mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
c96a28f9eb
commit
30b370d10e
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2007-0208",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS07-014",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014"
|
||||
},
|
||||
{
|
||||
"name" : "TA07-044A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-044A.html"
|
||||
},
|
||||
{
|
||||
"name" : "22477",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22477"
|
||||
"name": "1017639",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1017639"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0583",
|
||||
@ -83,9 +73,19 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A700"
|
||||
},
|
||||
{
|
||||
"name" : "1017639",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1017639"
|
||||
"name": "TA07-044A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-044A.html"
|
||||
},
|
||||
{
|
||||
"name": "MS07-014",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014"
|
||||
},
|
||||
{
|
||||
"name": "22477",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22477"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070126 WS_FTP 2007 Professional SCP handling format string vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/458293/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "22275",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22275"
|
||||
"name": "wsftp-scphandler-format-string(31865)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31865"
|
||||
},
|
||||
{
|
||||
"name": "33602",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://osvdb.org/33602"
|
||||
},
|
||||
{
|
||||
"name" : "wsftp-scphandler-format-string(31865)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31865"
|
||||
"name": "22275",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22275"
|
||||
},
|
||||
{
|
||||
"name": "20070126 WS_FTP 2007 Professional SCP handling format string vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/458293/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,31 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070201 Remote Sql Injection in EasyMoblog 0.5.1",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0054.html"
|
||||
},
|
||||
{
|
||||
"name": "20070201 Remote Sql Injection in EasyMoblog 0.5.1 # 2",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0052.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog%232.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog%232.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog.txt"
|
||||
},
|
||||
{
|
||||
"name": "22369",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22369"
|
||||
},
|
||||
{
|
||||
"name": "20070201 Remote Sql Injection in EasyMoblog 0.5.1",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0054.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog%232.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog%232.txt"
|
||||
},
|
||||
{
|
||||
"name": "33636",
|
||||
"refsource": "OSVDB",
|
||||
@ -86,6 +81,11 @@
|
||||
"name": "19370",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19370"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zion-security.com/text/Sql_Vulnerability_EasymoBlog.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,10 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070212 SecurityVulns.com: Microsoft Visual C++ 8.0 standard library time functions invalid assertion DoS (Problem 3000). ",
|
||||
"name": "visualstudio-time-dos(32454)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32454"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20070212 SecurityVulns.com: Microsoft Visual C++ 8.0 standard library time functions invalid assertion DoS (Problem 3000).",
|
||||
"url": "http://www.securityfocus.com/archive/1/459847/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "2237",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2237"
|
||||
},
|
||||
{
|
||||
"name": "http://msdn2.microsoft.com/en-us/library/a442x3ye(VS.80).aspx",
|
||||
"refsource": "MISC",
|
||||
@ -66,16 +76,6 @@
|
||||
"name": "33626",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33626"
|
||||
},
|
||||
{
|
||||
"name" : "2237",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/2237"
|
||||
},
|
||||
{
|
||||
"name" : "visualstudio-time-dos(32454)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32454"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,175 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070404 rPSA-2007-0063-1 krb5 krb5-server krb5-services krb5-test krb5-workstation",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/464666/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070403 MITKRB5-SA-2007-002: KDC, kadmind stack overflow in krb5_klog_syslog [CVE-2007-0957]",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/464592/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070405 FLEA-2007-0008-1: krb5",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/464814/30/7170/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://docs.info.apple.com/article.html?artnum=305391",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://docs.info.apple.com/article.html?artnum=305391"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2007-04-19",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1276",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2007/dsa-1276"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200704-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200704-02.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:077",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:077"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0095",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0095.html"
|
||||
},
|
||||
{
|
||||
"name" : "20070401-01-P",
|
||||
"refsource" : "SGI",
|
||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc"
|
||||
},
|
||||
{
|
||||
"name" : "102930",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:025",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-449-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-449-1"
|
||||
},
|
||||
{
|
||||
"name" : "TA07-093B",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-093B.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA07-109A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#704024",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/704024"
|
||||
},
|
||||
{
|
||||
"name" : "23285",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23285"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10757",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1250",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1250"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1218",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1218"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1470",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1470"
