mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
720a01899c
commit
386cae02b7
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS99-032",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032"
|
||||
},
|
||||
{
|
||||
"name": "J-064",
|
||||
"refsource": "CIAC",
|
||||
"url": "http://ciac.llnl.gov/ciac/bulletins/j-064.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "598",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/598"
|
||||
"name": "MS99-032",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032"
|
||||
},
|
||||
{
|
||||
"name": "Q240308",
|
||||
"refsource": "MSKB",
|
||||
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q240308"
|
||||
},
|
||||
{
|
||||
"name": "598",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/598"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "sgi-nsd-view(2246)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2246"
|
||||
},
|
||||
{
|
||||
"name": "412",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/412"
|
||||
},
|
||||
{
|
||||
"name": "19990531 IRIX 6.5 nsd virtual filesystem vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -62,20 +72,10 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/8564"
|
||||
},
|
||||
{
|
||||
"name" : "sgi-nsd-view(2246)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/2246"
|
||||
},
|
||||
{
|
||||
"name": "sgi-nsd-create(2247)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2247"
|
||||
},
|
||||
{
|
||||
"name" : "412",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/412"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20000710 Security Hole in tnef < 0-124",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://archives.neohapsis.com/archives/vendor/2000-q3/0002.html"
|
||||
},
|
||||
{
|
||||
"name": "1450",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1450"
|
||||
},
|
||||
{
|
||||
"name": "20000710 Security Hole in tnef < 0-124",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://archives.neohapsis.com/archives/vendor/2000-q3/0002.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20000712 Infosec.20000712.worldclient.2.1",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0173.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.altn.com/Downloads/WorldClient/Release/RelNotes.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.altn.com/Downloads/WorldClient/Release/RelNotes.txt"
|
||||
},
|
||||
{
|
||||
"name" : "1462",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/1462"
|
||||
"name": "1459",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/1459"
|
||||
},
|
||||
{
|
||||
"name": "worldclient-dir-traverse(4913)",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4913"
|
||||
},
|
||||
{
|
||||
"name" : "1459",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/1459"
|
||||
"name": "20000712 Infosec.20000712.worldclient.2.1",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0173.html"
|
||||
},
|
||||
{
|
||||
"name": "1462",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1462"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0463.html"
|
||||
},
|
||||
{
|
||||
"name" : "1563",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/1563"
|
||||
},
|
||||
{
|
||||
"name": "1501",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/1501"
|
||||
},
|
||||
{
|
||||
"name": "1563",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1563"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20000825 DST2K0023: Directory Traversal Possible & Denial of Service in Wo rm HTTP Server",
|
||||
"refsource" : "NTBUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0111.html"
|
||||
},
|
||||
{
|
||||
"name": "1626",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "1535",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/1535"
|
||||
},
|
||||
{
|
||||
"name": "20000825 DST2K0023: Directory Traversal Possible & Denial of Service in Wo rm HTTP Server",
|
||||
"refsource": "NTBUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0111.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.checkpoint.com/techsupport/alerts/list_vun.html#Retransmission_of",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.checkpoint.com/techsupport/alerts/list_vun.html#Retransmission_of"
|
||||
},
|
||||
{
|
||||
"name": "fw1-client-spoof(5469)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5469"
|
||||
},
|
||||
{
|
||||
"name": "http://www.checkpoint.com/techsupport/alerts/list_vun.html#Retransmission_of",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.checkpoint.com/techsupport/alerts/list_vun.html#Retransmission_of"
|
||||
},
|
||||
{
|
||||
"name": "4415",
|
||||
"refsource": "OSVDB",
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20001029 Remote command execution via KW Whois 1.0",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-10/0419.html"
|
||||
},
|
||||
{
|
||||
"name" : "20001029 Re: Remote command execution via KW Whois 1.0 (addition)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-10/0420.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kootenayweb.bc.ca/scripts/whois.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.kootenayweb.bc.ca/scripts/whois.txt"
|
||||
},
|
||||
{
|
||||
"name": "1883",
|
||||
"refsource": "BID",
|
||||
@ -76,6 +61,21 @@
|
||||
"name": "kw-whois-meta(5438)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5438"
|
||||
},
|
||||
{
|
||||
"name": "20001029 Re: Remote command execution via KW Whois 1.0 (addition)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0420.html"
|
||||
},
|
||||
{
|
||||
"name": "20001029 Remote command execution via KW Whois 1.0",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0419.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kootenayweb.bc.ca/scripts/whois.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.kootenayweb.bc.ca/scripts/whois.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "oracle-oidldap-bo(5401)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5401"
|
||||
},
|
||||
{
|
||||
"name": "20001018 vulnerability in Oracle Internet Directory in Oracle 8.1.6",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "20001020 In response to posting 10/18/2000 vulnerability in Oracle Internet Directory in Oracle 8.1.6",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/140709"
|
||||
},
|
||||
{
|
||||
"name": "oracle-oidldap-bo(5401)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5401"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=97236692714978&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "ASB00-028",
|
||||
