1017488"
|
"url": "http://securitytracker.com/id?1017488"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "23674",
|
"name": "MS07-003",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MS",
|
||||||
"url" : "http://secunia.com/advisories/23674"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "31252",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/31252"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#476900",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/476900"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:516",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A516"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT071296",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/457274/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,31 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20070105 IG Shop remote code execution",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/456043/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "3083",
|
"name": "3083",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/3083"
|
"url": "https://www.exploit-db.com/exploits/3083"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.nl/0701-exploits/igshop10-multiple.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.nl/0701-exploits/igshop10-multiple.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21874",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/21874"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-0056",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/0056"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "33385",
|
"name": "33385",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -87,6 +67,26 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/23604"
|
"url": "http://secunia.com/advisories/23604"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20070105 IG Shop remote code execution",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/456043/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-0056",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/0056"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.nl/0701-exploits/igshop10-multiple.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.nl/0701-exploits/igshop10-multiple.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21874",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/21874"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "igshop-compareproduct-sql-injection(31299)",
|
"name": "igshop-compareproduct-sql-injection(31299)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -53,50 +53,45 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20070111 ZDI-07-002: CA BrightStor ARCserve Backup Tape Engine Code Execution Vulnerability",
|
"name": "http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/456616/100/0/threaded"
|
"url": "http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20070111 LS-20061002 - Computer Associates BrightStor ARCserve Backup Remote Code Execution Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/456637"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20070111 [CAID 34955, 34956, 34957, 34958, 34959, 34817]: CA BrightStor ARCserve Backup Multiple Overflow Vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/456711"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-07-002.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-07-002.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://livesploit.com/advisories/LS-20061002.pdf",
|
"name": "http://livesploit.com/advisories/LS-20061002.pdf",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://livesploit.com/advisories/LS-20061002.pdf"
|
"url": "http://livesploit.com/advisories/LS-20061002.pdf"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.lssec.com/advisories/LS-20061002.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.lssec.com/advisories/LS-20061002.pdf"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#662400",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/662400"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "22010",
|
"name": "22010",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/22010"
|
"url": "http://www.securityfocus.com/bid/22010"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "brightstor-tapeengine-code-execution(31442)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31442"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1017506",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1017506"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-002.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070111 [CAID 34955, 34956, 34957, 34958, 34959, 34817]: CA BrightStor ARCserve Backup Multiple Overflow Vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/456711"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070111 LS-20061002 - Computer Associates BrightStor ARCserve Backup Remote Code Execution Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/456637"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-0154",
|
"name": "ADV-2007-0154",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -108,19 +103,24 @@
|
|||||||
"url": "http://osvdb.org/31327"
|
"url": "http://osvdb.org/31327"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1017506",
|
"name": "VU#662400",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CERT-VN",
|
||||||
"url" : "http://securitytracker.com/id?1017506"
|
"url": "http://www.kb.cert.org/vuls/id/662400"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070111 ZDI-07-002: CA BrightStor ARCserve Backup Tape Engine Code Execution Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/456616/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.lssec.com/advisories/LS-20061002.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.lssec.com/advisories/LS-20061002.pdf"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "23648",
|
"name": "23648",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/23648"
|
"url": "http://secunia.com/advisories/23648"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "brightstor-tapeengine-code-execution(31442)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31442"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "https://www.exploit-db.com/exploits/3122"
|
"url": "https://www.exploit-db.com/exploits/3122"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22039",
|
"name": "23744",
|
||||||
"refsource" : "BID",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/bid/22039"
|
"url": "http://secunia.com/advisories/23744"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-0179",
|
"name": "ADV-2007-0179",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://osvdb.org/32818"
|
"url": "http://osvdb.org/32818"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "23744",
|
"name": "22039",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BID",
|
||||||
"url" : "http://secunia.com/advisories/23744"
|
"url": "http://www.securityfocus.com/bid/22039"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "24606",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24606"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070209 PHP 5.2.1 crash bug",
|
