mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
2f691f663f
commit
3a8f6f7944
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070103 Multiple Vulnerabilities in Cisco Clean Access",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
|
||||
"name": "23617",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23617"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0030",
|
||||
@ -67,15 +67,15 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/32578"
|
||||
},
|
||||
{
|
||||
"name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
|
||||
},
|
||||
{
|
||||
"name": "1017465",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017465"
|
||||
},
|
||||
{
|
||||
"name" : "23617",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23617"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,36 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070724 CA Message Queuing Server (Cam.exe) Overflow",
|
||||
"refsource" : "ISS",
|
||||
"url" : "http://www.iss.net/threats/272.html"
|
||||
},
|
||||
{
|
||||
"name" : "20070725 [CAID 35527]: CA Message Queuing (CAM / CAFT) Buffer Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/474602/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809"
|
||||
},
|
||||
{
|
||||
"name" : "25051",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25051"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2638",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2638"
|
||||
},
|
||||
{
|
||||
"name": "systems-management-bo(32234)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32234"
|
||||
},
|
||||
{
|
||||
"name": "1018449",
|
||||
"refsource": "SECTRACK",
|
||||
@ -93,9 +78,24 @@
|
||||
"url": "http://secunia.com/advisories/26190"
|
||||
},
|
||||
{
|
||||
"name" : "systems-management-bo(32234)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32234"
|
||||
"name": "20070725 [CAID 35527]: CA Message Queuing (CAM / CAFT) Buffer Overflow Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/474602/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "25051",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25051"
|
||||
},
|
||||
{
|
||||
"name": "20070724 CA Message Queuing Server (Cam.exe) Overflow",
|
||||
"refsource": "ISS",
|
||||
"url": "http://www.iss.net/threats/272.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,20 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[openbsd-cvs] 20070103 Re: CVS: cvs.openbsd.org: src",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=openbsd-cvs&m=116781980706409&w=2"
|
||||
"name": "http://ilja.netric.org/files/Unusual%20bugs%2023c3.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://ilja.netric.org/files/Unusual%20bugs%2023c3.pdf"
|
||||
},
|
||||
{
|
||||
"name": "32574",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32574"
|
||||
},
|
||||
{
|
||||
"name": "[openbsd-cvs] 20070103 CVS: cvs.openbsd.org: www",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=openbsd-cvs&m=116785923301416&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://ilja.netric.org/files/Unusual%20bugs%2023c3.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://ilja.netric.org/files/Unusual%20bugs%2023c3.pdf"
|
||||
},
|
||||
{
|
||||
"name": "[3.9] 017: SECURITY FIX: January 3, 2007",
|
||||
"refsource": "OPENBSD",
|
||||
@ -77,21 +77,16 @@
|
||||
"refsource": "OPENBSD",
|
||||
"url": "http://www.openbsd.org/errata.html#agp"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-0043",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0043"
|
||||
},
|
||||
{
|
||||
"name" : "32574",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32574"
|
||||
},
|
||||
{
|
||||
"name": "1017468",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017468"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0043",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0043"
|
||||
},
|
||||
{
|
||||
"name": "23608",
|
||||
"refsource": "SECUNIA",
|
||||
@ -101,6 +96,11 @@
|
||||
"name": "openbsd-vga-privilege-escalation(31276)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31276"
|
||||
},
|
||||
{
|
||||
"name": "[openbsd-cvs] 20070103 Re: CVS: cvs.openbsd.org: src",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=openbsd-cvs&m=116781980706409&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21983"
|
||||
},
|
||||
{
|
||||
"name" : "36860",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36860"
|
||||
},
|
||||
{
|
||||
"name": "wordpress-tbid-sql-injection(31385)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31385"
|
||||
},
|
||||
{
|
||||
"name": "36860",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36860"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,14 +58,9 @@
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=142047"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200701-28",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200701-28.xml"
|
||||
},
|
||||
{
|
||||
"name" : "22349",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22349"
|
||||
"name": "24018",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24018"
|
||||
},
|
||||
{
|
||||
"name": "31965",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://osvdb.org/31965"
|
||||
},
|
||||
{
|
||||
"name" : "24018",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24018"
|
||||
"name": "22349",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22349"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200701-28",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200701-28.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2007-0948",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS07-049",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-049"
|
||||
"name": "oval:org.mitre.oval:def:1259",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1259"
|
||||
},
|
||||
{
|
||||
"name": "TA07-226A",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-226A.html"
|
||||
},
|
||||
{
|
||||
"name" : "25298",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25298"
|
||||
"name": "1018567",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018567"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2873",
|
||||
@ -73,14 +73,14 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2873"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:1259",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1259"
|
||||
"name": "25298",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25298"
|
||||
},
|
||||
{
|
||||
"name" : "1018567",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018567"