"refsource" : "ALLAIRE",
|
||||
"url" : "http://www.allaire.com/handlers/index.cfm?ID=17968&Method=Full"
|
||||
},
|
||||
{
|
||||
"name": "allaire-jrun-ssifilter-url(5405)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5405"
|
||||
},
|
||||
{
|
||||
"name": "ASB00-028",
|
||||
"refsource": "ALLAIRE",
|
||||
"url": "http://www.allaire.com/handlers/index.cfm?ID=17968&Method=Full"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "FreeBSD-SA-00:70",
|
||||
"refsource" : "FREEBSD",
|
||||
"url" : "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:70.ppp-nat.asc"
|
||||
},
|
||||
{
|
||||
"name" : "1974",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/1974"
|
||||
},
|
||||
{
|
||||
"name": "freebsd-ppp-bypass-gateway(5584)",
|
||||
"refsource": "XF",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "1655",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/1655"
|
||||
},
|
||||
{
|
||||
"name": "1974",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1974"
|
||||
},
|
||||
{
|
||||
"name": "FreeBSD-SA-00:70",
|
||||
"refsource": "FREEBSD",
|
||||
"url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:70.ppp-nat.asc"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2005-2578",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3490"
|
||||
},
|
||||
{
|
||||
"name" : "22998",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22998"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1001",
|
||||
"refsource": "VUPEN",
|
||||
@ -76,6 +71,11 @@
|
||||
"name": "wbblog-viewentry-xss(33011)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33011"
|
||||
},
|
||||
{
|
||||
"name": "22998",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22998"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071022 Re: [Full-disclosure] ifnet.it WEBIF XSS Vulnerability",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://marc.info/?l=full-disclosure&m=119308642708935&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20071022 ifnet.it WEBIF XSS Vulnerability",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066947.html"
|
||||
},
|
||||
{
|
||||
"name" : "26164",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26164"
|
||||
"name": "webif-cmd-xss(37367)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37367"
|
||||
},
|
||||
{
|
||||
"name": "27365",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://secunia.com/advisories/27365"
|
||||
},
|
||||
{
|
||||
"name" : "webif-cmd-xss(37367)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37367"
|
||||
"name": "26164",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26164"
|
||||
},
|
||||
{
|
||||
"name": "20071022 Re: [Full-disclosure] ifnet.it WEBIF XSS Vulnerability",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://marc.info/?l=full-disclosure&m=119308642708935&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://docs.info.apple.com/article.html?artnum=307179",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://docs.info.apple.com/article.html?artnum=307179"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2007-12-17",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
|
||||
"name": "ADV-2007-4238",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/4238"
|
||||
},
|
||||
{
|
||||
"name": "TA07-352A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
|
||||
},
|
||||
{
|
||||
"name": "28136",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28136"
|
||||
},
|
||||
{
|
||||
"name": "26910",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26910"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-4238",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/4238"
|
||||
"name": "macos-launch-services-xss(39102)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39102"
|
||||
},
|
||||
{
|
||||
"name": "1019106",
|
||||
@ -83,14 +83,14 @@
|
||||
"url": "http://securitytracker.com/id?1019106"
|
||||
},
|
||||
{
|
||||
"name" : "28136",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28136"
|
||||
"name": "APPLE-SA-2007-12-17",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "macos-launch-services-xss(39102)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39102"
|
||||
"name": "http://docs.info.apple.com/article.html?artnum=307179",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://docs.info.apple.com/article.html?artnum=307179"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://php.s3.to/bbs/bbs8.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://php.s3.to/bbs/bbs8.php"
|
||||
},
|
||||
{
|
||||
"name" : "JVN#20219071",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/jp/JVN20219071/index.html"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2009-000045",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000045.html"
|
||||
},
|
||||
{
|
||||
"name": "http://php.s3.to/bbs/bbs8.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://php.s3.to/bbs/bbs8.php"
|
||||
},
|
||||
{
|
||||
"name": "35532",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35532"
|
||||
},
|
||||
{
|
||||
"name": "JVN#20219071",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/jp/JVN20219071/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2009-2877",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,85 +52,85 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.fortiguard.com/advisory/FGA-2009-48.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.fortiguard.com/advisory/FGA-2009-48.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.ataudio.buffer.overflow.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.ataudio.buffer.overflow.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499"
|
||||
},
|
||||
{
|
||||
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
|
||||
},
|
||||
{
|
||||
"name" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
|
||||
},
|
||||
{
|
||||
"name" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
|
||||
},
|
||||
{
|
||||
"name" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
|
||||
},
|
||||
{
|
||||
"name" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
|
||||
},
|
||||
{
|
||||
"name" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
|
||||
},
|
||||
{
|
||||
"name" : "20091216 Multiple Cisco WebEx WRF Player Vulnerabilities",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "37352",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/37352"
|
||||
},
|
||||
{
|
||||
"name" : "61127",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/61127"
|
||||
},
|
||||
{
|
||||
"name" : "1023360",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1023360"
