"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:42:33 +00:00
parent 2f691f663f
commit 3a8f6f7944
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 4001 additions and 4001 deletions

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070103 Multiple Vulnerabilities in Cisco Clean Access",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
"name": "23617",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23617"
},
{
"name": "ADV-2007-0030",
@ -67,15 +67,15 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/32578"
},
{
"name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
},
{
"name": "1017465",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017465"
},
{
"name" : "23617",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23617"
}
]
}

View File

@ -52,36 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "20070724 CA Message Queuing Server (Cam.exe) Overflow",
"refsource" : "ISS",
"url" : "http://www.iss.net/threats/272.html"
},
{
"name" : "20070725 [CAID 35527]: CA Message Queuing (CAM / CAFT) Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/474602/100/0/threaded"
},
{
"name": "http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp",
"refsource": "CONFIRM",
"url": "http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp"
},
{
"name" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809",
"refsource" : "CONFIRM",
"url" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809"
},
{
"name" : "25051",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25051"
},
{
"name": "ADV-2007-2638",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2638"
},
{
"name": "systems-management-bo(32234)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32234"
},
{
"name": "1018449",
"refsource": "SECTRACK",
@ -93,9 +78,24 @@
"url": "http://secunia.com/advisories/26190"
},
{
"name" : "systems-management-bo(32234)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32234"
"name": "20070725 [CAID 35527]: CA Message Queuing (CAM / CAFT) Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474602/100/0/threaded"
},
{
"name": "25051",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25051"
},
{
"name": "20070724 CA Message Queuing Server (Cam.exe) Overflow",
"refsource": "ISS",
"url": "http://www.iss.net/threats/272.html"
},
{
"name": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809",
"refsource": "CONFIRM",
"url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809"
}
]
}

View File

@ -53,20 +53,20 @@
"references": {
"reference_data": [
{
"name" : "[openbsd-cvs] 20070103 Re: CVS: cvs.openbsd.org: src",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=openbsd-cvs&m=116781980706409&w=2"
"name": "http://ilja.netric.org/files/Unusual%20bugs%2023c3.pdf",
"refsource": "MISC",
"url": "http://ilja.netric.org/files/Unusual%20bugs%2023c3.pdf"
},
{
"name": "32574",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/32574"
},
{
"name": "[openbsd-cvs] 20070103 CVS: cvs.openbsd.org: www",
"refsource": "MLIST",
"url": "http://marc.info/?l=openbsd-cvs&m=116785923301416&w=2"
},
{
"name" : "http://ilja.netric.org/files/Unusual%20bugs%2023c3.pdf",
"refsource" : "MISC",
"url" : "http://ilja.netric.org/files/Unusual%20bugs%2023c3.pdf"
},
{
"name": "[3.9] 017: SECURITY FIX: January 3, 2007",
"refsource": "OPENBSD",
@ -77,21 +77,16 @@
"refsource": "OPENBSD",
"url": "http://www.openbsd.org/errata.html#agp"
},
{
"name" : "ADV-2007-0043",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0043"
},
{
"name" : "32574",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/32574"
},
{
"name": "1017468",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017468"
},
{
"name": "ADV-2007-0043",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0043"
},
{
"name": "23608",
"refsource": "SECUNIA",
@ -101,6 +96,11 @@
"name": "openbsd-vga-privilege-escalation(31276)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31276"
},
{
"name": "[openbsd-cvs] 20070103 Re: CVS: cvs.openbsd.org: src",
"refsource": "MLIST",
"url": "http://marc.info/?l=openbsd-cvs&m=116781980706409&w=2"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21983"
},
{
"name" : "36860",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36860"
},
{
"name": "wordpress-tbid-sql-injection(31385)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31385"
},
{
"name": "36860",
"refsource": "OSVDB",
"url": "http://osvdb.org/36860"
}
]
}

View File

@ -58,14 +58,9 @@
"url": "http://bugs.gentoo.org/show_bug.cgi?id=142047"
},
{
"name" : "GLSA-200701-28",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200701-28.xml"
},
{
"name" : "22349",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22349"
"name": "24018",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24018"
},
{
"name": "31965",
@ -73,9 +68,14 @@
"url": "http://osvdb.org/31965"
},
{
"name" : "24018",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24018"
"name": "22349",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22349"
},
{
"name": "GLSA-200701-28",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200701-28.xml"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2007-0948",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MS07-049",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-049"
"name": "oval:org.mitre.oval:def:1259",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1259"
},
{
"name": "TA07-226A",
@ -63,9 +63,9 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA07-226A.html"
},
{
"name" : "25298",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25298"
"name": "1018567",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018567"
},
{
"name": "ADV-2007-2873",
@ -73,14 +73,14 @@
"url": "http://www.vupen.com/english/advisories/2007/2873"
},
{
"name" : "oval:org.mitre.oval:def:1259",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1259"
"name": "25298",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25298"
},
{
"name" : "1018567",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018567"
"name": "MS07-049",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-049"
},
{
"name": "26444",