|
||||
"name": "MS07-049",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-049"
|
||||
},
|
||||
{
|
||||
"name": "26444",
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070220 MediaWiki Cross-site Scripting",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/460596/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.bugsec.com/articles.php?Security=24",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.bugsec.com/articles.php?Security=24"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES"
|
||||
},
|
||||
{
|
||||
"name" : "37343",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37343"
|
||||
"name": "20070220 MediaWiki Cross-site Scripting",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/460596/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "2274",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2274"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES"
|
||||
},
|
||||
{
|
||||
"name": "mediawiki-index-xss(32586)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32586"
|
||||
},
|
||||
{
|
||||
"name": "37343",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37343"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2007-1205",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,64 +53,64 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070410 Secunia Research: Microsoft Agent URL Parsing Memory CorruptionVulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/465235/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2006-74/advisory/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secunia.com/secunia_research/2006-74/advisory/"
|
||||
"name": "22896",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22896"
|
||||
},
|
||||
{
|
||||
"name": "HPSBST02208",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/466331/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT071365",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/466331/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MS07-020",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-020"
|
||||
},
|
||||
{
|
||||
"name" : "TA07-100A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-100A.html"
|
||||
},
|
||||
{
|
||||
"name": "VU#728057",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/728057"
|
||||
},
|
||||
{
|
||||
"name" : "23337",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23337"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1324",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1324"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:2034",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2034"
|
||||
},
|
||||
{
|
||||
"name": "1017896",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1017896"
|
||||
},
|
||||
{
|
||||
"name" : "22896",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22896"
|
||||
"name": "MS07-020",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-020"
|
||||
},
|
||||
{
|
||||
"name": "20070410 Secunia Research: Microsoft Agent URL Parsing Memory CorruptionVulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/465235/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "TA07-100A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-100A.html"
|
||||
},
|
||||
{
|
||||
"name": "23337",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23337"
|
||||
},
|
||||
{
|
||||
"name": "SSRT071365",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/466331/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2006-74/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2006-74/advisory/"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:2034",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2034"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,99 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[linux-netdev] 20070316 [PATCH 2.6.21-rc3] IPV6: ipv6_fl_socklist is inadvertently shared.",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=linux-netdev&m=117406721731891&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d35690beda1429544d46c8eb34b2e3a8c37ab299",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d35690beda1429544d46c8eb34b2e3a8c37ab299"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm"
|
||||
"name": "RHSA-2007:0436",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2007-0436.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1286",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2007/dsa-1286"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1304",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2007/dsa-1304"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1503",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2008/dsa-1503"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:078",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:078"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2011:051",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0347",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0347.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0436",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0436.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0673",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0673.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0672",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0672.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHBA-2007-0304",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHBA-2007-0304.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:029",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:030",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_30_kernel.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:035",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_35_kernel.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:043",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
|
||||
"name": "[linux-netdev] 20070316 [PATCH 2.6.21-rc3] IPV6: ipv6_fl_socklist is inadvertently shared.",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=linux-netdev&m=117406721731891&w=2"
|
||||
},
|
||||
{
|
||||
"name": "USN-464-1",
|
||||
@ -153,24 +78,19 @@
|
||||
"url": "http://www.ubuntu.com/usn/usn-464-1"
|
||||
},
|
||||
{
|
||||
"name" : "23104",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23104"
|
||||
"name": "SUSE-SA:2007:043",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10130",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10130"
|
||||
