"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:30:37 +00:00
parent c96a28f9eb
commit 30b370d10e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
66 changed files with 3932 additions and 3932 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2007-0208",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MS07-014",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014"
},
{
"name" : "TA07-044A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-044A.html"
},
{
"name" : "22477",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22477"
"name": "1017639",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017639"
},
{
"name": "ADV-2007-0583",
@ -83,9 +73,19 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A700"
},
{
"name" : "1017639",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017639"
"name": "TA07-044A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-044A.html"
},
{
"name": "MS07-014",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014"
},
{
"name": "22477",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22477"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070126 WS_FTP 2007 Professional SCP handling format string vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/458293/100/0/threaded"
},
{
"name" : "22275",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22275"
"name": "wsftp-scphandler-format-string(31865)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31865"
},
{
"name": "33602",
@ -68,9 +63,14 @@
"url": "http://osvdb.org/33602"
},
{
"name" : "wsftp-scphandler-format-string(31865)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31865"
"name": "22275",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22275"
},
{
"name": "20070126 WS_FTP 2007 Professional SCP handling format string vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/458293/100/0/threaded"
}
]
}

View File

@ -52,31 +52,26 @@
},
"references": {
"reference_data": [
{
"name" : "20070201 Remote Sql Injection in EasyMoblog 0.5.1",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0054.html"
},
{
"name": "20070201 Remote Sql Injection in EasyMoblog 0.5.1 # 2",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0052.html"
},
{
"name" : "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog%232.txt",
"refsource" : "MISC",
"url" : "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog%232.txt"
},
{
"name" : "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog.txt",
"refsource" : "MISC",
"url" : "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog.txt"
},
{
"name": "22369",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22369"
},
{
"name": "20070201 Remote Sql Injection in EasyMoblog 0.5.1",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0054.html"
},
{
"name": "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog%232.txt",
"refsource": "MISC",
"url": "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog%232.txt"
},
{
"name": "33636",
"refsource": "OSVDB",
@ -86,6 +81,11 @@
"name": "19370",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19370"
},
{
"name": "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog.txt",
"refsource": "MISC",
"url": "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog.txt"
}
]
}

View File

@ -53,10 +53,20 @@
"references": {
"reference_data": [
{
"name" : "20070212 SecurityVulns.com: Microsoft Visual C++ 8.0 standard library time functions invalid assertion DoS (Problem 3000). ",
"name": "visualstudio-time-dos(32454)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32454"
},
{
"refsource": "BUGTRAQ",
"name": "20070212 SecurityVulns.com: Microsoft Visual C++ 8.0 standard library time functions invalid assertion DoS (Problem 3000).",
"url": "http://www.securityfocus.com/archive/1/459847/100/0/threaded"
},
{
"name": "2237",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2237"
},
{
"name": "http://msdn2.microsoft.com/en-us/library/a442x3ye(VS.80).aspx",
"refsource": "MISC",
@ -66,16 +76,6 @@
"name": "33626",
"refsource": "OSVDB",
"url": "http://osvdb.org/33626"
},
{
"name" : "2237",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2237"
},
{
"name" : "visualstudio-time-dos(32454)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32454"
}
]
}

