"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:37:38 +00:00
parent edffd73e71
commit 11b82d8cb1
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
66 changed files with 3621 additions and 3621 deletions

View File

@ -53,9 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20070103 Wordpress <= 2.x dictionnary & Bruteforce attack",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/455927/100/0/threaded"
"name": "31577",
"refsource": "OSVDB",
"url": "http://osvdb.org/31577"
},
{
"name": "23621",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23621"
},
{
"name": "wordpress-account-enumeration(31262)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31262"
},
{
"name": "23741",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23741"
},
{
"name": "GLSA-200701-10",
@ -68,29 +83,14 @@
"url": "http://www.vupen.com/english/advisories/2007/0062"
},
{
"name" : "31577",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/31577"
},
{
"name" : "23621",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23621"
},
{
"name" : "23741",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23741"
"name": "20070103 Wordpress <= 2.x dictionnary & Bruteforce attack",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/455927/100/0/threaded"
},
{
"name": "2113",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2113"
},
{
"name" : "wordpress-account-enumeration(31262)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31262"
}
]
}

View File

@ -57,50 +57,50 @@
"refsource": "MISC",
"url": "http://14house.blogspot.com/2007/01/fastilo-open-source-shopping-cart-vuln.html"
},
{
"name" : "22007",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22007"
},
{
"name" : "21971",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21971"
},
{
"name": "ADV-2007-0156",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0156"
},
{
"name" : "ADV-2007-0157",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0157"
},
{
"name" : "32730",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32730"
},
{
"name" : "32731",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32731"
},
{
"name": "23733",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23733"
},
{
"name": "32731",
"refsource": "OSVDB",
"url": "http://osvdb.org/32731"
},
{
"name": "21971",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21971"
},
{
"name": "23738",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23738"
},
{
"name": "22007",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22007"
},
{
"name": "32730",
"refsource": "OSVDB",
"url": "http://osvdb.org/32730"
},
{
"name": "quickcart-p-xss(31475)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31475"
},
{
"name": "ADV-2007-0157",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0157"
}
]
}

View File

@ -57,6 +57,16 @@
"refsource": "MISC",
"url": "http://www.red-database-security.com/advisory/oracle_xmldb_css2.html"
},
{
"name": "23794",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23794"
},
{
"name": "22083",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22083"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html",
"refsource": "CONFIRM",
@ -68,14 +78,9 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA07-017A.html"
},
{
"name" : "22083",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22083"
},
{
"name" : "32912",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32912"
"name": "oracle-cpu-jan2007(31541)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31541"
},
{
"name": "1017522",
@ -83,14 +88,9 @@
"url": "http://securitytracker.com/id?1017522"
},
{
"name" : "23794",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23794"
},
{
"name" : "oracle-cpu-jan2007(31541)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31541"
"name": "32912",
"refsource": "OSVDB",
"url": "http://osvdb.org/32912"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.cpni.gov.uk/Products/alerts/2928.aspx",
"name": "http://www.mwrinfosecurity.com/news/1658.html",
"refsource": "MISC",
"url" : "http://www.cpni.gov.uk/Products/alerts/2928.aspx"
"url": "http://www.mwrinfosecurity.com/news/1658.html"
},
{
"name": "http://www.mwrinfosecurity.com/advisories/mwri_cache-sample-files-xss-advisory_2007-04-04.pdf",
@ -63,9 +63,9 @@
"url": "http://www.mwrinfosecurity.com/advisories/mwri_cache-sample-files-xss-advisory_2007-04-04.pdf"
},
{
"name" : "http://www.mwrinfosecurity.com/news/1658.html",
"name": "http://www.cpni.gov.uk/Products/alerts/2928.aspx",
"refsource": "MISC",
"url" : "http://www.mwrinfosecurity.com/news/1658.html"
"url": "http://www.cpni.gov.uk/Products/alerts/2928.aspx"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "22269",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22269"
},
{
"name": "20070126 Cross-site Scripting with Local Privilege Vulnerability in Yahoo Messenger",
"refsource": "BUGTRAQ",
@ -63,14 +68,9 @@
"url": "http://www.securityfocus.com/archive/1/458305/100/0/threaded"
},
{
"name" : "20070127 Re: Cross-site Scripting with Local Privilege Vulnerability in Yahoo Messenger",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/458494/100/0/threaded"
},
{
"name" : "22269",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22269"
"name": "23928",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23928"
},
{
"name": "31674",
@ -78,9 +78,9 @@
"url": "http://osvdb.org/31674"
},
{
"name" : "23928",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23928"
"name": "20070127 Re: Cross-site Scripting with Local Privilege Vulnerability in Yahoo Messenger",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/458494/100/0/threaded"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20070603 Comdev eCommerce 4.1 RFI Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/470435/100/0/threaded"
},
{
"name" : "38362",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38362"
},
{
"name": "2779",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2779"
},
{
"name": "20070603 Comdev eCommerce 4.1 RFI Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/470435/100/0/threaded"
},
{
"name": "ecommerce-sampleecommerce-file-include(34704)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34704"
},
{
"name": "38362",
"refsource": "OSVDB",
"url": "http://osvdb.org/38362"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "36891",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36891"
},
{
"name": "25728",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25728"
},
{
"name": "36891",
"refsource": "OSVDB",
"url": "http://osvdb.org/36891"
}
]
}