"name": "20070209 PHP 5.2.1 crash bug",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/459856/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/459856/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "33952",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/33952"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[php-dev] 20070209 PHP 5.2.1 crashing Apache/IIS...",
|
"name": "[php-dev] 20070209 PHP 5.2.1 crashing Apache/IIS...",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://marc.info/?l=php-dev&m=117104930526516&w=2"
|
"url": "http://marc.info/?l=php-dev&m=117104930526516&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[php-dev] 20070210 Re: PHP 5.2.1 crashing Apache/IIS...",
|
"name": "24514",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://marc.info/?l=php-dev&m=117106751715609&w=2"
|
"url": "http://secunia.com/advisories/24514"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.36&r2=1.445.2.14.2.37",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.36&r2=1.445.2.14.2.37"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-200703-21",
|
"name": "GLSA-200703-21",
|
||||||
@ -88,19 +93,14 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/22505"
|
"url": "http://www.securityfocus.com/bid/22505"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "33952",
|
"name": "[php-dev] 20070210 Re: PHP 5.2.1 crashing Apache/IIS...",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "MLIST",
|
||||||
"url" : "http://osvdb.org/33952"
|
"url": "http://marc.info/?l=php-dev&m=117106751715609&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "24514",
|
"name": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.36&r2=1.445.2.14.2.37",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url" : "http://secunia.com/advisories/24514"
|
"url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.36&r2=1.445.2.14.2.37"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24606",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24606"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,20 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "IY86711",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1IY86711"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "IY87492",
|
"name": "IY87492",
|
||||||
"refsource": "AIXAPAR",
|
"refsource": "AIXAPAR",
|
||||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY87492"
|
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY87492"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22729",
|
"name": "24387",
|
||||||
"refsource" : "BID",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/bid/22729"
|
"url": "http://secunia.com/advisories/24387"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "IY86711",
|
||||||
|
"refsource": "AIXAPAR",
|
||||||
|
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY86711"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1017731",
|
"name": "1017731",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://www.securitytracker.com/id?1017731"
|
"url": "http://www.securitytracker.com/id?1017731"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "24387",
|
"name": "22729",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BID",
|
||||||
"url" : "http://secunia.com/advisories/24387"
|
"url": "http://www.securityfocus.com/bid/22729"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/462443/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/462443/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20070311 Re: PHP-Nuke <= 8.0 Cookie Manipulation (lang)",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/462588/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "22909",
|
"name": "22909",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "24484",
|
"name": "24484",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/24484"
|
"url": "http://secunia.com/advisories/24484"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070311 Re: PHP-Nuke <= 8.0 Cookie Manipulation (lang)",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/462588/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -62,15 +62,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Eriksson"
|
"url": "http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Eriksson"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "22945",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/22945"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "34593",
|
"name": "34593",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/34593"
|
"url": "http://osvdb.org/34593"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22945",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/22945"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,34 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "3580",
|
"name": "24644",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://www.exploit-db.com/exploits/3580"
|
"url": "http://secunia.com/advisories/24644"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "3581",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/3581"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "23158",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/23158"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-1116",
|
"name": "ADV-2007-1116",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/1116"
|
"url": "http://www.vupen.com/english/advisories/2007/1116"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "23158",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/23158"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "3581",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/3581"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "34497",
|
"name": "34497",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/34497"
|
"url": "http://osvdb.org/34497"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "24644",
|
"name": "3580",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://secunia.com/advisories/24644"
|
"url": "https://www.exploit-db.com/exploits/3580"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "icebb-index-sql-injection(33240)",
|
"name": "icebb-index-sql-injection(33240)",
|
||||||
|
@ -58,14 +58,9 @@
|
|||||||
"url": "http://www.securityfocus.com/archive/1/477128/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/477128/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20070820 RE: SYMSA-2007-007: Palm OS Treo Smartphone Denial of Service",
|
"name": "3034",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/477235/100/0/threaded"
|
"url": "http://securityreason.com/securityalert/3034"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20070820 Re: SYMSA-2007-007: Palm OS Treo Smartphone Denial of Service",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/477169/100/0/threaded"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20070821 Re: RE: SYMSA-2007-007: Palm OS Treo Smartphone Denial of Service",
|
"name": "20070821 Re: RE: SYMSA-2007-007: Palm OS Treo Smartphone Denial of Service",
|
||||||
@ -73,19 +68,19 @@
|
|||||||
"url": "http://www.securityfocus.com/archive/1/477346/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/477346/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20070821 Re: Re: SYMSA-2007-007: Palm OS Treo Smartphone Denial of Service",
|
"name": "palmos-treo-icmp-dos(36124)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/477231/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36124"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20070821 Re: SYMSA-2007-007: Palm OS Treo Smartphone Denial of Service",