View File

@ -52,175 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "20070404 rPSA-2007-0063-1 krb5 krb5-server krb5-services krb5-test krb5-workstation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/464666/100/0/threaded"
},
{
"name" : "20070403 MITKRB5-SA-2007-002: KDC, kadmind stack overflow in krb5_klog_syslog [CVE-2007-0957]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/464592/100/0/threaded"
},
{
"name" : "20070405 FLEA-2007-0008-1: krb5",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/464814/30/7170/threaded"
},
{
"name" : "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt",
"refsource" : "CONFIRM",
"url" : "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=305391",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=305391"
},
{
"name" : "APPLE-SA-2007-04-19",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
},
{
"name" : "DSA-1276",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1276"
},
{
"name" : "GLSA-200704-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200704-02.xml"
},
{
"name" : "MDKSA-2007:077",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:077"
},
{
"name" : "RHSA-2007:0095",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0095.html"
},
{
"name" : "20070401-01-P",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc"
},
{
"name" : "102930",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1"
},
{
"name" : "SUSE-SA:2007:025",
"refsource" : "SUSE",
"url" : "http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html"
},
{
"name" : "USN-449-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-449-1"
},
{
"name" : "TA07-093B",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-093B.html"
},
{
"name" : "TA07-109A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
},
{
"name" : "VU#704024",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/704024"
},
{
"name" : "23285",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23285"
},
{
"name": "oval:org.mitre.oval:def:10757",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757"
},
{
"name" : "ADV-2007-1250",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1250"
},
{
"name": "ADV-2007-1218",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1218"
},
{
"name" : "ADV-2007-1470",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1470"
"name": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt",
"refsource": "CONFIRM",
"url": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt"
},
{
"name" : "ADV-2007-1983",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1983"
"name": "20070403 MITKRB5-SA-2007-002: KDC, kadmind stack overflow in krb5_klog_syslog [CVE-2007-0957]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464592/100/0/threaded"
},
{
"name" : "1017849",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017849"
},
{
"name" : "24706",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24706"
},
{
"name" : "24736",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24736"
},
{
"name" : "24757",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24757"
},
{
"name" : "24740",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24740"
},
{
"name" : "24750",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24750"
},
{
"name" : "24785",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24785"
},
{
"name" : "24786",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24786"
},
{
"name" : "24798",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24798"
},
{
"name" : "24817",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24817"
},
{
"name" : "24735",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24735"
"name": "20070401-01-P",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc"
},
{
"name": "24966",
@ -228,14 +83,159 @@
"url": "http://secunia.com/advisories/24966"
},
{
"name" : "25464",
"name": "24706",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/25464"
"url": "http://secunia.com/advisories/24706"
},
{
"name": "24798",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24798"
},
{
"name": "24740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24740"
},
{
"name": "RHSA-2007:0095",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0095.html"
},
{
"name": "ADV-2007-1983",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1983"
},
{
"name": "24786",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24786"
},
{
"name": "102930",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305391",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305391"
},
{
"name": "TA07-093B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-093B.html"
},
{
"name": "20070405 FLEA-2007-0008-1: krb5",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464814/30/7170/threaded"
},
{
"name": "DSA-1276",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1276"
},
{
"name": "24735",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24735"
},
{
"name": "23285",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23285"
},
{
"name": "TA07-109A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
},
{
"name": "24750",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24750"
},
{
"name": "ADV-2007-1250",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1250"
},
{
"name": "24817",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24817"
},
{
"name": "24757",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24757"
},
{
"name": "kerberos-krb5klogsyslog-bo(33411)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33411"
},
{
"name": "VU#704024",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/704024"
},
{
"name": "1017849",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017849"
},
{
"name": "SUSE-SA:2007:025",
"refsource": "SUSE",
"url": "http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html"
},
{
"name": "24785",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24785"
},
{
"name": "25464",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25464"
},
{
"name": "MDKSA-2007:077",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:077"
},
{
"name": "USN-449-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-449-1"
},
{
"name": "APPLE-SA-2007-04-19",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
},
{
"name": "ADV-2007-1470",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1470"
},
{
"name": "24736",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24736"
},
{
"name": "20070404 rPSA-2007-0063-1 krb5 krb5-server krb5-services krb5-test krb5-workstation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464666/100/0/threaded"
},
{
"name": "GLSA-200704-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200704-02.xml"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-004_e/index-e.html"
},
{
"name" : "36003",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36003"
},
{
"name": "osas-unspecified-dos(32696)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32696"
},
{
"name": "36003",
"refsource": "OSVDB",
"url": "http://osvdb.org/36003"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "35038",
"refsource": "OSVDB",
"url": "http://osvdb.org/35038"
},
{
"name": "20070315 LIBFtp 5.0 (sprintf(), strcpy()) Multiple local buffer overflow",
"refsource": "BUGTRAQ",
@ -62,11 +67,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22987"
},
{
"name" : "35038",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35038"
},
{
"name": "2441",
"refsource": "SREASON",