View File

@ -52,36 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "SSRT061201",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143"
},
{
"name": "26114",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26114"
},
{
"name": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html",
"refsource": "MISC",
"url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html"
},
{
"name" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",
"refsource" : "MISC",
"url" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf"
"name": "26166",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26166"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html"
},
{
"name" : "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html",
"refsource" : "MISC",
"url" : "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html"
},
{
"name" : "HPSBMA02133",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143"
},
{
"name" : "SSRT061201",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143"
},
{
"name": "TA07-200A",
"refsource": "CERT",
@ -98,19 +93,14 @@
"url": "http://www.vupen.com/english/advisories/2007/2635"
},
{
"name" : "1018415",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018415"
"name": "oracle-prvtaqis-sql-injection(35497)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35497"
},
{
"name" : "26114",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26114"
},
{
"name" : "26166",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26166"
"name": "HPSBMA02133",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143"
},
{
"name": "oracle-cpu-july2007(35490)",
@ -118,9 +108,19 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490"
},
{
"name" : "oracle-prvtaqis-sql-injection(35497)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35497"
"name": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",
"refsource": "MISC",
"url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf"
},
{
"name": "1018415",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018415"
},
{
"name": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html",
"refsource": "MISC",
"url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html"
}
]
}

View File

@ -53,9 +53,19 @@
"references": {
"reference_data": [
{
"name" : "20070820 Mambo Component SimpleFAQ V2.11 - Remote SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/477174/100/0/threaded"
"name": "3041",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3041"
},
{
"name": "simplefaq-index-sql-injection(36113)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36113"
},
{
"name": "26556",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26556"
},
{
"name": "20070820 Joomla Component SimpleFAQ V2.11 - Remote SQL Injection",
@ -73,19 +83,9 @@
"url": "http://www.securityfocus.com/bid/25376"
},
{
"name" : "26556",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26556"
},
{
"name" : "3041",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3041"
},
{
"name" : "simplefaq-index-sql-injection(36113)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36113"
"name": "20070820 Mambo Component SimpleFAQ V2.11 - Remote SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477174/100/0/threaded"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=272081",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=272081"
"name": "http://trac.osgeo.org/mapserver/ticket/2252",
"refsource": "CONFIRM",
"url": "http://trac.osgeo.org/mapserver/ticket/2252"
},
{
"name": "29688",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29688"
},
{
"name": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/",
@ -63,29 +68,9 @@
"url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
},
{
"name" : "http://trac.osgeo.org/mapserver/ticket/2252",
"refsource" : "CONFIRM",
"url" : "http://trac.osgeo.org/mapserver/ticket/2252"
},
{
"name" : "DSA-1539",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1539"
},
{
"name" : "FEDORA-2007-2018",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
},
{
"name" : "25582",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25582"
},
{
"name" : "ADV-2007-2974",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2974"
"name": "3082",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3082"
},
{
"name": "26561",
@ -98,14 +83,29 @@
"url": "http://secunia.com/advisories/26718"
},
{
"name" : "29688",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29688"
"name": "FEDORA-2007-2018",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
},
{
"name" : "3082",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3082"
"name": "ADV-2007-2974",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2974"
},
{
"name": "25582",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25582"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=272081",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=272081"
},
{
"name": "DSA-1539",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1539"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://docs.info.apple.com/article.html?artnum=307041",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=307041"
"name": "26444",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26444"
},
{
"name": "APPLE-SA-2007-11-14",
@ -63,29 +63,29 @@
"url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html"
},
{
"name" : "TA07-319A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-319A.html"
},
{
"name" : "26444",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26444"
},
{
"name" : "ADV-2007-3868",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3868"
"name": "http://docs.info.apple.com/article.html?artnum=307041",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307041"
},
{
"name": "1018948",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018948"
},
{
"name": "ADV-2007-3868",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3868"
},
{
"name": "27643",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27643"
},
{
"name": "TA07-319A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html"
}
]
}