|
||||
"name": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1983",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1983"
|
||||
"name": "20070403 MITKRB5-SA-2007-002: KDC, kadmind stack overflow in krb5_klog_syslog [CVE-2007-0957]",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/464592/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "1017849",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1017849"
|
||||
},
|
||||
{
|
||||
"name" : "24706",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24706"
|
||||
},
|
||||
{
|
||||
"name" : "24736",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24736"
|
||||
},
|
||||
{
|
||||
"name" : "24757",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24757"
|
||||
},
|
||||
{
|
||||
"name" : "24740",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24740"
|
||||
},
|
||||
{
|
||||
"name" : "24750",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24750"
|
||||
},
|
||||
{
|
||||
"name" : "24785",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24785"
|
||||
},
|
||||
{
|
||||
"name" : "24786",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24786"
|
||||
},
|
||||
{
|
||||
"name" : "24798",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24798"
|
||||
},
|
||||
{
|
||||
"name" : "24817",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24817"
|
||||
},
|
||||
{
|
||||
"name" : "24735",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24735"
|
||||
"name": "20070401-01-P",
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc"
|
||||
},
|
||||
{
|
||||
"name": "24966",
|
||||
@ -228,14 +83,159 @@
|
||||
"url": "http://secunia.com/advisories/24966"
|
||||
},
|
||||
{
|
||||
"name" : "25464",
|
||||
"name": "24706",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25464"
|
||||
"url": "http://secunia.com/advisories/24706"
|
||||
},
|
||||
{
|
||||
"name": "24798",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24798"
|
||||
},
|
||||
{
|
||||
"name": "24740",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24740"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0095",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0095.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1983",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1983"
|
||||
},
|
||||
{
|
||||
"name": "24786",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24786"
|
||||
},
|
||||
{
|
||||
"name": "102930",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1"
|
||||
},
|
||||
{
|
||||
"name": "http://docs.info.apple.com/article.html?artnum=305391",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://docs.info.apple.com/article.html?artnum=305391"
|
||||
},
|
||||
{
|
||||
"name": "TA07-093B",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-093B.html"
|
||||
},
|
||||
{
|
||||
"name": "20070405 FLEA-2007-0008-1: krb5",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/464814/30/7170/threaded"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1276",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2007/dsa-1276"
|
||||
},
|
||||
{
|
||||
"name": "24735",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24735"
|
||||
},
|
||||
{
|
||||
"name": "23285",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23285"
|
||||
},
|
||||
{
|
||||
"name": "TA07-109A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
|
||||
},
|
||||
{
|
||||
"name": "24750",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24750"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1250",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1250"
|
||||
},
|
||||
{
|
||||
"name": "24817",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24817"
|
||||
},
|
||||
{
|
||||
"name": "24757",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24757"
|
||||
},
|
||||
{
|
||||
"name": "kerberos-krb5klogsyslog-bo(33411)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33411"
|
||||
},
|
||||
{
|
||||
"name": "VU#704024",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/704024"
|
||||
},
|
||||
{
|
||||
"name": "1017849",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1017849"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:025",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html"
|
||||
},
|
||||
{
|
||||
"name": "24785",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24785"
|
||||
},
|
||||
{
|
||||
"name": "25464",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25464"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:077",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:077"
|
||||
},
|
||||
{
|
||||
"name": "USN-449-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-449-1"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2007-04-19",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1470",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1470"
|
||||
},
|
||||
{
|
||||
"name": "24736",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24736"
|
||||
},
|
||||
{
|
||||
"name": "20070404 rPSA-2007-0063-1 krb5 krb5-server krb5-services krb5-test krb5-workstation",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/464666/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200704-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200704-02.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-004_e/index-e.html"
|
||||
},
|
||||
{
|
||||
"name" : "36003",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36003"
|
||||
},
|
||||
{
|
||||
"name": "osas-unspecified-dos(32696)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32696"
|
||||
},
|
||||
{
|
||||
"name": "36003",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36003"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "35038",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35038"
|
||||
},
|
||||
{
|
||||
"name": "20070315 LIBFtp 5.0 (sprintf(), strcpy()) Multiple local buffer overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22987"
|
||||
},
|
||||
{
|
||||
"name" : "35038",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35038"
|
||||
},
|
||||
{
|
||||
"name": "2441",
|
||||
"refsource": "SREASON",
|
||||
|
@ -62,11 +62,6 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
|
||||
},
|
||||
{
|
||||
"name" : "[security] 20070321 MyOpenID",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openid.net/pipermail/security/2007-March/000291.html"
|
||||
},
|
||||
{
|
||||
"name": "[security] 20070321 MyOpenID",
|
||||
"refsource": "MLIST",
|
||||
@ -86,6 +81,11 @@
|
||||
"name": "43601",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/43601"