|
"name": "20070820 Re: SYMSA-2007-007: Palm OS Treo Smartphone Denial of Service",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/477350/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/477169/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-007.txt",
|
"name": "20070820 RE: SYMSA-2007-007: Palm OS Treo Smartphone Denial of Service",
|
||||||
"refsource" : "MISC",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-007.txt"
|
"url": "http://www.securityfocus.com/archive/1/477235/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "25074",
|
"name": "25074",
|
||||||
@ -93,14 +88,19 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/25074"
|
"url": "http://www.securityfocus.com/bid/25074"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3034",
|
"name": "20070821 Re: SYMSA-2007-007: Palm OS Treo Smartphone Denial of Service",
|
||||||
"refsource" : "SREASON",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://securityreason.com/securityalert/3034"
|
"url": "http://www.securityfocus.com/archive/1/477350/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "palmos-treo-icmp-dos(36124)",
|
"name": "20070821 Re: Re: SYMSA-2007-007: Palm OS Treo Smartphone Denial of Service",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36124"
|
"url": "http://www.securityfocus.com/archive/1/477231/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-007.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-007.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,25 +57,25 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/476675/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/476675/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20070815 Re: Safari for windows remote arbitry file upload",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/476690/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20070820 Re: Re: Safari for windows remote arbitry file upload",
|
"name": "20070820 Re: Re: Safari for windows remote arbitry file upload",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/477180/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/477180/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "3022",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/3022"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1018575",
|
"name": "1018575",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1018575"
|
"url": "http://www.securitytracker.com/id?1018575"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3022",
|
"name": "20070815 Re: Safari for windows remote arbitry file upload",
|
||||||
"refsource" : "SREASON",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://securityreason.com/securityalert/3022"
|
"url": "http://www.securityfocus.com/archive/1/476690/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,55 +52,55 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20070818 Multiple vulnerabilities in rFactor 1.250",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/477023/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20070925 Re: Multiple vulnerabilities in rFactor 1.250",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/480591/100/200/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20070927 Re: Multiple vulnerabilities in rFactor 1.250",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/480921/100/200/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://aluigi.org/poc/rfactorx.zip",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://aluigi.org/poc/rfactorx.zip"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://forum.racesimcentral.com/showthread.php?t=298659",
|
"name": "http://forum.racesimcentral.com/showthread.php?t=298659",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://forum.racesimcentral.com/showthread.php?t=298659"
|
"url": "http://forum.racesimcentral.com/showthread.php?t=298659"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.rfactor.net/?page=news_09-26_1255",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.rfactor.net/?page=news_09-26_1255"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "25358",
|
"name": "25358",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/25358"
|
"url": "http://www.securityfocus.com/bid/25358"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "26526",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/26526"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "3037",
|
"name": "3037",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/3037"
|
"url": "http://securityreason.com/securityalert/3037"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://aluigi.org/poc/rfactorx.zip",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://aluigi.org/poc/rfactorx.zip"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.rfactor.net/?page=news_09-26_1255",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.rfactor.net/?page=news_09-26_1255"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070927 Re: Multiple vulnerabilities in rFactor 1.250",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/480921/100/200/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "rfactor-ids-bo(36093)",
|
"name": "rfactor-ids-bo(36093)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36093"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36093"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070925 Re: Multiple vulnerabilities in rFactor 1.250",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/480591/100/200/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070818 Multiple vulnerabilities in rFactor 1.250",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/477023/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "26526",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/26526"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,16 +57,6 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/477253/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/477253/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://securityvulns.ru/Rdocument771.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://securityvulns.ru/Rdocument771.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://websecurity.com.ua/1238/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://websecurity.com.ua/1238/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "37299",
|
"name": "37299",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -76,6 +66,16 @@
|
|||||||
"name": "26563",
|
"name": "26563",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/26563"
|
"url": "http://secunia.com/advisories/26563"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://websecurity.com.ua/1238/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://websecurity.com.ua/1238/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://securityvulns.ru/Rdocument771.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://securityvulns.ru/Rdocument771.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-2345",
|
"ID": "CVE-2015-2345",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2015-2460",
|
"ID": "CVE-2015-2460",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "37921",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/37921/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "MS15-080",
|
"name": "MS15-080",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "1033238",