View File

@ -53,49 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070919 Multiple Vendor ImageMagick Sign Extension Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=597"
},
{
"name" : "20071112 FLEA-2007-0066-1 ImageMagick",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/483572/100/0/threaded"
},
{
"name" : "[Magick-announce] 20070917 ImageMagick 6.3.5-9, important security updates",
"refsource" : "MLIST",
"url" : "http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html"
},
{
"name" : "http://www.imagemagick.org/script/changelog.php",
"refsource" : "CONFIRM",
"url" : "http://www.imagemagick.org/script/changelog.php"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1743",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1743"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=186030",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=186030"
},
{
"name" : "DSA-1858",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1858"
},
{
"name" : "GLSA-200710-27",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200710-27.xml"
},
{
"name" : "MDVSA-2008:035",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035"
"name": "27364",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27364"
},
{
"name": "RHSA-2008:0145",
@ -103,79 +63,119 @@
"url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html"
},
{
"name" : "SUSE-SR:2007:023",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
"name": "20071112 FLEA-2007-0066-1 ImageMagick",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/483572/100/0/threaded"
},
{
"name": "USN-523-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-523-1"
},
{
"name" : "25765",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25765"
},
{
"name" : "oval:org.mitre.oval:def:9656",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656"
},
{
"name" : "36260",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36260"
},
{
"name" : "ADV-2007-3245",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3245"
},
{
"name" : "1018729",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018729"
},
{
"name" : "26926",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26926"
},
{
"name" : "27048",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27048"
},
{
"name": "27309",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27309"
},
{
"name" : "27364",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27364"
},
{
"name" : "27439",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27439"
},
{
"name" : "28721",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28721"
},
{
"name": "29786",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29786"
},
{
"name": "25765",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25765"
},
{
"name": "http://www.imagemagick.org/script/changelog.php",
"refsource": "CONFIRM",
"url": "http://www.imagemagick.org/script/changelog.php"
},
{
"name": "ADV-2007-3245",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3245"
},
{
"name": "20070919 Multiple Vendor ImageMagick Sign Extension Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=597"
},
{
"name": "GLSA-200710-27",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200710-27.xml"
},
{
"name": "1018729",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018729"
},
{
"name": "27048",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27048"
},
{
"name": "imagemagick-readdibimage-bo(36737)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36737"
},
{
"name": "28721",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28721"
},
{
"name": "27439",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27439"
},
{
"name": "https://issues.rpath.com/browse/RPL-1743",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1743"
},
{
"name": "DSA-1858",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1858"
},
{
"name": "[Magick-announce] 20070917 ImageMagick 6.3.5-9, important security updates",
"refsource": "MLIST",
"url": "http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html"
},
{
"name": "26926",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26926"
},
{
"name": "MDVSA-2008:035",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035"
},
{
"name": "oval:org.mitre.oval:def:9656",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=186030",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=186030"
},
{
"name": "SUSE-SR:2007:023",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
},
{
"name": "36260",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36260"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-5314",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://cs.cybozu.co.jp/2014/1110-2.html",
"refsource" : "CONFIRM",
"url" : "https://cs.cybozu.co.jp/2014/1110-2.html"
"name": "62248",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62248"
},
{
"name": "JVN#14691234",
@ -68,9 +68,9 @@
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000130"
},
{
"name" : "62248",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62248"
"name": "https://cs.cybozu.co.jp/2014/1110-2.html",
"refsource": "CONFIRM",
"url": "https://cs.cybozu.co.jp/2014/1110-2.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5661",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#298433",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5774",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#946377",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/946377"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#946377",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/946377"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5845",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#597369",
"refsource": "CERT-VN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5921",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "VU#388105",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/388105"
},
{
"name" : "VU#582497",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/582497"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2015-2123",
"STATE": "PUBLIC"
},
@ -53,12 +53,12 @@
"references": {
"reference_data": [
{
"name" : "HPSBNS03335",
"name": "SSRT102058",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04683599"
},
{
"name" : "SSRT102058",
"name": "HPSBNS03335",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04683599"
},