"name": "MDKSA-2007:078",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:078"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1084",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1084"
|
||||
},
|
||||
{
|
||||
"name" : "24618",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24618"
|
||||
"name": "RHSA-2007:0673",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0673.html"
|
||||
},
|
||||
{
|
||||
"name": "24777",
|
||||
@ -178,44 +98,14 @@
|
||||
"url": "http://secunia.com/advisories/24777"
|
||||
},
|
||||
{
|
||||
"name" : "25078",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25078"
|
||||
"name": "23104",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23104"
|
||||
},
|
||||
{
|
||||
"name" : "25099",
|
||||
"name": "27528",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25099"
|
||||
},
|
||||
{
|
||||
"name" : "25288",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25288"
|
||||
},
|
||||
{
|
||||
"name" : "25392",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25392"
|
||||
},
|
||||
{
|
||||
"name" : "25630",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25630"
|
||||
},
|
||||
{
|
||||
"name" : "25683",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25683"
|
||||
},
|
||||
{
|
||||
"name" : "25714",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25714"
|
||||
},
|
||||
{
|
||||
"name" : "25961",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25961"
|
||||
"url": "http://secunia.com/advisories/27528"
|
||||
},
|
||||
{
|
||||
"name": "26379",
|
||||
@ -228,19 +118,129 @@
|
||||
"url": "http://secunia.com/advisories/25226"
|
||||
},
|
||||
{
|
||||
"name" : "27528",
|
||||
"name": "SUSE-SA:2007:029",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html"
|
||||
},
|
||||
{
|
||||
"name": "24618",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27528"
|
||||
"url": "http://secunia.com/advisories/24618"
|
||||
},
|
||||
{
|
||||
"name": "25683",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25683"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1084",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1084"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:051",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
|
||||
},
|
||||
{
|
||||
"name": "25288",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25288"
|
||||
},
|
||||
{
|
||||
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0672",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0672.html"
|
||||
},
|
||||
{
|
||||
"name": "RHBA-2007-0304",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHBA-2007-0304.html"
|
||||
},
|
||||
{
|
||||
"name": "25099",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25099"
|
||||
},
|
||||
{
|
||||
"name": "25961",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25961"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1503",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1503"
|
||||
},
|
||||
{
|
||||
"name": "25078",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25078"
|
||||
},
|
||||
{
|
||||
"name": "25392",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25392"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:030",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_30_kernel.html"
|
||||
},
|
||||
{
|
||||
"name": "29058",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29058"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1304",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2007/dsa-1304"
|
||||
},
|
||||
{
|
||||
"name": "25630",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25630"
|
||||
},
|
||||
{
|
||||
"name": "25714",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25714"
|
||||
},
|
||||
{
|
||||
"name": "kernel-tcpv6synrecvsoc-dos(33176)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33176"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:035",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_35_kernel.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10130",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10130"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d35690beda1429544d46c8eb34b2e3a8c37ab299",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d35690beda1429544d46c8eb34b2e3a8c37ab299"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "23056",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23056"
|
||||
},
|
||||
{
|
||||
"name": "filecopa-unspecified-bo(33462)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33462"
|
||||
},
|
||||
{
|
||||
"name": "43559",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/43559"
|
||||
},
|
||||
{
|
||||
"name": "http://www.immunitysec.com/partners-index.shtml",
|
||||
"refsource": "MISC",
|
||||
@ -61,21 +76,6 @@
|
||||
"name": "https://www.immunityinc.com/downloads/immpartners/filecopa.tar",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.immunityinc.com/downloads/immpartners/filecopa.tar"
|
||||
},
|
||||
{
|
||||
"name" : "23056",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23056"
|
||||
},
|
||||
{
|
||||
"name" : "43559",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/43559"
|
||||
},
|
||||
{
|
||||
"name" : "filecopa-unspecified-bo(33462)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33462"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,80 +52,80 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070326 Multiple XSS in IronMail",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/463827/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.514.es/2007/03/siaadv07004_multiples_vulnerab.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.514.es/2007/03/siaadv07004_multiples_vulnerab.html"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1164",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1164"
|
||||
},
|
||||
{
|
||||
"name" : "34526",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/34526"
|
||||
},
|
||||
{
|
||||
"name" : "34527",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/34527"
|
||||
},
|
||||
{
|
||||
"name": "34528",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34528"
|
||||
},
|
||||
{
|
||||
"name" : "34529",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/34529"
|
||||
},
|
||||
{
|
||||
"name" : "34530",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/34530"
|
||||
},
|
||||
{
|
||||
"name": "34531",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34531"
|
||||
},
|
||||
{
|
||||
"name" : "34532",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/34532"
|
||||
},
|
||||
{
|