View File

@ -62,11 +62,6 @@
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name" : "[security] 20070321 MyOpenID",
"refsource" : "MLIST",
"url" : "http://openid.net/pipermail/security/2007-March/000291.html"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
@ -86,6 +81,11 @@
"name": "43601",
"refsource": "OSVDB",
"url": "http://osvdb.org/43601"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20070325 PHP 5.2.1 with PECL phpDOC local buffer overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/463843/100/0/threaded"
},
{
"name" : "3576",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3576"
},
{
"name" : "http://retrogod.altervista.org/php521_phpdoc_bof.html",
"refsource" : "MISC",
"url" : "http://retrogod.altervista.org/php521_phpdoc_bof.html"
},
{
"name": "23124",
"refsource": "BID",
@ -77,6 +62,21 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2512"
},
{
"name": "3576",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3576"
},
{
"name": "20070325 PHP 5.2.1 with PECL phpDOC local buffer overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/463843/100/0/threaded"
},
{
"name": "http://retrogod.altervista.org/php521_phpdoc_bof.html",
"refsource": "MISC",
"url": "http://retrogod.altervista.org/php521_phpdoc_bof.html"
},
{
"name": "phpdoc-confirmcompiled-bo(33236)",
"refsource": "XF",

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20070331 Remot File Include In Shop-SCRIPT FREE",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/464350/100/0/threaded"
"name": "2520",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2520"
},
{
"name": "35222",
"refsource": "OSVDB",
"url": "http://osvdb.org/35222"
},
{
"name" : "2520",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2520"
},
{
"name": "shopscriptfree-smarty-file-include(33339)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33339"
},
{
"name": "20070331 Remot File Include In Shop-SCRIPT FREE",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464350/100/0/threaded"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25164"
},
{
"name" : "2972",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2972"
},
{
"name": "wikiwebweaver-index-file-upload(35736)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35736"
},
{
"name": "2972",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2972"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "26219",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26219"
},
{
"name": "IY98339",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY98339"
},
{
"name" : "IY98560",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=isg1IY98560"
},
{
"name": "ADV-2007-2678",
"refsource": "VUPEN",
@ -73,9 +73,9 @@
"url": "http://securitytracker.com/id?1018467"
},
{
"name" : "26219",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26219"
"name": "IY98560",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY98560"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070807 C-SAM oneWallet forget password Cross Site Scripting vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/475732/100/0/threaded"
"name": "onewallet-forgetpassword-xss(35838)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35838"
},
{
"name": "25224",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/25224"
},
{
"name" : "onewallet-forgetpassword-xss(35838)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35838"
"name": "20070807 C-SAM oneWallet forget password Cross Site Scripting vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/475732/100/0/threaded"
}
]
}

View File

@ -62,30 +62,30 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25645"
},
{
"name" : "ADV-2007-3198",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3198"
},
{
"name" : "37099",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37099"
},
{
"name": "26707",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26707"
},
{
"name": "rsa-envision-username-xss(36575)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36575"
},
{
"name": "3137",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3137"
},
{
"name" : "rsa-envision-username-xss(36575)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36575"
"name": "37099",
"refsource": "OSVDB",
"url": "http://osvdb.org/37099"
},
{
"name": "ADV-2007-3198",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3198"
}
]
}