|
||||
"name": "http://www.fortiguard.com/advisory/FGA-2009-48.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.fortiguard.com/advisory/FGA-2009-48.html"
|
||||
},
|
||||
{
|
||||
"name": "37810",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37810"
|
||||
},
|
||||
{
|
||||
"name": "61127",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/61127"
|
||||
},
|
||||
{
|
||||
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
|
||||
},
|
||||
{
|
||||
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
|
||||
},
|
||||
{
|
||||
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499"
|
||||
},
|
||||
{
|
||||
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
|
||||
},
|
||||
{
|
||||
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
|
||||
},
|
||||
{
|
||||
"name": "1023360",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1023360"
|
||||
},
|
||||
{
|
||||
"name": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-3574",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3574"
|
||||
},
|
||||
{
|
||||
"name": "http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.ataudio.buffer.overflow.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.ataudio.buffer.overflow.html"
|
||||
},
|
||||
{
|
||||
"name": "37352",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/37352"
|
||||
},
|
||||
{
|
||||
"name": "cisco-webex-wrf-bo(54841)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54841"
|
||||
},
|
||||
{
|
||||
"name": "20091216 Multiple Cisco WebEx WRF Player Vulnerabilities",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://ikiwiki.info/security/#index35h2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://ikiwiki.info/security/#index35h2"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1875",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2009/dsa-1875"
|
||||
},
|
||||
{
|
||||
"name" : "36181",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/36181"
|
||||
},
|
||||
{
|
||||
"name": "57575",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/57575"
|
||||
},
|
||||
{
|
||||
"name": "http://ikiwiki.info/security/#index35h2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://ikiwiki.info/security/#index35h2"
|
||||
},
|
||||
{
|
||||
"name": "36516",
|
||||
"refsource": "SECUNIA",
|
||||
@ -82,6 +72,16 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36539"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1875",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2009/dsa-1875"
|
||||
},
|
||||
{
|
||||
"name": "36181",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36181"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-2475",
|
||||
"refsource": "VUPEN",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.vapidlabs.com/advisory.php?v=154",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.vapidlabs.com/advisory.php?v=154"
|
||||
},
|
||||
{
|
||||
"name": "94495",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94495"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vapidlabs.com/advisory.php?v=154",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.vapidlabs.com/advisory.php?v=154"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150627 CSRF Vulnerability in C2Box application CVE-2015-4460",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/535861/30/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "37447",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/37447/"
|
||||
"name": "https://packetstormsecurity.com/files/132475/C2Box-4.0.0-r19171-Cross-Site-Request-Forgery.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://packetstormsecurity.com/files/132475/C2Box-4.0.0-r19171-Cross-Site-Request-Forgery.html"
|
||||
},
|
||||
{
|
||||
"name": "https://raw.githubusercontent.com/Siros96/CSRF/master/PoC",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "https://raw.githubusercontent.com/Siros96/CSRF/master/PoC"
|
||||
},
|
||||
{
|
||||
"name" : "https://packetstormsecurity.com/files/132475/C2Box-4.0.0-r19171-Cross-Site-Request-Forgery.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://packetstormsecurity.com/files/132475/C2Box-4.0.0-r19171-Cross-Site-Request-Forgery.html"
|
||||
"name": "37447",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/37447/"
|
||||
},
|
||||
{
|
||||
"name": "20150627 CSRF Vulnerability in C2Box application CVE-2015-4460",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/535861/30/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "75569",
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/535881/100/700/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20150629 CVE-2015-4674 - TimeDoctor autoupdate over plain-HTTP",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/105"
|
||||
},
|
||||
{
|
||||
"name": "75572",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75572"
|
||||
},
|
||||
{
|
||||
"name": "20150629 CVE-2015-4674 - TimeDoctor autoupdate over plain-HTTP",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Jun/105"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/535852/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "37449",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/37449/"
|
||||
"name": "http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html"
|
||||
},
|
||||
{
|
||||
"name": "20150626 SEC Consult SA-20150626-0 :: Critical vulnerabilities in Polycom RealPresence Resource Manager (RPRM) allow surveillance on conferences",
|
||||
@ -68,19 +68,19 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Jun/81"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf"
|
||||
"name": "37449",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/37449/"
|
||||
},
|
||||
{
|
||||
"name": "75432",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75432"
|
||||
},
|
||||
{
|
||||
"name": "https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2015-4736",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,25 +58,35 @@
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201603-11",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201603-11"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:1241",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1241.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:1242",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1242.html"
|
||||
"name": "1032910",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032910"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1485",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1485.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1289",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