||||
"name" : "34533",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/34533"
|
||||
},
|
||||
{
|
||||
"name": "1017821",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1017821"
|
||||
},
|
||||
{
|
||||
"name" : "24657",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24657"
|
||||
},
|
||||
{
|
||||
"name": "2484",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2484"
|
||||
},
|
||||
{
|
||||
"name": "34529",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34529"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1164",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1164"
|
||||
},
|
||||
{
|
||||
"name": "ironmail-multiple-xss(33232)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33232"
|
||||
},
|
||||
{
|
||||
"name": "20070326 Multiple XSS in IronMail",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/463827/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "34530",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34530"
|
||||
},
|
||||
{
|
||||
"name": "34533",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34533"
|
||||
},
|
||||
{
|
||||
"name": "http://www.514.es/2007/03/siaadv07004_multiples_vulnerab.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.514.es/2007/03/siaadv07004_multiples_vulnerab.html"
|
||||
},
|
||||
{
|
||||
"name": "24657",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24657"
|
||||
},
|
||||
{
|
||||
"name": "34527",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34527"
|
||||
},
|
||||
{
|
||||
"name": "34532",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34532"
|
||||
},
|
||||
{
|
||||
"name": "34526",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34526"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070730 phpWebFileManager v0.5 (PN_PathPrefix) Remote File Include Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/475095/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20070731 WTF: phpWebFileManager v0.5 (PN_PathPrefix) Remote File Include Vulnerability",
|
||||
"refsource": "VIM",
|
||||
"url": "http://www.attrition.org/pipermail/vim/2007-July/001744.html"
|
||||
},
|
||||
{
|
||||
"name" : "2940",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/2940"
|
||||
},
|
||||
{
|
||||
"name": "phpwebfilemanager-index-file-include(35690)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35690"
|
||||
},
|
||||
{
|
||||
"name": "20070730 phpWebFileManager v0.5 (PN_PathPrefix) Remote File Include Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/475095/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "2940",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2940"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070920 Multiple Vulnerabilities in CA ARCserve for Laptops & Desktops",
|
||||
"refsource" : "EEYE",
|
||||
"url" : "http://research.eeye.com/html/advisories/published/AD20070920.html"
|
||||
"name": "24348",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24348"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35674",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35674"
|
||||
},
|
||||
{
|
||||
"name": "25606",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25606"
|
||||
},
|
||||
{
|
||||
"name": "20070920 CA ARCServe Backup for Laptops and Desktops Multiple Buffer Overflow Vulnerabilities",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=599"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006"
|
||||
},
|
||||
{
|
||||
"name": "20070921 [CAID 35673, 35674, 35675, 35676, 35677]: CA ARCserve Backup for Laptops and Desktops Multiple Server Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -73,29 +88,14 @@
|
||||
"url": "http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35674",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35674"
|
||||
},
|
||||
{
|
||||
"name" : "24348",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24348"
|
||||
"name": "20070920 Multiple Vulnerabilities in CA ARCserve for Laptops & Desktops",
|
||||
"refsource": "EEYE",
|
||||
"url": "http://research.eeye.com/html/advisories/published/AD20070920.html"
|
||||
},
|
||||
{
|
||||
"name": "1018728",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018728"
|
||||
},
|
||||
{
|
||||
"name" : "25606",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25606"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070919 [waraxe-2007-SA#052] - dBlog CMS Open Source database retrieval",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/479969/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.waraxe.us/advisory-52.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.waraxe.us/advisory-52.html"
|
||||
"name": "3156",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3156"
|
||||
},
|
||||
{
|
||||
"name": "43970",
|
||||
@ -68,14 +63,19 @@
|
||||
"url": "http://osvdb.org/43970"
|
||||
},
|
||||
{
|
||||
"name" : "3156",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3156"
|
||||
"name": "20070919 [waraxe-2007-SA#052] - dBlog CMS Open Source database retrieval",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/479969/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "dblog-dblog-information-disclosure(36703)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36703"
|
||||
},
|
||||
{
|
||||
"name": "http://www.waraxe.us/advisory-52.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.waraxe.us/advisory-52.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071010 Vulnerabilities digest",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://securityvulns.ru/Sdocument12.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://securityvulns.ru/Sdocument12.html"
|
||||
"name": "26040",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26040"
|
||||
},
|
||||
{
|
||||
"name": "http://websecurity.com.ua/1210/",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://websecurity.com.ua/1210/"
|
||||
},
|
||||
{
|
||||
"name" : "26040",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26040"
|
||||
"name": "http://securityvulns.ru/Sdocument12.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://securityvulns.ru/Sdocument12.html"
|
||||
},
|
||||
{
|
||||
"name": "20071010 Vulnerabilities digest",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "42477",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html"
|
||||
},
|
||||
{
|
||||
"name": "http://esupport.trendmicro.com/solution/en-US/1109669.aspx",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://esupport.trendmicro.com/solution/en-US/1109669.aspx"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html"