|
"name": "1033238",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1033238"
|
"url": "http://www.securitytracker.com/id/1033238"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "37921",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/37921/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,20 +57,15 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/535319/100/1100/threaded"
|
"url": "http://www.securityfocus.com/archive/1/535319/100/1100/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "36807",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/36807/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "42296",
|
"name": "42296",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/42296/"
|
"url": "https://www.exploit-db.com/exploits/42296/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html",
|
"name": "74281",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html"
|
"url": "http://www.securityfocus.com/bid/74281"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://goautodial.org/news/21",
|
"name": "http://goautodial.org/news/21",
|
||||||
@ -78,9 +73,14 @@
|
|||||||
"url": "http://goautodial.org/news/21"
|
"url": "http://goautodial.org/news/21"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "74281",
|
"name": "36807",
|
||||||
"refsource" : "BID",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://www.securityfocus.com/bid/74281"
|
"url": "https://www.exploit-db.com/exploits/36807/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2015-2978",
|
"ID": "CVE-2015-2978",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "JVN#52248864",
|
|
||||||
"refsource" : "JVN",
|
|
||||||
"url" : "http://jvn.jp/en/jp/JVN52248864/index.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "JVNDB-2015-000108",
|
"name": "JVNDB-2015-000108",
|
||||||
"refsource": "JVNDB",
|
"refsource": "JVNDB",
|
||||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000108"
|
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000108"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "JVN#52248864",
|
||||||
|
"refsource": "JVN",
|
||||||
|
"url": "http://jvn.jp/en/jp/JVN52248864/index.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2015-3175",
|
"ID": "CVE-2015-3175",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,20 +53,15 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20150518 Moodle security advisories [vs]",
|
"name": "https://moodle.org/mod/forum/discuss.php?d=313682",
|
||||||
"refsource" : "MLIST",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://openwall.com/lists/oss-security/2015/05/18/1"
|
"url": "https://moodle.org/mod/forum/discuss.php?d=313682"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-49179",
|
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-49179",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-49179"
|
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-49179"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://moodle.org/mod/forum/discuss.php?d=313682",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://moodle.org/mod/forum/discuss.php?d=313682"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "74720",
|
"name": "74720",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -76,6 +71,11 @@
|
|||||||
"name": "1032358",
|
"name": "1032358",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1032358"
|
"url": "http://www.securitytracker.com/id/1032358"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20150518 Moodle security advisories [vs]",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://openwall.com/lists/oss-security/2015/05/18/1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-3688",
|
"ID": "CVE-2015-3688",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT204941",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT204941"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT204942",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT204942"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT205221",
|
"name": "https://support.apple.com/HT205221",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://support.apple.com/HT205221"
|
"url": "https://support.apple.com/HT205221"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-06-30-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-06-30-2",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-09-16-3",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "75491",
|
"name": "75491",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/75491"
|
"url": "http://www.securityfocus.com/bid/75491"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT204941",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT204941"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-06-30-2",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1032760",
|
"name": "1032760",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1032760"
|
"url": "http://www.securitytracker.com/id/1032760"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-09-16-3",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT204942",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT204942"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-06-30-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://wpvulndb.com/vulnerabilities/8159"
|
"url": "https://wpvulndb.com/vulnerabilities/8159"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.netsparker.com/cve-2015-6238-multiple-xss-vulnerabilities-in-google-analyticator/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.netsparker.com/cve-2015-6238-multiple-xss-vulnerabilities-in-google-analyticator/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://wordpress.org/plugins/google-analyticator/changelog/",
|
"name": "https://wordpress.org/plugins/google-analyticator/changelog/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://wordpress.org/plugins/google-analyticator/changelog/"
|
"url": "https://wordpress.org/plugins/google-analyticator/changelog/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.netsparker.com/cve-2015-6238-multiple-xss-vulnerabilities-in-google-analyticator/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.netsparker.com/cve-2015-6238-multiple-xss-vulnerabilities-in-google-analyticator/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-6345",
|
"ID": "CVE-2015-6345",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20151026 Cisco Secure Access Control Server SQL Injection Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1033967",
|
"name": "1033967",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1033967"
|
"url": "http://www.securitytracker.com/id/1033967"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20151026 Cisco Secure Access Control Server SQL Injection Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "38260",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/38260/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://shinnai.altervista.org/exploits/SH-0024-20150922.html",
|
"name": "http://shinnai.altervista.org/exploits/SH-0024-20150922.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://shinnai.altervista.org/exploits/SH-0024-20150922.html"
|