|
||||
},
|
||||
{
|
||||
"name": "75850",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75850"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201603-11",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201603-11"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1242",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1488",
|
||||
"refsource": "REDHAT",
|
||||
@ -98,19 +108,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1289",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
|
||||
},
|
||||
{
|
||||
"name" : "75850",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/75850"
|
||||
},
|
||||
{
|
||||
"name" : "1032910",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032910"
|
||||
"name": "RHSA-2015:1241",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-8297",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2015-8402",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "openSUSE-SU-2015:2239",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201601-03",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201601-03"
|
||||
"name": "78715",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/78715"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:2236",
|
||||
@ -72,20 +77,15 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:2239",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "78715",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/78715"
|
||||
},
|
||||
{
|
||||
"name": "1034318",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034318"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201601-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201601-03"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-8516",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,35 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://kb.isc.org/article/AA-01335",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kb.isc.org/article/AA-01335"
|
||||
},
|
||||
{
|
||||
"name" : "https://kb.isc.org/article/AA-01380",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kb.isc.org/article/AA-01380"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
||||
"name": "HPSBUX03552",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=145680832702035&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
|
||||
"name": "USN-2874-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2874-1"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html",
|
||||
"name": "RHSA-2016:0073",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0073.html"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.isc.org/article/AA-01335",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html"
|
||||
"url": "https://kb.isc.org/article/AA-01335"
|
||||
},
|
||||
{
|
||||
"name": "FreeBSD-SA-16:08",
|
||||
"refsource": "FREEBSD",
|
||||
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:08.bind.asc"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:0174",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00019.html"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.isc.org/article/AA-01438",
|
||||
@ -93,14 +98,24 @@
|
||||
"url": "http://www.debian.org/security/2016/dsa-3449"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2016-1323b9078a",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178045.html"
|
||||
"name": "openSUSE-SU-2016:0197",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00022.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2016-1ab53bf440",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176564.html"
|
||||
"name": "RHSA-2016:0074",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0074.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0204",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2016-f3517b9c4c",
|
||||
@ -112,20 +127,35 @@
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175973.html"
|
||||
},
|
||||
{
|
||||
"name" : "FreeBSD-SA-16:08",
|
||||
"refsource" : "FREEBSD",
|
||||
"url" : "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:08.bind.asc"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201610-07",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201610-07"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX03552",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=145680832702035&w=2"
|
||||
"name": "1034739",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034739"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.isc.org/article/AA-01380",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.isc.org/article/AA-01380"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:0180",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00020.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0199",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name": "SSRT102983",
|
||||
@ -133,24 +163,19 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=145680832702035&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:0073",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0073.html"
|
||||
"name": "FEDORA-2016-1ab53bf440",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176564.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:0074",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0074.html"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:0174",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00019.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:0180",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00020.html"
|
||||
"name": "81329",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/81329"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:0200",
|
||||
@ -163,34 +188,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:0197",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00022.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:0199",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:0204",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2874-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2874-1"
|
||||
},
|
||||
{
|
||||
"name" : "81329",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/81329"
|
||||
},
|
||||
{
|
||||
"name" : "1034739",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1034739"
|
||||
"name": "FEDORA-2016-1323b9078a",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178045.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2015-9005",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-1009",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,9 +58,9 @@