|
||||
},
|
||||
{
|
||||
"name": "74661",
|
||||
"refsource": "BID",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-3758",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,9 +58,9 @@
|
||||
"url": "https://support.apple.com/kb/HT205030"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-08-13-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
||||
"name": "1033275",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033275"
|
||||
},
|
||||
{
|
||||
"name": "76337",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/76337"
|
||||
},
|
||||
{
|
||||
"name" : "1033275",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033275"
|
||||
"name": "APPLE-SA-2015-08-13-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2015-6087",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS15-112",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-112"
|
||||
},
|
||||
{
|
||||
"name": "1034112",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034112"
|
||||
},
|
||||
{
|
||||
"name": "MS15-112",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-112"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-7057",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2015-7258",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,15 +62,15 @@
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Nov/48"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2015-7484",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983720",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983720"
|
||||
},
|
||||
{
|
||||
"name": "ibm-relm-cve20157484-info-disc(108619)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/108619"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21983720",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983720"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-7957",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20151216 RCE in Zen Cart via Arbitrary File Inclusion",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/537129/100/0/threaded"
|
||||
"name": "https://www.htbridge.com/advisory/HTB23282",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.htbridge.com/advisory/HTB23282"
|
||||
},
|
||||
{
|
||||
"name": "39017",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://www.exploit-db.com/exploits/39017/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.htbridge.com/advisory/HTB23282",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.htbridge.com/advisory/HTB23282"
|
||||
"name": "20151216 RCE in Zen Cart via Arbitrary File Inclusion",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/537129/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://www.zen-cart.com/showthread.php?218914-Security-Patches-for-v1-5-4-November-2015",
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/redmine/redmine/commit/8d8f612fa368a72c56b63f7ce6b7e98cab9feb22",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/redmine/redmine/commit/8d8f612fa368a72c56b63f7ce6b7e98cab9feb22"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.redmine.org/issues/21136",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.redmine.org/issues/21136"
|
||||
"name": "78621",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/78621"
|
||||
},
|
||||
{
|
||||
"name": "https://www.redmine.org/projects/redmine/wiki/Changelog_3_0",
|
||||
@ -68,24 +63,29 @@
|
||||
"url": "https://www.redmine.org/projects/redmine/wiki/Changelog_3_0"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.redmine.org/projects/redmine/wiki/Changelog_3_1",
|
||||
"name": "https://www.redmine.org/issues/21136",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://www.redmine.org/projects/redmine/wiki/Changelog_3_1"
|
||||
"url": "https://www.redmine.org/issues/21136"
|
||||
},
|
||||
{
|
||||
"name": "https://www.redmine.org/versions/105",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.redmine.org/versions/105"
|
||||
},
|
||||
{
|
||||
"name": "https://www.redmine.org/projects/redmine/wiki/Changelog_3_1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.redmine.org/projects/redmine/wiki/Changelog_3_1"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3529",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3529"
|
||||
},
|
||||
{
|
||||
"name" : "78621",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/78621"
|
||||
"name": "https://github.com/redmine/redmine/commit/8d8f612fa368a72c56b63f7ce6b7e98cab9feb22",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/redmine/redmine/commit/8d8f612fa368a72c56b63f7ce6b7e98cab9feb22"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2015-8650",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,69 +53,69 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-651",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-651"
|
||||
"name": "openSUSE-SU-2015:2403",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-01.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-01.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201601-03",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201601-03"
|
||||
"name": "1034544",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034544"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:2697",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2697.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-01.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:2401",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:2402",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:2400",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:2403",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html"
|
||||
},
|
||||
{
|
||||
"name": "79701",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/79701"
|
||||
},
|
||||
{
|
||||
"name" : "1034544",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1034544"
|
||||
"name": "openSUSE-SU-2015:2400",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201601-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201601-03"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-651",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-651"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2015-59.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11876",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11876"
|
||||
},
|
||||
{
|