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "37738",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/37738/"
},
{
"name": "http://packetstormsecurity.com/files/132931/WordPress-Job-Manager-0.7.22-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132931/WordPress-Job-Manager-0.7.22-Cross-Site-Scripting.html"
},
{
"name": "37738",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37738/"
},
{
"name": "https://wpvulndb.com/vulnerabilities/8129",
"refsource": "MISC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2543",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "MS15-103",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-103"
},
{
"name": "1033495",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033495"
},
{
"name": "MS15-103",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-103"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2609",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6178",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6320",
"STATE": "PUBLIC"
},

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.f5.com/kb/en-us/solutions/public/17000/300/sol17386.html",
"refsource" : "CONFIRM",
"url" : "https://support.f5.com/kb/en-us/solutions/public/17000/300/sol17386.html"
},
{
"name": "1033952",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033952"
},
{
"name": "https://support.f5.com/kb/en-us/solutions/public/17000/300/sol17386.html",
"refsource": "CONFIRM",
"url": "https://support.f5.com/kb/en-us/solutions/public/17000/300/sol17386.html"
}
]
}

View File

@ -52,41 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.drupal.org/SA-CORE-2015-003",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/SA-CORE-2015-003"
},
{
"name" : "DSA-3346",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3346"
},
{
"name" : "FEDORA-2015-13916",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html"
},
{
"name" : "FEDORA-2015-13917",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html"
},
{
"name": "FEDORA-2015-14442",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html"
},
{
"name" : "FEDORA-2015-14443",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html"
},
{
"name" : "FEDORA-2015-14444",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html"
},
{
"name": "FEDORA-2015-13915",
"refsource": "FEDORA",
@ -96,6 +66,36 @@
"name": "1033358",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033358"
},
{
"name": "FEDORA-2015-14443",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html"
},
{
"name": "FEDORA-2015-13917",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html"
},
{
"name": "DSA-3346",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3346"
},
{
"name": "https://www.drupal.org/SA-CORE-2015-003",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/SA-CORE-2015-003"
},
{
"name": "FEDORA-2015-14444",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html"
},
{
"name": "FEDORA-2015-13916",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "38254",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/38254/"
},
{
"name" : "39215",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39215/"
},
{
"name" : "http://packetstormsecurity.com/files/133621/Konica-Minolta-FTP-Utility-1.00-Post-Auth-CWD-Command-SEH-Overflow.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/133621/Konica-Minolta-FTP-Utility-1.00-Post-Auth-CWD-Command-SEH-Overflow.html"
},
{
"name": "http://www.rapid7.com/db/modules/exploit/windows/ftp/kmftp_utility_cwd",
"refsource": "MISC",
@ -76,6 +61,21 @@
"name": "http://packetstormsecurity.com/files/137252/Konica-Minolta-FTP-Utility-1.0-SEH-Buffer-Overflow.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/137252/Konica-Minolta-FTP-Utility-1.0-SEH-Buffer-Overflow.html"
},
{
"name": "http://packetstormsecurity.com/files/133621/Konica-Minolta-FTP-Utility-1.00-Post-Auth-CWD-Command-SEH-Overflow.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133621/Konica-Minolta-FTP-Utility-1.00-Post-Auth-CWD-Command-SEH-Overflow.html"
},
{
"name": "39215",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39215/"
},
{
"name": "38254",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38254/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0070",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0136",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20160412 Microsoft Excel Uninitialized Pointer Memory Corruption Vulnerability",
"refsource" : "IDEFENSE",
"url" : "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1224"
},
{
"name": "MS16-042",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-042"
},
{
"name" : "1035524",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035524"
"name": "20160412 Microsoft Excel Uninitialized Pointer Memory Corruption Vulnerability",
"refsource": "IDEFENSE",
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1224"
},
{
"name": "1035525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035525"
},
{
"name": "1035524",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035524"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0452",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-023",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-023"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "81122",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/81122"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-023",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-023"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0598",
"STATE": "PUBLIC"
},