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "26914",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26914"
},
{
"name": "20070927 [CAID 35690, 35691, 35692]: CA BrightStor Hierarchical Storage Manager CsAgent Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/480808/100/0/threaded"
},
{
"name" : "http://dvlabs.tippingpoint.com/advisory/TPTI-07-17",
"refsource" : "MISC",
"url" : "http://dvlabs.tippingpoint.com/advisory/TPTI-07-17"
},
{
"name" : "http://supportconnectw.ca.com/public/bstorhsm/infodocs/bstorhsm-secnot.asp",
"refsource" : "CONFIRM",
"url" : "http://supportconnectw.ca.com/public/bstorhsm/infodocs/bstorhsm-secnot.asp"
"name": "ADV-2007-3275",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3275"
},
{
"name": "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35692",
@ -78,9 +78,14 @@
"url": "http://www.securityfocus.com/bid/25823"
},
{
"name" : "ADV-2007-3275",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3275"
"name": "ca-brightstor-csagent-sql-injection(36828)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36828"
},
{
"name": "http://supportconnectw.ca.com/public/bstorhsm/infodocs/bstorhsm-secnot.asp",
"refsource": "CONFIRM",
"url": "http://supportconnectw.ca.com/public/bstorhsm/infodocs/bstorhsm-secnot.asp"
},
{
"name": "1018747",
@ -88,14 +93,9 @@
"url": "http://securitytracker.com/id?1018747"
},
{
"name" : "26914",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26914"
},
{
"name" : "ca-brightstor-csagent-sql-injection(36828)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36828"
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-07-17",
"refsource": "MISC",
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-07-17"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-5334",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20071029 FLEA-2007-0062-1 firefox",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482925/100/0/threaded"
"name": "FEDORA-2007-2601",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html"
},
{
"name": "20071026 rPSA-2007-0225-1 firefox",
@ -63,19 +63,19 @@
"url": "http://www.securityfocus.com/archive/1/482876/100/200/threaded"
},
{
"name" : "20071029 rPSA-2007-0225-2 firefox thunderbird",
"name": "ADV-2007-3587",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3587"
},
{
"name": "27414",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27414"
},
{
"name": "20071029 FLEA-2007-0062-1 firefox",
"refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482932/100/200/threaded"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=391043",
"refsource" : "MISC",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=391043"
},
{
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-33.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2007/mfsa2007-33.html"
"url": "http://www.securityfocus.com/archive/1/482925/100/0/threaded"
},
{
"name": "https://issues.rpath.com/browse/RPL-1858",
@ -83,14 +83,54 @@
"url": "https://issues.rpath.com/browse/RPL-1858"
},
{
"name" : "http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html"
"name": "GLSA-200711-14",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200711-14.xml"
},
{
"name" : "DSA-1396",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1396"
"name": "27360",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27360"
},
{
"name": "HPSBUX02153",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "27298",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27298"
},
{
"name": "27315",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27315"
},
{
"name": "1018837",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018837"
},
{
"name": "27327",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27327"
},
{
"name": "ADV-2007-3544",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3544"
},
{
"name": "27276",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27276"
},
{
"name": "USN-535-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/535-1/"
},
{
"name": "DSA-1401",
@ -103,44 +143,9 @@
"url": "http://www.debian.org/security/2007/dsa-1392"
},
{
"name" : "FEDORA-2007-2601",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html"
},
{
"name" : "FEDORA-2007-2664",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html"
},
{
"name" : "FEDORA-2007-3431",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html"
},
{
"name" : "GLSA-200711-14",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200711-14.xml"
},
{
"name" : "HPSBUX02153",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name" : "SSRT061181",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name" : "MDKSA-2007:202",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202"
},
{
"name" : "RHSA-2007:0979",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0979.html"
"name": "VU#349217",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/349217"
},
{
"name": "RHSA-2007:0980",
@ -148,14 +153,9 @@
"url": "http://www.redhat.com/support/errata/RHSA-2007-0980.html"
},
{
"name" : "RHSA-2007:0981",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0981.html"
},
{
"name" : "201516",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1"
"name": "27383",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27383"
},
{
"name": "SUSE-SA:2007:057",
@ -163,39 +163,14 @@
"url": "http://www.novell.com/linux/security/advisories/2007_57_mozilla.html"
},
{
"name" : "USN-535-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/535-1/"
"name": "27356",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27356"
},
{
"name" : "USN-536-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-536-1"
},
{
"name" : "VU#349217",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/349217"
},
{
"name" : "26132",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26132"
},
{