||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=2290eba5cb25f927f9142680193ac1158d35506e",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=2290eba5cb25f927f9142680193ac1158d35506e"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11876",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11876"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201604-05",
|
||||
"refsource": "GENTOO",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2016-0154",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS16-037",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-037"
|
||||
},
|
||||
{
|
||||
"name" : "MS16-038",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-038"
|
||||
},
|
||||
{
|
||||
"name": "1035521",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035521"
|
||||
},
|
||||
{
|
||||
"name": "MS16-037",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-037"
|
||||
},
|
||||
{
|
||||
"name": "1035522",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035522"
|
||||
},
|
||||
{
|
||||
"name": "MS16-038",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-038"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2016-0199",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160614 Microsoft Internet Explorer 11 Garbage Collector Attribute Type Confusion Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1226"
|
||||
},
|
||||
{
|
||||
"name" : "20160617 CVE-2016-0199 / MS16-063: MSIE 11 garbage collector attribute type confusion",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/538706/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "39994",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/39994/"
|
||||
},
|
||||
{
|
||||
"name" : "20160618 CVE-2016-0199 / MS16-063: MSIE 11 garbage collector attribute type confusion",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Jun/44"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/137533/Microsoft-Internet-Explorer-11-Garbage-Collector-Attribute-Type-Confusion.html",
|
||||
"refsource": "MISC",
|
||||
@ -82,10 +62,30 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-063"
|
||||
},
|
||||
{
|
||||
"name": "20160614 Microsoft Internet Explorer 11 Garbage Collector Attribute Type Confusion Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1226"
|
||||
},
|
||||
{
|
||||
"name": "39994",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/39994/"
|
||||
},
|
||||
{
|
||||
"name": "20160617 CVE-2016-0199 / MS16-063: MSIE 11 garbage collector attribute type confusion",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/538706/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1036096",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036096"
|
||||
},
|
||||
{
|
||||
"name": "20160618 CVE-2016-0199 / MS16-063: MSIE 11 garbage collector attribute type confusion",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2016/Jun/44"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-0638",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2016-1160",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://wordpress.org/plugins/wp-favorite-posts/changelog/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wordpress.org/plugins/wp-favorite-posts/changelog/"
|
||||
"name": "JVNDB-2016-000034",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000034"
|
||||
},
|
||||
{
|
||||
"name": "JVN#86517621",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://jvn.jp/en/jp/JVN86517621/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2016-000034",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000034"
|
||||
"name": "https://wordpress.org/plugins/wp-favorite-posts/changelog/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wordpress.org/plugins/wp-favorite-posts/changelog/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1415",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "40509",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/40509/"
|
||||
},
|
||||
{
|
||||
"name": "20160831 Cisco WebEx Meetings Player Denial of Service Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-webex"
|
||||
},
|
||||
{
|
||||
"name": "1036713",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036713"
|
||||
},
|
||||
{
|
||||
"name": "92711",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92711"
|
||||
},
|
||||
{
|
||||
"name" : "1036713",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036713"
|
||||
"name": "40509",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/40509/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2016-1705",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,111 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1868",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/612939",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/612939"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/600953",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/600953"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1869",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/614989",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/614989"
|
||||
},
|
||||
{
|
||||
"name": "92053",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92053"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/613869",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/613869"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/620737",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/620737"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/622522",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/622522"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/621843",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/621843"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/614701",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/614701"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/609286",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/609286"
|
||||
},
|
||||
{
|
||||
"name": "USN-3041-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3041-1"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/619378",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/619378"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1918",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/615820",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/615820"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/619382",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/619382"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/613971",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/613971"
|
||||
},
|
||||
{
|
||||
