"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:43:27 +00:00
parent 720a01899c
commit 386cae02b7
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
68 changed files with 5417 additions and 5417 deletions

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "MS99-032",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032"
},
{
"name": "J-064",
"refsource": "CIAC",
"url": "http://ciac.llnl.gov/ciac/bulletins/j-064.shtml"
},
{
"name" : "598",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/598"
"name": "MS99-032",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032"
},
{
"name": "Q240308",
"refsource": "MSKB",
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q240308"
},
{
"name": "598",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/598"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "sgi-nsd-view(2246)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2246"
},
{
"name": "412",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/412"
},
{
"name": "19990531 IRIX 6.5 nsd virtual filesystem vulnerability",
"refsource": "BUGTRAQ",
@ -62,20 +72,10 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/8564"
},
{
"name" : "sgi-nsd-view(2246)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/2246"
},
{
"name": "sgi-nsd-create(2247)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2247"
},
{
"name" : "412",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/412"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20000710 Security Hole in tnef < 0-124",
"refsource" : "SUSE",
"url" : "http://archives.neohapsis.com/archives/vendor/2000-q3/0002.html"
},
{
"name": "1450",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1450"
},
{
"name": "20000710 Security Hole in tnef < 0-124",
"refsource": "SUSE",
"url": "http://archives.neohapsis.com/archives/vendor/2000-q3/0002.html"
}
]
}

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20000712 Infosec.20000712.worldclient.2.1",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0173.html"
},
{
"name": "http://www.altn.com/Downloads/WorldClient/Release/RelNotes.txt",
"refsource": "CONFIRM",
"url": "http://www.altn.com/Downloads/WorldClient/Release/RelNotes.txt"
},
{
"name" : "1462",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/1462"
"name": "1459",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1459"
},
{
"name": "worldclient-dir-traverse(4913)",
@ -73,9 +68,14 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4913"
},
{
"name" : "1459",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/1459"
"name": "20000712 Infosec.20000712.worldclient.2.1",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0173.html"
},
{
"name": "1462",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1462"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0463.html"
},
{
"name" : "1563",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/1563"
},
{
"name": "1501",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1501"
},
{
"name": "1563",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1563"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20000825 DST2K0023: Directory Traversal Possible & Denial of Service in Wo rm HTTP Server",
"refsource" : "NTBUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0111.html"
},
{
"name": "1626",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "1535",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1535"
},
{
"name": "20000825 DST2K0023: Directory Traversal Possible & Denial of Service in Wo rm HTTP Server",
"refsource": "NTBUGTRAQ",
"url": "http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0111.html"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.checkpoint.com/techsupport/alerts/list_vun.html#Retransmission_of",
"refsource" : "CONFIRM",
"url" : "http://www.checkpoint.com/techsupport/alerts/list_vun.html#Retransmission_of"
},
{
"name": "fw1-client-spoof(5469)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5469"
},
{
"name": "http://www.checkpoint.com/techsupport/alerts/list_vun.html#Retransmission_of",
"refsource": "CONFIRM",
"url": "http://www.checkpoint.com/techsupport/alerts/list_vun.html#Retransmission_of"
},
{
"name": "4415",
"refsource": "OSVDB",