|
||||
},
|
||||
{
|
||||
"name": "[security] 20070321 MyOpenID",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070325 PHP 5.2.1 with PECL phpDOC local buffer overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/463843/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "3576",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3576"
|
||||
},
|
||||
{
|
||||
"name" : "http://retrogod.altervista.org/php521_phpdoc_bof.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://retrogod.altervista.org/php521_phpdoc_bof.html"
|
||||
},
|
||||
{
|
||||
"name": "23124",
|
||||
"refsource": "BID",
|
||||
@ -77,6 +62,21 @@
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2512"
|
||||
},
|
||||
{
|
||||
"name": "3576",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3576"
|
||||
},
|
||||
{
|
||||
"name": "20070325 PHP 5.2.1 with PECL phpDOC local buffer overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/463843/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://retrogod.altervista.org/php521_phpdoc_bof.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://retrogod.altervista.org/php521_phpdoc_bof.html"
|
||||
},
|
||||
{
|
||||
"name": "phpdoc-confirmcompiled-bo(33236)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070331 Remot File Include In Shop-SCRIPT FREE",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/464350/100/0/threaded"
|
||||
"name": "2520",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2520"
|
||||
},
|
||||
{
|
||||
"name": "35222",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35222"
|
||||
},
|
||||
{
|
||||
"name" : "2520",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/2520"
|
||||
},
|
||||
{
|
||||
"name": "shopscriptfree-smarty-file-include(33339)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33339"
|
||||
},
|
||||
{
|
||||
"name": "20070331 Remot File Include In Shop-SCRIPT FREE",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/464350/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25164"
|
||||
},
|
||||
{
|
||||
"name" : "2972",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/2972"
|
||||
},
|
||||
{
|
||||
"name": "wikiwebweaver-index-file-upload(35736)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35736"
|
||||
},
|
||||
{
|
||||
"name": "2972",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2972"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "26219",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26219"
|
||||
},
|
||||
{
|
||||
"name": "IY98339",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY98339"
|
||||
},
|
||||
{
|
||||
"name" : "IY98560",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www-1.ibm.com/support/docview.wss?uid=isg1IY98560"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2678",
|
||||
"refsource": "VUPEN",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://securitytracker.com/id?1018467"
|
||||
},
|
||||
{
|
||||
"name" : "26219",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26219"
|
||||
"name": "IY98560",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY98560"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070807 C-SAM oneWallet forget password Cross Site Scripting vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/475732/100/0/threaded"
|
||||
"name": "onewallet-forgetpassword-xss(35838)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35838"
|
||||
},
|
||||
{
|
||||
"name": "25224",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/25224"
|
||||
},
|
||||
{
|
||||
"name" : "onewallet-forgetpassword-xss(35838)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35838"
|
||||
"name": "20070807 C-SAM oneWallet forget password Cross Site Scripting vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/475732/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,30 +62,30 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25645"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3198",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3198"
|
||||
},
|
||||
{
|
||||
"name" : "37099",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37099"
|
||||
},
|
||||
{
|
||||
"name": "26707",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26707"
|
||||
},
|
||||
{
|
||||
"name": "rsa-envision-username-xss(36575)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36575"
|
||||
},
|
||||
{
|
||||
"name": "3137",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3137"
|
||||
},
|
||||
{
|
||||
"name" : "rsa-envision-username-xss(36575)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36575"
|
||||
"name": "37099",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37099"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3198",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3198"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "26914",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26914"
|
||||
},
|
||||
{
|
||||
"name": "20070927 [CAID 35690, 35691, 35692]: CA BrightStor Hierarchical Storage Manager CsAgent Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/480808/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://dvlabs.tippingpoint.com/advisory/TPTI-07-17",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://dvlabs.tippingpoint.com/advisory/TPTI-07-17"
|
||||
},
|
||||
{
|
||||
"name" : "http://supportconnectw.ca.com/public/bstorhsm/infodocs/bstorhsm-secnot.asp",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://supportconnectw.ca.com/public/bstorhsm/infodocs/bstorhsm-secnot.asp"
|
||||
"name": "ADV-2007-3275",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3275"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35692",
|
||||
@ -78,9 +78,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/25823"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3275",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3275"
|
||||
"name": "ca-brightstor-csagent-sql-injection(36828)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36828"
|
||||
},
|
||||
{
|
||||
"name": "http://supportconnectw.ca.com/public/bstorhsm/infodocs/bstorhsm-secnot.asp",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://supportconnectw.ca.com/public/bstorhsm/infodocs/bstorhsm-secnot.asp"
|
||||
},
|
||||
{
|
||||
"name": "1018747",
|
||||
@ -88,14 +93,9 @@
|
||||
"url": "http://securitytracker.com/id?1018747"
|
||||
},
|
||||
{
|
||||
"name" : "26914",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26914"
|
||||
},
|
||||
{
|
||||
"name" : "ca-brightstor-csagent-sql-injection(36828)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36828"
|
||||
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-07-17",
|
||||
"refsource": "MISC",
|
||||