"name" : "oval:org.mitre.oval:def:11482",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11482"
},
{
"name" : "ADV-2007-3544",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3544"
},
{
"name" : "ADV-2007-3587",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3587"
"name": "RHSA-2007:0981",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0981.html"
},
{
"name": "ADV-2008-0083",
@ -203,109 +178,134 @@
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name" : "1018837",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1018837"
"name": "27387",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27387"
},
{
"name" : "27276",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27276"
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=391043",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=391043"
},
{
"name" : "27325",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27325"
},
{
"name" : "27327",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27327"
},
{
"name" : "27335",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27335"
},
{
"name" : "27356",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27356"
},
{
"name" : "27383",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27383"
},
{
"name" : "27425",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27425"
"name": "FEDORA-2007-3431",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html"
},
{
"name": "27403",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27403"
},
{
"name" : "27480",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27480"
},
{
"name" : "27387",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27387"
},
{
"name" : "27298",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27298"
},
{
"name" : "27311",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27311"
},
{
"name" : "27315",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27315"
},
{
"name": "27336",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27336"
},
{
"name" : "27665",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27665"
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-33.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-33.html"
},
{
"name" : "27414",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27414"
"name": "DSA-1396",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1396"
},
{
"name" : "27680",
"name": "27425",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/27680"
},
{
"name" : "27360",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27360"
"url": "http://secunia.com/advisories/27425"
},
{
"name": "28398",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28398"
},
{
"name": "27311",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27311"
},
{
"name": "SSRT061181",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "27325",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27325"
},
{
"name": "MDKSA-2007:202",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202"
},
{
"name": "mozilla-xul-page-spoofing(37286)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37286"
},
{
"name": "27665",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27665"
},
{
"name": "RHSA-2007:0979",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0979.html"
},
{
"name": "27335",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27335"
},
{
"name": "FEDORA-2007-2664",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html"
},
{
"name": "27480",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27480"
},
{
"name": "27680",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27680"
},
{
"name": "26132",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26132"
},
{
"name": "http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html"
},
{
"name": "201516",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1"
},
{
"name": "20071029 rPSA-2007-0225-2 firefox thunderbird",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482932/100/200/threaded"
},
{
"name": "USN-536-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-536-1"
},
{
"name": "oval:org.mitre.oval:def:11482",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11482"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "4522",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4522"
},
{
"name" : "http://www.toc2rta.com/?q=node/23",
"refsource" : "MISC",
"url" : "http://www.toc2rta.com/?q=node/23"
},
{
"name": "ADV-2007-3485",
"refsource": "VUPEN",
@ -76,6 +66,16 @@
"name": "iphone-ipod-tiff-code-execution(37186)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37186"
},
{
"name": "4522",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4522"
},
{
"name": "http://www.toc2rta.com/?q=node/23",
"refsource": "MISC",
"url": "http://www.toc2rta.com/?q=node/23"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150227 Re: CVE-Request -- phpBugTracker v. 1.6.0 -- Multiple SQLi, stored/reflecting XSS- and CSRF-vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/02/28/1"
},
{
"name": "https://github.com/a-v-k/phpBugTracker/issues/4",
"refsource": "CONFIRM",
"url": "https://github.com/a-v-k/phpBugTracker/issues/4"
},
{
"name": "[oss-security] 20150227 Re: CVE-Request -- phpBugTracker v. 1.6.0 -- Multiple SQLi, stored/reflecting XSS- and CSRF-vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/02/28/1"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20150306 Betster (PHP Betoffice) Authentication Bypass and SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/534816/100/0/threaded"
},
{
"name": "36306",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/36306/"
},
{
"name": "20150306 Betster (PHP Betoffice) Authentication Bypass and SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534816/100/0/threaded"
},
{
"name": "http://packetstormsecurity.com/files/130696/Betster-1.0.4-SQL-Injection-Authentication-Bypass.html",
"refsource": "MISC",