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20001029 Remote command execution via KW Whois 1.0",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-10/0419.html"
},
{
"name" : "20001029 Re: Remote command execution via KW Whois 1.0 (addition)",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-10/0420.html"
},
{
"name" : "http://www.kootenayweb.bc.ca/scripts/whois.txt",
"refsource" : "MISC",
"url" : "http://www.kootenayweb.bc.ca/scripts/whois.txt"
},
{
"name": "1883",
"refsource": "BID",
@ -76,6 +61,21 @@
"name": "kw-whois-meta(5438)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5438"
},
{
"name": "20001029 Re: Remote command execution via KW Whois 1.0 (addition)",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0420.html"
},
{
"name": "20001029 Remote command execution via KW Whois 1.0",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0419.html"
},
{
"name": "http://www.kootenayweb.bc.ca/scripts/whois.txt",
"refsource": "MISC",
"url": "http://www.kootenayweb.bc.ca/scripts/whois.txt"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "oracle-oidldap-bo(5401)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5401"
},
{
"name": "20001018 vulnerability in Oracle Internet Directory in Oracle 8.1.6",
"refsource": "BUGTRAQ",
@ -66,6 +61,11 @@
"name": "20001020 In response to posting 10/18/2000 vulnerability in Oracle Internet Directory in Oracle 8.1.6",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/140709"
},
{
"name": "oracle-oidldap-bo(5401)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5401"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97236692714978&w=2"
},
{
"name" : "ASB00-028",
"refsource" : "ALLAIRE",
"url" : "http://www.allaire.com/handlers/index.cfm?ID=17968&Method=Full"
},
{
"name": "allaire-jrun-ssifilter-url(5405)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5405"
},
{
"name": "ASB00-028",
"refsource": "ALLAIRE",
"url": "http://www.allaire.com/handlers/index.cfm?ID=17968&Method=Full"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "FreeBSD-SA-00:70",
"refsource" : "FREEBSD",
"url" : "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:70.ppp-nat.asc"
},
{
"name" : "1974",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/1974"
},
{
"name": "freebsd-ppp-bypass-gateway(5584)",
"refsource": "XF",
@ -71,6 +61,16 @@
"name": "1655",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1655"
},
{
"name": "1974",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1974"
},
{
"name": "FreeBSD-SA-00:70",
"refsource": "FREEBSD",
"url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:70.ppp-nat.asc"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2005-2578",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3490"
},
{
"name" : "22998",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22998"
},
{
"name": "ADV-2007-1001",
"refsource": "VUPEN",
@ -76,6 +71,11 @@
"name": "wbblog-viewentry-xss(33011)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33011"
},
{
"name": "22998",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22998"
}
]
}

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20071022 Re: [Full-disclosure] ifnet.it WEBIF XSS Vulnerability",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=119308642708935&w=2"
},
{
"name": "20071022 ifnet.it WEBIF XSS Vulnerability",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066947.html"
},
{
"name" : "26164",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26164"
"name": "webif-cmd-xss(37367)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37367"
},
{
"name": "27365",
@ -73,9 +68,14 @@
"url": "http://secunia.com/advisories/27365"
},
{
"name" : "webif-cmd-xss(37367)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37367"
"name": "26164",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26164"
},
{
"name": "20071022 Re: [Full-disclosure] ifnet.it WEBIF XSS Vulnerability",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=119308642708935&w=2"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://docs.info.apple.com/article.html?artnum=307179",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=307179"
},
{
"name" : "APPLE-SA-2007-12-17",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
"name": "ADV-2007-4238",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4238"
},
{
"name": "TA07-352A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
},
{
"name": "28136",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28136"
},
{
"name": "26910",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26910"
},
{
"name" : "ADV-2007-4238",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/4238"
"name": "macos-launch-services-xss(39102)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39102"
},
{
"name": "1019106",
@ -83,14 +83,14 @@
"url": "http://securitytracker.com/id?1019106"
},
{
"name" : "28136",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28136"
"name": "APPLE-SA-2007-12-17",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
},
{
"name" : "macos-launch-services-xss(39102)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39102"
"name": "http://docs.info.apple.com/article.html?artnum=307179",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307179"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://php.s3.to/bbs/bbs8.php",
"refsource" : "CONFIRM",
"url" : "http://php.s3.to/bbs/bbs8.php"
},
{
"name" : "JVN#20219071",
"refsource" : "JVN",
"url" : "http://jvn.jp/jp/JVN20219071/index.html"
},
{
"name": "JVNDB-2009-000045",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000045.html"
},
{
"name": "http://php.s3.to/bbs/bbs8.php",
"refsource": "CONFIRM",
"url": "http://php.s3.to/bbs/bbs8.php"
},
{
"name": "35532",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35532"
},
{
"name": "JVN#20219071",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN20219071/index.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-2877",
"STATE": "PUBLIC"
},
@ -52,85 +52,85 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.fortiguard.com/advisory/FGA-2009-48.html",
"refsource" : "MISC",
"url" : "http://www.fortiguard.com/advisory/FGA-2009-48.html"
},
{
"name" : "http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.ataudio.buffer.overflow.html",
"refsource" : "MISC",
"url" : "http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.ataudio.buffer.overflow.html"
},
{
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499"
},
{
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
},
{
"name" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
},
{
"name" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
},
{
"name" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
},
{
"name" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
},
{
"name" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
},
{
"name" : "20091216 Multiple Cisco WebEx WRF Player Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml"
},
{
"name" : "37352",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37352"
},
{
"name" : "61127",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/61127"
},
{
"name" : "1023360",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1023360"
"name": "http://www.fortiguard.com/advisory/FGA-2009-48.html",
"refsource": "MISC",
"url": "http://www.fortiguard.com/advisory/FGA-2009-48.html"
},
{
"name": "37810",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37810"
},
{
"name": "61127",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/61127"
},
{
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
},
{
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
},
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499"
},
{
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
},
{
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
},
{
"name": "1023360",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023360"
},
{
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
},
{
"name": "ADV-2009-3574",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3574"
},
{
"name": "http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.ataudio.buffer.overflow.html",
"refsource": "MISC",
"url": "http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.ataudio.buffer.overflow.html"
},
{
"name": "37352",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37352"
},
{
"name": "cisco-webex-wrf-bo(54841)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54841"
},
{
"name": "20091216 Multiple Cisco WebEx WRF Player Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml"
}
]
}