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-07-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2007-5334",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071029 FLEA-2007-0062-1 firefox",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/482925/100/0/threaded"
|
||||
"name": "FEDORA-2007-2601",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html"
|
||||
},
|
||||
{
|
||||
"name": "20071026 rPSA-2007-0225-1 firefox",
|
||||
@ -63,19 +63,19 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/482876/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20071029 rPSA-2007-0225-2 firefox thunderbird",
|
||||
"name": "ADV-2007-3587",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3587"
|
||||
},
|
||||
{
|
||||
"name": "27414",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27414"
|
||||
},
|
||||
{
|
||||
"name": "20071029 FLEA-2007-0062-1 firefox",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/482932/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=391043",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=391043"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-33.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2007/mfsa2007-33.html"
|
||||
"url": "http://www.securityfocus.com/archive/1/482925/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-1858",
|
||||
@ -83,14 +83,54 @@
|
||||
"url": "https://issues.rpath.com/browse/RPL-1858"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html"
|
||||
"name": "GLSA-200711-14",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200711-14.xml"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1396",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2007/dsa-1396"
|
||||
"name": "27360",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27360"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02153",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name": "27298",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27298"
|
||||
},
|
||||
{
|
||||
"name": "27315",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27315"
|
||||
},
|
||||
{
|
||||
"name": "1018837",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1018837"
|
||||
},
|
||||
{
|
||||
"name": "27327",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27327"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3544",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3544"
|
||||
},
|
||||
{
|
||||
"name": "27276",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27276"
|
||||
},
|
||||
{
|
||||
"name": "USN-535-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/535-1/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1401",
|
||||
@ -103,44 +143,9 @@
|
||||
"url": "http://www.debian.org/security/2007/dsa-1392"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2007-2601",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2007-2664",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2007-3431",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200711-14",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200711-14.xml"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02153",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061181",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:202",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0979",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0979.html"
|
||||
"name": "VU#349217",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/349217"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0980",
|
||||
@ -148,14 +153,9 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0980.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0981",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0981.html"
|
||||
},
|
||||
{
|
||||
"name" : "201516",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1"
|
||||
"name": "27383",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27383"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:057",
|
||||
@ -163,39 +163,14 @@
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_57_mozilla.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-535-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/535-1/"
|
||||
"name": "27356",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27356"
|
||||
},
|
||||
{
|
||||
"name" : "USN-536-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-536-1"
|
||||
},
|
||||
{
|
||||
"name" : "VU#349217",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/349217"
|
||||
},
|
||||
{
|
||||
"name" : "26132",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26132"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11482",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11482"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3544",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3544"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3587",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3587"
|
||||
"name": "RHSA-2007:0981",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0981.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0083",
|
||||
@ -203,109 +178,134 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0083"
|
||||
},
|
||||
{
|
||||
"name" : "1018837",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1018837"
|
||||
"name": "27387",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27387"
|
||||
},
|
||||
{
|
||||
"name" : "27276",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27276"
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=391043",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=391043"
|
||||
},
|
||||
{
|
||||
"name" : "27325",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27325"
|
||||
},
|
||||
{
|
||||
"name" : "27327",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27327"
|
||||
},
|
||||
{
|
||||
"name" : "27335",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27335"
|
||||
},
|
||||
{
|
||||
"name" : "27356",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27356"
|
||||
},
|
||||
{
|
||||
"name" : "27383",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27383"
|
||||
},
|
||||
{
|
||||
"name" : "27425",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27425"
|
||||
"name": "FEDORA-2007-3431",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html"
|
||||
},
|
||||
{
|
||||
"name": "27403",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27403"
|
||||
},
|
||||
{
|
||||
"name" : "27480",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27480"
|
||||
},
|
||||
{
|
||||
"name" : "27387",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27387"
|
||||
},
|
||||
{
|
||||
"name" : "27298",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27298"
|
||||
},
|
||||
{
|
||||