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-191"
|
||||
},
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-09.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-09.html"
|
||||
"name": "1035199",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035199"
|
||||
},
|
||||
{
|
||||
"name": "84215",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/84215"
|
||||
},
|
||||
{
|
||||
"name" : "1035199",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1035199"
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-09.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-09.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1448",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1036320",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036320"
|
||||
},
|
||||
{
|
||||
"name": "20160714 Cisco WebEx Meetings Server Administrator Interface Cross-Site Request Forgery Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "91799",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91799"
|
||||
},
|
||||
{
|
||||
"name" : "1036320",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036320"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2016-5160",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://codereview.chromium.org/2007133004",
|
||||
"name": "openSUSE-SU-2016:2250",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://codereview.chromium.org/2007133004"
|
||||
"url": "https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html"
|
||||
},
|
||||
{
|
||||
"name": "https://crbug.com/576867",
|
||||
@ -63,9 +68,29 @@
|
||||
"url": "https://crbug.com/576867"
|
||||
},
|
||||
{
|
||||
"name" : "https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html",
|
||||
"name": "SUSE-SU-2016:2251",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "92717",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92717"
|
||||
},
|
||||
{
|
||||
"name": "1036729",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036729"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:2349",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00073.html"
|
||||
},
|
||||
{
|
||||
"name": "https://codereview.chromium.org/2007133004",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html"
|
||||
"url": "https://codereview.chromium.org/2007133004"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3660",
|
||||
@ -77,40 +102,15 @@
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201610-09"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:1854",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1854.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:2349",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-09/msg00073.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:2251",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:2250",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:2296",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "92717",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/92717"
|
||||
},
|
||||
{
|
||||
"name" : "1036729",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036729"
|
||||
"name": "RHSA-2016:1854",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1854.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "VU#974424",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/974424"
|
||||
},
|
||||
{
|
||||
"name": "92211",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92211"
|
||||
},
|
||||
{
|
||||
"name": "VU#974424",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/974424"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-315-01"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html"
|
||||
},
|
||||
{
|
||||
"name": "94243",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94243"
|
||||
},
|
||||
{
|
||||
"name": "https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-2087",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-2150",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-2165",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -57,16 +57,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://launchpad.support.sap.com/#/notes/2623618",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://launchpad.support.sap.com/#/notes/2623618"
|
||||
},
|
||||
{
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
|
||||
},
|
||||
{
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2623618",
|
||||
"refsource": "MISC",
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2623618"
|
||||
},
|
||||
{
|
||||
"name": "105544",
|
||||
"refsource": "BID",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "chrome-cve-admin@google.com",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2018-6053",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,20 +58,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://crbug.com/758169",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://crbug.com/758169"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4103",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4103"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:0265",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:0265"
|
||||
"name": "https://crbug.com/758169",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://crbug.com/758169"
|
||||
},
|
||||
{
|
||||
"name": "102797",
|
||||
@ -82,6 +77,11 @@
|
||||
"name": "1040282",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040282"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:0265",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:0265"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "43987",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/43987/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/SouhailHammou/Exploits/blob/master/CVE-2018-6606/Malwarefox_privescl_1.c",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/SouhailHammou/Exploits/blob/master/CVE-2018-6606/Malwarefox_privescl_1.c"
|
||||
},
|
||||
{
|
||||
"name": "43987",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/43987/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -415,16 +415,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0657",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0657"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2019:0349",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:0349"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0657",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0657"
|
||||
},
|
||||
{
|
||||
"name": "106890",
|
||||
"refsource": "BID",
|
||||
|
Loading…
x
Reference in New Issue
Block a user