View File

@ -52,26 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://ikiwiki.info/security/#index35h2",
"refsource" : "CONFIRM",
"url" : "http://ikiwiki.info/security/#index35h2"
},
{
"name" : "DSA-1875",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1875"
},
{
"name" : "36181",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/36181"
},
{
"name": "57575",
"refsource": "OSVDB",
"url": "http://osvdb.org/57575"
},
{
"name": "http://ikiwiki.info/security/#index35h2",
"refsource": "CONFIRM",
"url": "http://ikiwiki.info/security/#index35h2"
},
{
"name": "36516",
"refsource": "SECUNIA",
@ -82,6 +72,16 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36539"
},
{
"name": "DSA-1875",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1875"
},
{
"name": "36181",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36181"
},
{
"name": "ADV-2009-2475",
"refsource": "VUPEN",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.vapidlabs.com/advisory.php?v=154",
"refsource" : "MISC",
"url" : "http://www.vapidlabs.com/advisory.php?v=154"
},
{
"name": "94495",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94495"
},
{
"name": "http://www.vapidlabs.com/advisory.php?v=154",
"refsource": "MISC",
"url": "http://www.vapidlabs.com/advisory.php?v=154"
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20150627 CSRF Vulnerability in C2Box application CVE-2015-4460",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/535861/30/0/threaded"
},
{
"name" : "37447",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/37447/"
"name": "https://packetstormsecurity.com/files/132475/C2Box-4.0.0-r19171-Cross-Site-Request-Forgery.html",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/132475/C2Box-4.0.0-r19171-Cross-Site-Request-Forgery.html"
},
{
"name": "https://raw.githubusercontent.com/Siros96/CSRF/master/PoC",
@ -68,9 +63,14 @@
"url": "https://raw.githubusercontent.com/Siros96/CSRF/master/PoC"
},
{
"name" : "https://packetstormsecurity.com/files/132475/C2Box-4.0.0-r19171-Cross-Site-Request-Forgery.html",
"refsource" : "MISC",
"url" : "https://packetstormsecurity.com/files/132475/C2Box-4.0.0-r19171-Cross-Site-Request-Forgery.html"
"name": "37447",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37447/"
},
{
"name": "20150627 CSRF Vulnerability in C2Box application CVE-2015-4460",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/535861/30/0/threaded"
},
{
"name": "75569",