"url": "http://shinnai.altervista.org/exploits/SH-0024-20150922.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "38260",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/38260/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,31 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "DSA-3605",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3605"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT206168",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT206168"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205731",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205731"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205729",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205729"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20151027 CVE request: libxslt xsltStylePreCompute() type confusion DoS",
|
"name": "[oss-security] 20151027 CVE request: libxslt xsltStylePreCompute() type confusion DoS",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -63,39 +88,14 @@
|
|||||||
"url": "http://www.openwall.com/lists/oss-security/2015/10/28/4"
|
"url": "http://www.openwall.com/lists/oss-security/2015/10/28/4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1257962",
|
"name": "APPLE-SA-2016-01-25-1",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "APPLE",
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1257962"
|
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00005.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://git.gnome.org/browse/libxslt/commit/?id=7ca19df892ca22d9314e95d59ce2abdeff46b617",
|
"name": "1034736",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://git.gnome.org/browse/libxslt/commit/?id=7ca19df892ca22d9314e95d59ce2abdeff46b617"
|
"url": "http://www.securitytracker.com/id/1034736"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205729",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205729"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205731",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205731"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205732",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205732"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT206168",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT206168"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380",
|
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380",
|
||||||
@ -103,9 +103,14 @@
|
|||||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"
|
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
|
"name": "APPLE-SA-2016-01-19-2",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "APPLE",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
|
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2016-03-21-2",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://puppet.com/security/cve/cve-2015-7995",
|
"name": "https://puppet.com/security/cve/cve-2015-7995",
|
||||||
@ -118,49 +123,44 @@
|
|||||||
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html"
|
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2016-01-19-2",
|
"name": "https://git.gnome.org/browse/libxslt/commit/?id=7ca19df892ca22d9314e95d59ce2abdeff46b617",
|
||||||
"refsource" : "APPLE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html"
|
"url": "https://git.gnome.org/browse/libxslt/commit/?id=7ca19df892ca22d9314e95d59ce2abdeff46b617"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2016-01-25-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Jan/msg00005.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2016-03-21-2",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3605",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3605"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSA:2016-148-02",
|
|
||||||
"refsource" : "SLACKWARE",
|
|
||||||
"url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.386546"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:1439",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00123.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "77325",
|
"name": "77325",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/77325"
|
"url": "http://www.securityfocus.com/bid/77325"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:1439",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00123.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSA:2016-148-02",
|
||||||
|
"refsource": "SLACKWARE",
|
||||||
|
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.386546"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205732",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205732"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1257962",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257962"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1038623",
|
"name": "1038623",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1038623"
|
"url": "http://www.securitytracker.com/id/1038623"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1034736",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1034736"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2016-0126",
|
"ID": "CVE-2016-0126",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "MS16-054",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-054"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "89938",
|
"name": "89938",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/89938"
|
"url": "http://www.securityfocus.com/bid/89938"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "MS16-054",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-054"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1035819",
|
"name": "1035819",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-0453",
|
"ID": "CVE-2016-0453",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1034712",
|
"name": "1034712",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034712"
|
"url": "http://www.securitytracker.com/id/1034712"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2016-1001",
|
"ID": "CVE-2016-1001",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:0734",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1035251",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1035251"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:0719",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "39609",
|
"name": "39609",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/39609/"
|
"url": "https://www.exploit-db.com/exploits/39609/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-08.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-08.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201603-07",
|
"name": "GLSA-201603-07",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
@ -72,25 +82,15 @@
|
|||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-08.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-08.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2016:0716",
|
"name": "SUSE-SU-2016:0716",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:0719",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:0734",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1035251",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1035251"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2016-1230",
|
"ID": "CVE-2016-1230",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://web.arena.ne.jp/support/news/2016/0208.html",
|
"name": "JVN#24143619",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "JVN",
|
||||||
"url" : "http://web.arena.ne.jp/support/news/2016/0208.html"