"name" : "27311",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27311"
|
||||
},
|
||||
{
|
||||
"name" : "27315",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27315"
|
||||
},
|
||||
{
|
||||
"name": "27336",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27336"
|
||||
},
|
||||
{
|
||||
"name" : "27665",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27665"
|
||||
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-33.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-33.html"
|
||||
},
|
||||
{
|
||||
"name" : "27414",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27414"
|
||||
"name": "DSA-1396",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2007/dsa-1396"
|
||||
},
|
||||
{
|
||||
"name" : "27680",
|
||||
"name": "27425",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27680"
|
||||
},
|
||||
{
|
||||
"name" : "27360",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27360"
|
||||
"url": "http://secunia.com/advisories/27425"
|
||||
},
|
||||
{
|
||||
"name": "28398",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28398"
|
||||
},
|
||||
{
|
||||
"name": "27311",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27311"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061181",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name": "27325",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27325"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:202",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202"
|
||||
},
|
||||
{
|
||||
"name": "mozilla-xul-page-spoofing(37286)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37286"
|
||||
},
|
||||
{
|
||||
"name": "27665",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27665"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0979",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0979.html"
|
||||
},
|
||||
{
|
||||
"name": "27335",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27335"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2007-2664",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html"
|
||||
},
|
||||
{
|
||||
"name": "27480",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27480"
|
||||
},
|
||||
{
|
||||
"name": "27680",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27680"
|
||||
},
|
||||
{
|
||||
"name": "26132",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26132"
|
||||
},
|
||||
{
|
||||
"name": "http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html"
|
||||
},
|
||||
{
|
||||
"name": "201516",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1"
|
||||
},
|
||||
{
|
||||
"name": "20071029 rPSA-2007-0225-2 firefox thunderbird",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/482932/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "USN-536-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-536-1"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11482",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11482"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4522",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4522"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.toc2rta.com/?q=node/23",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.toc2rta.com/?q=node/23"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3485",
|
||||
"refsource": "VUPEN",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "iphone-ipod-tiff-code-execution(37186)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37186"
|
||||
},
|
||||
{
|
||||
"name": "4522",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4522"
|
||||
},
|
||||
{
|
||||
"name": "http://www.toc2rta.com/?q=node/23",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.toc2rta.com/?q=node/23"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150227 Re: CVE-Request -- phpBugTracker v. 1.6.0 -- Multiple SQLi, stored/reflecting XSS- and CSRF-vulnerabilities",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/02/28/1"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/a-v-k/phpBugTracker/issues/4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/a-v-k/phpBugTracker/issues/4"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150227 Re: CVE-Request -- phpBugTracker v. 1.6.0 -- Multiple SQLi, stored/reflecting XSS- and CSRF-vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/02/28/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150306 Betster (PHP Betoffice) Authentication Bypass and SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/534816/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "36306",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/36306/"
|
||||
},
|
||||
{
|
||||
"name": "20150306 Betster (PHP Betoffice) Authentication Bypass and SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/534816/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/130696/Betster-1.0.4-SQL-Injection-Authentication-Bypass.html",
|
||||
"refsource": "MISC",
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
|
||||
"name": "USN-2570-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://ubuntu.com/usn/usn-2570-1"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3238",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3238"
|
||||
},
|
||||
{
|
||||
"name": "74221",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/74221"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0748",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2570-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://ubuntu.com/usn/usn-2570-1"
|
||||
},
|
||||
{
|
||||
"name" : "74221",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/74221"
|
||||
"name": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2015-3834",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"
|
||||
},
|
||||
{
|
||||
"name": "https://android.googlesource.com/platform/frameworks/av/+/c82e31a7039a03dca7b37c65b7890ba5c1e18ced",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/c82e31a7039a03dca7b37c65b7890ba5c1e18ced"
|
||||
},
|
||||
{
|
||||
"name": "[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2015-3837",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"
|
||||
},
|
||||
{
|
||||
"name": "https://android.googlesource.com/platform/external/conscrypt/+/edf7055461e2d7fa18de5196dca80896a56e3540",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/external/conscrypt/+/edf7055461e2d7fa18de5196dca80896a56e3540"
|
||||
},
|
||||
{
|
||||
"name": "[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2015-6050",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS15-106",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-106"
|
||||
},
|
||||
{
|
||||
"name": "1033800",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033800"
|
||||
},
|
||||
{
|