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
"name": "USN-2570-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-2570-1"
},
{
"name": "DSA-3238",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3238"
},
{
"name": "74221",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74221"
},
{
"name": "openSUSE-SU-2015:0748",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
},
{
"name" : "USN-2570-1",
"refsource" : "UBUNTU",
"url" : "http://ubuntu.com/usn/usn-2570-1"
},
{
"name" : "74221",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/74221"
"name": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2015-3834",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)",
"refsource" : "MLIST",
"url" : "https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"
},
{
"name": "https://android.googlesource.com/platform/frameworks/av/+/c82e31a7039a03dca7b37c65b7890ba5c1e18ced",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/c82e31a7039a03dca7b37c65b7890ba5c1e18ced"
},
{
"name": "[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)",
"refsource": "MLIST",
"url": "https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2015-3837",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)",
"refsource" : "MLIST",
"url" : "https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"
},
{
"name": "https://android.googlesource.com/platform/external/conscrypt/+/edf7055461e2d7fa18de5196dca80896a56e3540",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/external/conscrypt/+/edf7055461e2d7fa18de5196dca80896a56e3540"
},
{
"name": "[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)",
"refsource": "MLIST",
"url": "https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6050",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "MS15-106",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-106"
},
{
"name": "1033800",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033800"
},
{
"name": "MS15-106",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-106"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6120",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6319",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20160127 Cisco RV220W Management Authentication Bypass Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220"
},
{
"name": "1034830",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034830"
},
{
"name": "20160127 Cisco RV220W Management Authentication Bypass Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-7440",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-7574",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-7584",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "1034539",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034539"
},
{
"name": "[debian-lts-announce] 20181220 [SECURITY] [DLA 1611-1] libav security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html"
},
{
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=abee0a1c60612e8638640a8a3738fffb65e16dbf",
"refsource" : "CONFIRM",
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=abee0a1c60612e8638640a8a3738fffb65e16dbf"
},
{
"name": "openSUSE-SU-2016:0089",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00004.html"
},
{
"name" : "1034539",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034539"
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=abee0a1c60612e8638640a8a3738fffb65e16dbf",
"refsource": "CONFIRM",
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=abee0a1c60612e8638640a8a3738fffb65e16dbf"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1063",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-311"
},
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{
"name": "1035828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1359",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1479",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20160817 Cisco IP Phone 8800 Series Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-ipp"
"name": "1036646",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036646"
},
{
"name": "92515",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/92515"
},
{
"name" : "1036646",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036646"
"name": "20160817 Cisco IP Phone 8800 Series Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-ipp"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1783",
"STATE": "PUBLIC"
},
@ -52,36 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20160331 WebKitGTK+ Security Advisory WSA-2016-0003",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/537948/100/0/threaded"
},
{
"name" : "https://support.apple.com/HT206166",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206166"
},
{
"name" : "https://support.apple.com/HT206169",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206169"
},
{
"name" : "https://support.apple.com/HT206171",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206171"
},
{
"name" : "APPLE-SA-2016-03-21-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
},
{
"name" : "APPLE-SA-2016-03-21-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html"
},
{
"name": "APPLE-SA-2016-03-21-6",
"refsource": "APPLE",
@ -91,6 +61,36 @@
"name": "1035353",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035353"
},
{
"name": "APPLE-SA-2016-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
},
{
"name": "20160331 WebKitGTK+ Security Advisory WSA-2016-0003",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537948/100/0/threaded"
},
{
"name": "https://support.apple.com/HT206171",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206171"
},
{
"name": "APPLE-SA-2016-03-21-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html"
},
{
"name": "https://support.apple.com/HT206169",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206169"
},
{
"name": "https://support.apple.com/HT206166",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206166"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://kb.netapp.com/support/s/article/cve-2016-5372-cross-site-request-forgery-vulnerability-in-snap-creator-framework",
"refsource" : "CONFIRM",
"url" : "https://kb.netapp.com/support/s/article/cve-2016-5372-cross-site-request-forgery-vulnerability-in-snap-creator-framework"
},
{
"name": "https://security.netapp.com/advisory/ntap-20160622-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20160622-0001/"
},
{
"name": "https://kb.netapp.com/support/s/article/cve-2016-5372-cross-site-request-forgery-vulnerability-in-snap-creator-framework",
"refsource": "CONFIRM",
"url": "https://kb.netapp.com/support/s/article/cve-2016-5372-cross-site-request-forgery-vulnerability-in-snap-creator-framework"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5570",
"STATE": "PUBLIC"
},

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.kb.cert.org/vuls/id/BLUU-A9SQRS",
"refsource" : "MISC",
"url" : "http://www.kb.cert.org/vuls/id/BLUU-A9SQRS"
},
{
"name": "https://community.rapid7.com/community/infosec/blog/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump",
"refsource": "MISC",
"url": "https://community.rapid7.com/community/infosec/blog/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump"
},
{
"name": "http://www.kb.cert.org/vuls/id/BLUU-A9SQRS",
"refsource": "MISC",
"url": "http://www.kb.cert.org/vuls/id/BLUU-A9SQRS"
},
{
"name": "VU#884840",
"refsource": "CERT-VN",

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140",
"refsource" : "MISC",
"url" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140"
},
{
"name" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142",
"refsource" : "MISC",
"url" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142"
},
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=24114",
"refsource" : "MISC",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=24114"
},
{
"name": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9",
"refsource": "MISC",
@ -81,6 +66,21 @@
"name": "107160",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107160"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=24114",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24114"
},
{
"name": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142",
"refsource": "MISC",
"url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142"
},
{
"name": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140",
"refsource": "MISC",
"url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140"
}
]
}