|
"url": "http://jvn.jp/en/jp/JVN24143619/index.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://web.arena.ne.jp/support/news/2016/0208_2.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://web.arena.ne.jp/support/news/2016/0208_2.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://web.arena.ne.jp/support/suite1/manual/cgi_ssi/form.html",
|
"name": "http://web.arena.ne.jp/support/suite1/manual/cgi_ssi/form.html",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://web.arena.ne.jp/support/suite1/manual/cgi_ssi/form.html"
|
"url": "http://web.arena.ne.jp/support/suite1/manual/cgi_ssi/form.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "JVN#24143619",
|
"name": "http://web.arena.ne.jp/support/news/2016/0208_2.html",
|
||||||
"refsource" : "JVN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://jvn.jp/en/jp/JVN24143619/index.html"
|
"url": "http://web.arena.ne.jp/support/news/2016/0208_2.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://web.arena.ne.jp/support/news/2016/0208.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://web.arena.ne.jp/support/news/2016/0208.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "JVNDB-2016-000072",
|
"name": "JVNDB-2016-000072",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2016-1252",
|
"ID": "CVE-2016-1252",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,26 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "40916",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/40916/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1020",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1020"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-3733",
|
"name": "DSA-3733",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
@ -81,6 +61,26 @@
|
|||||||
"name": "USN-3156-1",
|
"name": "USN-3156-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-3156-1"
|
"url": "http://www.ubuntu.com/usn/USN-3156-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "40916",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/40916/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1020",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1020"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2016-1427",
|
"ID": "CVE-2016-1427",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20160616 Cisco Prime Network Registrar System Configuration Protocol Information Disclosure Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160616-pnr"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1036128",
|
"name": "1036128",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1036128"
|
"url": "http://www.securitytracker.com/id/1036128"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20160616 Cisco Prime Network Registrar System Configuration Protocol Information Disclosure Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160616-pnr"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@microfocus.com",
|
"ASSIGNER": "security@suse.com",
|
||||||
"ID": "CVE-2016-1603",
|
"ID": "CVE-2016-1603",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://build.opensuse.org/request/show/361096",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://build.opensuse.org/request/show/361096"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:0521",
|
"name": "openSUSE-SU-2016:0521",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
@ -68,14 +63,19 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00019.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00019.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2016:1659",
|
"name": "https://build.opensuse.org/request/show/361096",
|
||||||
"refsource" : "SUSE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00049.html"
|
"url": "https://build.opensuse.org/request/show/361096"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:1660",
|
"name": "openSUSE-SU-2016:1660",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00050.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00050.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:1659",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00049.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2016-4444",
|
"ID": "CVE-2016-4444",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,31 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20160621 Re: SELinux troubles",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://seclists.org/oss-sec/2016/q2/575"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1332644",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1332644"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/fedora-selinux/setroubleshoot/commit/5cd60033ea7f5bdf8c19c27b23ea2d773d9b09f5",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/fedora-selinux/setroubleshoot/commit/5cd60033ea7f5bdf8c19c27b23ea2d773d9b09f5"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:1267",
|
"name": "RHSA-2016:1267",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://rhn.redhat.com/errata/RHSA-2016-1267.html"
|
"url": "https://rhn.redhat.com/errata/RHSA-2016-1267.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1293",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1293"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "91476",
|
"name": "91476",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -86,6 +66,26 @@
|
|||||||
"name": "1036144",
|
"name": "1036144",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1036144"
|
"url": "http://www.securitytracker.com/id/1036144"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20160621 Re: SELinux troubles",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://seclists.org/oss-sec/2016/q2/575"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1293",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:1293"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/fedora-selinux/setroubleshoot/commit/5cd60033ea7f5bdf8c19c27b23ea2d773d9b09f5",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/fedora-selinux/setroubleshoot/commit/5cd60033ea7f5bdf8c19c27b23ea2d773d9b09f5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1332644",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332644"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/HT207170",
|
"name": "93060",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "https://support.apple.com/HT207170"
|
"url": "http://www.securityfocus.com/bid/93060"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT207171",
|
"name": "https://support.apple.com/HT207171",
|
||||||
@ -67,20 +67,20 @@
|
|||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
|
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2016-09-20-4",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Sep/msg00009.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "93060",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/93060"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1036853",
|
"name": "1036853",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1036853"
|
"url": "http://www.securitytracker.com/id/1036853"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT207170",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT207170"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2016-09-20-4",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00009.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user