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/535881/100/700/threaded"
},
{
"name" : "20150629 CVE-2015-4674 - TimeDoctor autoupdate over plain-HTTP",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Jun/105"
},
{
"name": "75572",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75572"
},
{
"name": "20150629 CVE-2015-4674 - TimeDoctor autoupdate over plain-HTTP",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jun/105"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "http://www.securityfocus.com/archive/1/535852/100/0/threaded"
},
{
"name" : "37449",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/37449/"
"name": "http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html"
},
{
"name": "20150626 SEC Consult SA-20150626-0 :: Critical vulnerabilities in Polycom RealPresence Resource Manager (RPRM) allow surveillance on conferences",
@ -68,19 +68,19 @@
"url": "http://seclists.org/fulldisclosure/2015/Jun/81"
},
{
"name" : "http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html"
},
{
"name" : "https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf",
"refsource" : "CONFIRM",
"url" : "https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf"
"name": "37449",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37449/"
},
{
"name": "75432",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75432"
},
{
"name": "https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf",
"refsource": "CONFIRM",
"url": "https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-4736",
"STATE": "PUBLIC"
},
@ -58,25 +58,35 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name" : "GLSA-201603-11",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-11"
},
{
"name" : "RHSA-2015:1241",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1241.html"
},
{
"name" : "RHSA-2015:1242",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1242.html"
"name": "1032910",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032910"
},
{
"name": "RHSA-2015:1485",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1485.html"
},
{
"name": "openSUSE-SU-2015:1289",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
},
{
"name": "75850",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75850"
},
{
"name": "GLSA-201603-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-11"
},
{
"name": "RHSA-2015:1242",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html"
},
{
"name": "RHSA-2015:1488",
"refsource": "REDHAT",
@ -98,19 +108,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"
},
{
"name" : "openSUSE-SU-2015:1289",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
},
{
"name" : "75850",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75850"
},
{
"name" : "1032910",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032910"
"name": "RHSA-2015:1241",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8297",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-8402",
"STATE": "PUBLIC"
},
@ -52,15 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2015:2239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
},
{
"name" : "GLSA-201601-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201601-03"
"name": "78715",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/78715"
},
{
"name": "SUSE-SU-2015:2236",
@ -72,20 +77,15 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
},
{
"name" : "openSUSE-SU-2015:2239",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{
"name" : "78715",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/78715"
},
{
"name": "1034318",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034318"
},
{
"name": "GLSA-201601-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-03"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8516",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,35 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "https://kb.isc.org/article/AA-01335",
"refsource" : "CONFIRM",
"url" : "https://kb.isc.org/article/AA-01335"
},
{
"name" : "https://kb.isc.org/article/AA-01380",
"refsource" : "CONFIRM",
"url" : "https://kb.isc.org/article/AA-01380"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
"name": "HPSBUX03552",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=145680832702035&w=2"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
"name": "USN-2874-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2874-1"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html",
"name": "RHSA-2016:0073",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0073.html"
},
{
"name": "https://kb.isc.org/article/AA-01335",
"refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html"
"url": "https://kb.isc.org/article/AA-01335"
},
{
"name": "FreeBSD-SA-16:08",
"refsource": "FREEBSD",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:08.bind.asc"
},
{
"name": "SUSE-SU-2016:0174",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00019.html"
},
{
"name": "https://kb.isc.org/article/AA-01438",
@ -93,14 +98,24 @@
"url": "http://www.debian.org/security/2016/dsa-3449"
},
{
"name" : "FEDORA-2016-1323b9078a",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178045.html"
"name": "openSUSE-SU-2016:0197",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00022.html"
},
{
"name" : "FEDORA-2016-1ab53bf440",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176564.html"
"name": "RHSA-2016:0074",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0074.html"
},
{
"name": "openSUSE-SU-2016:0204",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00025.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "FEDORA-2016-f3517b9c4c",
@ -112,20 +127,35 @@
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175973.html"
},
{
"name" : "FreeBSD-SA-16:08",
"refsource" : "FREEBSD",
"url" : "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:08.bind.asc"
},
{
"name": "GLSA-201610-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-07"
},
{
"name" : "HPSBUX03552",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=145680832702035&w=2"
"name": "1034739",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034739"
},
{
"name": "https://kb.isc.org/article/AA-01380",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/article/AA-01380"
},
{
"name": "SUSE-SU-2016:0180",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00020.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html"
},
{
"name": "openSUSE-SU-2016:0199",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00023.html"
},
{
"name": "SSRT102983",
@ -133,24 +163,19 @@
"url": "http://marc.info/?l=bugtraq&m=145680832702035&w=2"
},
{
"name" : "RHSA-2016:0073",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0073.html"
"name": "FEDORA-2016-1ab53bf440",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176564.html"
},
{
"name" : "RHSA-2016:0074",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0074.html"
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name" : "SUSE-SU-2016:0174",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00019.html"
},
{
"name" : "SUSE-SU-2016:0180",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00020.html"
"name": "81329",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/81329"