"name": "https://crbug.com/629852",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://crbug.com/629852"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/614405",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/614405"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/590619",
|
||||
"refsource": "CONFIRM",
|
||||
@ -63,79 +168,9 @@
|
||||
"url": "http://crbug.com/599458"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/600953",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/600953"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/609286",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/609286"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/611959",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/611959"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/612939",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/612939"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/613869",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/613869"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/613971",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/613971"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/614405",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/614405"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/614701",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/614701"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/614989",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/614989"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/615820",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/615820"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/619378",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/619378"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/619382",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/619382"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/620694",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/620694"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/620737",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/620737"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/620858",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/620858"
|
||||
"name": "openSUSE-SU-2016:1865",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/620952",
|
||||
@ -143,29 +178,9 @@
|
||||
"url": "http://crbug.com/620952"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/621843",
|
||||
"name": "http://crbug.com/611959",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://crbug.com/621843"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/622522",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/622522"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://crbug.com/629852",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://crbug.com/629852"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3637",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3637"
|
||||
"url": "http://crbug.com/611959"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:1485",
|
||||
@ -173,39 +188,24 @@
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1865",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1868",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1869",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1918",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3041-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-3041-1"
|
||||
},
|
||||
{
|
||||
"name" : "92053",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/92053"
|
||||
"name": "http://crbug.com/620694",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/620694"
|
||||
},
|
||||
{
|
||||
"name": "1036428",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036428"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3637",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3637"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/620858",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/620858"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2016-1717",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205729",
|
||||
"name": "https://support.apple.com/HT206168",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205729"
|
||||
"url": "https://support.apple.com/HT206168"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205731",
|
||||
@ -63,39 +63,39 @@
|
||||
"url": "https://support.apple.com/HT205731"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205732",
|
||||
"name": "https://support.apple.com/HT205729",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205732"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206168",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206168"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-01-19-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-01-19-2",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html"
|
||||
"url": "https://support.apple.com/HT205729"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-01-25-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "1034736",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034736"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-01-19-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-03-21-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "1034736",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1034736"
|
||||
"name": "APPLE-SA-2016-01-19-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205732",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205732"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20160118 Buffer Overflow in lha compression utility",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/01/18/3"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160118 Re: Buffer Overflow in lha compression utility",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/01/18/8"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160118 Buffer Overflow in lha compression utility",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/01/18/3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#diff-37b0d289d6375ba4a7740401950ccdd6R199",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#diff-37b0d289d6375ba4a7740401950ccdd6R199"
|
||||
},
|
||||
{
|
||||
"name": "92741",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92741"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#diff-37b0d289d6375ba4a7740401950ccdd6R199",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#diff-37b0d289d6375ba4a7740401950ccdd6R199"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user