@ -53,64 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name" : "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/",
"refsource" : "CONFIRM",
"url" : "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"
},
{
"name" : "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/",
"refsource" : "CONFIRM",
"url" : "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"
},
{
"name" : "https://mariadb.com/kb/en/mdb-10023-rn/",
"refsource" : "CONFIRM",
"url" : "https://mariadb.com/kb/en/mdb-10023-rn/"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name" : "DSA-3453",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3453"
},
{
"name" : "DSA-3459",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3459"
},
{
"name" : "RHSA-2016:0534",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0534.html"
},
{
"name" : "RHSA-2016:0705",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
},
{
"name" : "RHSA-2016:1132",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1132"
},
{
"name" : "RHSA-2016:1480",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1480.html"
"name": "SUSE-SU-2016:1620",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"
},
{
"name": "RHSA-2016:1481",
@ -123,34 +68,29 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"
},
{
"name" : "openSUSE-SU-2016:1686",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"
"name": "RHSA-2016:1132",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1132"
},
{
"name" : "SUSE-SU-2016:1619",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"
"name": "DSA-3459",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3459"
},
{
"name" : "SUSE-SU-2016:1620",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"
"name": "1034708",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034708"
},
{
"name" : "openSUSE-SU-2016:1664",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"
"name": "RHSA-2016:0534",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0534.html"
},
{
"name" : "openSUSE-SU-2016:0377",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"
},
{
"name" : "USN-2881-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2881-1"
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "81182",
@ -158,9 +98,69 @@
"url": "http://www.securityfocus.com/bid/81182"
},
{
"name" : "1034708",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034708"
"name": "SUSE-SU-2016:1619",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "RHSA-2016:1480",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1480.html"
},
{
"name": "openSUSE-SU-2016:1664",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "https://mariadb.com/kb/en/mdb-10023-rn/",
"refsource": "CONFIRM",
"url": "https://mariadb.com/kb/en/mdb-10023-rn/"
},
{
"name": "USN-2881-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2881-1"
},
{
"name": "openSUSE-SU-2016:0377",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"
},
{
"name": "DSA-3453",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3453"
},
{
"name": "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/",
"refsource": "CONFIRM",
"url": "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"
},
{
"name": "openSUSE-SU-2016:1686",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"
},
{
"name": "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/",
"refsource": "CONFIRM",
"url": "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"
},
{
"name": "RHSA-2016:0705",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4090",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{
"name": "1035828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-4668",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-4935",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-9910",
"STATE": "PUBLIC"
},
@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20161206 CVE Request: html5lib: potential cross-site scripting vulnerablity: quote attributes that need escaping in legacy browsers",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/12/06/5"
},
{
"name" : "[oss-security] 20161208 Re: CVE Request: html5lib: potential cross-site scripting vulnerablity: quote attributes that need escaping in legacy browsers",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/12/08/8"
},
{
"name" : "https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7",
"refsource" : "CONFIRM",
"url" : "https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7"
},
{
"name" : "https://github.com/html5lib/html5lib-python/issues/11",
"refsource" : "CONFIRM",
"url" : "https://github.com/html5lib/html5lib-python/issues/11"
},
{
"name": "https://github.com/html5lib/html5lib-python/issues/12",
"refsource": "CONFIRM",
@ -82,10 +62,30 @@
"refsource": "CONFIRM",
"url": "https://html5lib.readthedocs.io/en/latest/changes.html#b9"
},
{
"name": "[oss-security] 20161206 CVE Request: html5lib: potential cross-site scripting vulnerablity: quote attributes that need escaping in legacy browsers",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/12/06/5"
},
{
"name": "[oss-security] 20161208 Re: CVE Request: html5lib: potential cross-site scripting vulnerablity: quote attributes that need escaping in legacy browsers",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/12/08/8"
},
{
"name": "95132",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95132"
},
{
"name": "https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7",
"refsource": "CONFIRM",
"url": "https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7"
},
{
"name": "https://github.com/html5lib/html5lib-python/issues/11",
"refsource": "CONFIRM",
"url": "https://github.com/html5lib/html5lib-python/issues/11"
}
]
}