},
{
"name": "SUSE-SU-2016:0200",
@ -163,34 +188,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html"
},
{
"name" : "openSUSE-SU-2016:0197",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00022.html"
},
{
"name" : "openSUSE-SU-2016:0199",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00023.html"
},
{
"name" : "openSUSE-SU-2016:0204",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00025.html"
},
{
"name" : "USN-2874-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2874-1"
},
{
"name" : "81329",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/81329"
},
{
"name" : "1034739",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034739"
"name": "FEDORA-2016-1323b9078a",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178045.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2015-9005",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1009",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-191"
},
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-09.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-09.html"
"name": "1035199",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035199"
},
{
"name": "84215",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/84215"
},
{
"name" : "1035199",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035199"
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-09.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-09.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1448",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1036320",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036320"
},
{
"name": "20160714 Cisco WebEx Meetings Server Administrator Interface Cross-Site Request Forgery Vulnerability",
"refsource": "CISCO",
@ -61,11 +66,6 @@
"name": "91799",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91799"
},
{
"name" : "1036320",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036320"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2016-5160",
"STATE": "PUBLIC"
},
@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "https://codereview.chromium.org/2007133004",
"name": "openSUSE-SU-2016:2250",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00003.html"
},
{
"name": "https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html",
"refsource": "CONFIRM",
"url" : "https://codereview.chromium.org/2007133004"
"url": "https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html"
},
{
"name": "https://crbug.com/576867",
@ -63,9 +68,29 @@
"url": "https://crbug.com/576867"
},
{
"name" : "https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html",
"name": "SUSE-SU-2016:2251",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00004.html"
},
{
"name": "92717",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92717"
},
{
"name": "1036729",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036729"
},
{
"name": "openSUSE-SU-2016:2349",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00073.html"
},
{
"name": "https://codereview.chromium.org/2007133004",
"refsource": "CONFIRM",
"url" : "https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html"
"url": "https://codereview.chromium.org/2007133004"
},
{
"name": "DSA-3660",
@ -77,40 +102,15 @@
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-09"
},
{
"name" : "RHSA-2016:1854",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1854.html"
},
{
"name" : "openSUSE-SU-2016:2349",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-09/msg00073.html"
},
{
"name" : "SUSE-SU-2016:2251",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00004.html"
},
{
"name" : "openSUSE-SU-2016:2250",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00003.html"
},
{
"name": "openSUSE-SU-2016:2296",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00008.html"
},
{
"name" : "92717",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92717"
},
{
"name" : "1036729",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036729"
"name": "RHSA-2016:1854",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1854.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "VU#974424",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/974424"
},
{
"name": "92211",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92211"
},
{
"name": "VU#974424",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/974424"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-315-01"
},
{
"name" : "https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html",
"refsource" : "CONFIRM",
"url" : "https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html"
},
{
"name": "94243",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94243"
},
{
"name": "https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html",
"refsource": "CONFIRM",
"url": "https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2087",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2150",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2165",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,16 +57,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://launchpad.support.sap.com/#/notes/2623618",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2623618"
},
{
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
"refsource": "CONFIRM",
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
},
{
"name": "https://launchpad.support.sap.com/#/notes/2623618",
"refsource": "MISC",
"url": "https://launchpad.support.sap.com/#/notes/2623618"
},
{
"name": "105544",
"refsource": "BID",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com",
"ASSIGNER": "security@google.com",
"ID": "CVE-2018-6053",
"STATE": "PUBLIC"
},
@ -58,20 +58,15 @@
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html"
},
{
"name" : "https://crbug.com/758169",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/758169"
},
{
"name": "DSA-4103",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4103"
},
{
"name" : "RHSA-2018:0265",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0265"
"name": "https://crbug.com/758169",
"refsource": "CONFIRM",
"url": "https://crbug.com/758169"
},
{
"name": "102797",
@ -82,6 +77,11 @@
"name": "1040282",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040282"
},
{
"name": "RHSA-2018:0265",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0265"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "43987",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/43987/"
},
{
"name": "https://github.com/SouhailHammou/Exploits/blob/master/CVE-2018-6606/Malwarefox_privescl_1.c",
"refsource": "MISC",
"url": "https://github.com/SouhailHammou/Exploits/blob/master/CVE-2018-6606/Malwarefox_privescl_1.c"
},
{
"name": "43987",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43987/"
}
]
}

View File

@ -415,16 +415,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0657",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0657"
},
{
"name": "RHSA-2019:0349",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0349"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0657",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0657"
},
{
"name": "106890",
"refsource": "BID",