||||
"name": "MS15-106",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-106"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-6120",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-6319",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160127 Cisco RV220W Management Authentication Bypass Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220"
|
||||
},
|
||||
{
|
||||
"name": "1034830",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034830"
|
||||
},
|
||||
{
|
||||
"name": "20160127 Cisco RV220W Management Authentication Bypass Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2015-7440",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-7574",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-7584",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1034539",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034539"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20181220 [SECURITY] [DLA 1611-1] libav security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=abee0a1c60612e8638640a8a3738fffb65e16dbf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=abee0a1c60612e8638640a8a3738fffb65e16dbf"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0089",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "1034539",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1034539"
|
||||
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=abee0a1c60612e8638640a8a3738fffb65e16dbf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=abee0a1c60612e8638640a8a3738fffb65e16dbf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-1063",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-311"
|
||||
},
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
|
||||
},
|
||||
{
|
||||
"name": "1035828",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035828"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1359",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1479",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160817 Cisco IP Phone 8800 Series Denial of Service Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-ipp"
|
||||
"name": "1036646",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036646"
|
||||
},
|
||||
{
|
||||
"name": "92515",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/92515"
|
||||
},
|
||||
{
|
||||
"name" : "1036646",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036646"
|
||||
"name": "20160817 Cisco IP Phone 8800 Series Denial of Service Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-ipp"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2016-1783",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,36 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160331 WebKitGTK+ Security Advisory WSA-2016-0003",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/537948/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206166",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206166"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206169",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206169"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206171",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206171"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-03-21-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-03-21-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-03-21-6",
|
||||
"refsource": "APPLE",
|
||||
@ -91,6 +61,36 @@
|
||||
"name": "1035353",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035353"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-03-21-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "20160331 WebKitGTK+ Security Advisory WSA-2016-0003",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/537948/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206171",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206171"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-03-21-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206169",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206169"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206166",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206166"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://kb.netapp.com/support/s/article/cve-2016-5372-cross-site-request-forgery-vulnerability-in-snap-creator-framework",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kb.netapp.com/support/s/article/cve-2016-5372-cross-site-request-forgery-vulnerability-in-snap-creator-framework"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20160622-0001/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20160622-0001/"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.netapp.com/support/s/article/cve-2016-5372-cross-site-request-forgery-vulnerability-in-snap-creator-framework",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.netapp.com/support/s/article/cve-2016-5372-cross-site-request-forgery-vulnerability-in-snap-creator-framework"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-5570",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.kb.cert.org/vuls/id/BLUU-A9SQRS",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/BLUU-A9SQRS"
|
||||
},
|
||||
{
|
||||
"name": "https://community.rapid7.com/community/infosec/blog/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump",
|
||||
"refsource": "MISC",
|
||||
"url": "https://community.rapid7.com/community/infosec/blog/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kb.cert.org/vuls/id/BLUU-A9SQRS",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.kb.cert.org/vuls/id/BLUU-A9SQRS"
|
||||
},
|
||||
{
|
||||
"name": "VU#884840",
|
||||
"refsource": "CERT-VN",
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140"
|
||||
},
|
||||
{
|
||||
"name" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142"
|
||||
},
|
||||
{
|
||||
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=24114",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=24114"
|
||||
},
|
||||
{
|
||||
"name": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9",
|
||||
"refsource": "MISC",
|
||||
@ -81,6 +66,21 @@
|
||||
"name": "107160",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/107160"
|
||||
},
|
||||
{
|
||||
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=24114",
|
||||
"refsource": "MISC",
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24114"
|
||||
},
|
||||
{
|
||||
"name": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142",
|
||||
"refsource": "MISC",
|
||||
"url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142"
|
||||
},
|
||||
{
|
||||
"name": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140",
|
||||
"refsource": "MISC",
|
||||
"url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user