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "20070220 MediaWiki Cross-site Scripting",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/460596/100/0/threaded"
},
{
"name": "http://www.bugsec.com/articles.php?Security=24",
"refsource": "MISC",
"url": "http://www.bugsec.com/articles.php?Security=24"
},
{
"name" : "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES",
"refsource" : "CONFIRM",
"url" : "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES"
},
{
"name" : "37343",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37343"
"name": "20070220 MediaWiki Cross-site Scripting",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460596/100/0/threaded"
},
{
"name": "2274",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2274"
},
{
"name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES",
"refsource": "CONFIRM",
"url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES"
},
{
"name": "mediawiki-index-xss(32586)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32586"
},
{
"name": "37343",
"refsource": "OSVDB",
"url": "http://osvdb.org/37343"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2007-1205",
"STATE": "PUBLIC"
},
@ -53,64 +53,64 @@
"references": {
"reference_data": [
{
"name" : "20070410 Secunia Research: Microsoft Agent URL Parsing Memory CorruptionVulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/465235/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-74/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2006-74/advisory/"
"name": "22896",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22896"
},
{
"name": "HPSBST02208",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/466331/100/200/threaded"
},
{
"name" : "SSRT071365",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/466331/100/200/threaded"
},
{
"name" : "MS07-020",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-020"
},
{
"name" : "TA07-100A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-100A.html"
},
{
"name": "VU#728057",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/728057"
},
{
"name" : "23337",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23337"
},
{
"name": "ADV-2007-1324",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1324"
},
{
"name" : "oval:org.mitre.oval:def:2034",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2034"
},
{
"name": "1017896",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017896"
},
{
"name" : "22896",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22896"
"name": "MS07-020",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-020"
},
{
"name": "20070410 Secunia Research: Microsoft Agent URL Parsing Memory CorruptionVulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/465235/100/0/threaded"
},
{
"name": "TA07-100A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-100A.html"
},
{
"name": "23337",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23337"
},
{
"name": "SSRT071365",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/466331/100/200/threaded"
},
{
"name": "http://secunia.com/secunia_research/2006-74/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-74/advisory/"
},
{
"name": "oval:org.mitre.oval:def:2034",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2034"
}
]
}

View File

@ -53,99 +53,24 @@
"references": {
"reference_data": [
{
"name" : "[linux-netdev] 20070316 [PATCH 2.6.21-rc3] IPV6: ipv6_fl_socklist is inadvertently shared.",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=linux-netdev&m=117406721731891&w=2"
},
{
"name" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478",
"refsource" : "MISC",
"url" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d35690beda1429544d46c8eb34b2e3a8c37ab299",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d35690beda1429544d46c8eb34b2e3a8c37ab299"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm"
"name": "RHSA-2007:0436",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0436.html"
},
{
"name": "DSA-1286",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1286"
},
{
"name" : "DSA-1304",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1304"
},
{
"name" : "DSA-1503",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1503"
},
{
"name" : "MDKSA-2007:078",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:078"
},
{
"name" : "MDVSA-2011:051",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"name": "RHSA-2007:0347",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0347.html"
},
{
"name" : "RHSA-2007:0436",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0436.html"
},
{
"name" : "RHSA-2007:0673",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0673.html"
},
{
"name" : "RHSA-2007:0672",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0672.html"
},
{
"name" : "RHBA-2007-0304",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHBA-2007-0304.html"
},
{
"name" : "SUSE-SA:2007:029",
"refsource" : "SUSE",
"url" : "http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html"
},
{
"name" : "SUSE-SA:2007:030",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_30_kernel.html"
},
{
"name" : "SUSE-SA:2007:035",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_35_kernel.html"
},
{
"name" : "SUSE-SA:2007:043",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
"name": "[linux-netdev] 20070316 [PATCH 2.6.21-rc3] IPV6: ipv6_fl_socklist is inadvertently shared.",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-netdev&m=117406721731891&w=2"
},
{
"name": "USN-464-1",
@ -153,24 +78,19 @@
"url": "http://www.ubuntu.com/usn/usn-464-1"
},
{
"name" : "23104",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23104"
"name": "SUSE-SA:2007:043",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
},
{
"name" : "oval:org.mitre.oval:def:10130",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10130"
"name": "MDKSA-2007:078",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:078"
},
{
"name" : "ADV-2007-1084",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1084"
},
{
"name" : "24618",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24618"
"name": "RHSA-2007:0673",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0673.html"
},
{
"name": "24777",
@ -178,44 +98,14 @@
"url": "http://secunia.com/advisories/24777"
},
{
"name" : "25078",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25078"
"name": "23104",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23104"
},
{
"name" : "25099",
"name": "27528",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/25099"
},
{
"name" : "25288",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25288"
},
{
"name" : "25392",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25392"
},
{
"name" : "25630",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25630"
},
{
"name" : "25683",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25683"
},
{
"name" : "25714",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25714"
},
{
"name" : "25961",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25961"
"url": "http://secunia.com/advisories/27528"
},
{
"name": "26379",
@ -228,19 +118,129 @@
"url": "http://secunia.com/advisories/25226"
},
{
"name" : "27528",
"name": "SUSE-SA:2007:029",
"refsource": "SUSE",
"url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html"
},
{
"name": "24618",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/27528"
"url": "http://secunia.com/advisories/24618"
},
{
"name": "25683",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25683"
},
{
"name": "ADV-2007-1084",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1084"
},
{
"name": "MDVSA-2011:051",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"name": "25288",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25288"
},
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478",
"refsource": "MISC",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478"
},
{
"name": "RHSA-2007:0672",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0672.html"
},
{
"name": "RHBA-2007-0304",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHBA-2007-0304.html"
},
{
"name": "25099",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25099"
},
{
"name": "25961",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25961"
},
{
"name": "DSA-1503",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1503"
},
{
"name": "25078",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25078"
},
{
"name": "25392",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25392"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4"
},
{
"name": "SUSE-SA:2007:030",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_30_kernel.html"
},
{
"name": "29058",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29058"
},
{
"name": "DSA-1304",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1304"
},
{
"name": "25630",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25630"
},
{
"name": "25714",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25714"
},
{
"name": "kernel-tcpv6synrecvsoc-dos(33176)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33176"
},
{
"name": "SUSE-SA:2007:035",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_35_kernel.html"
},
{
"name": "oval:org.mitre.oval:def:10130",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10130"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d35690beda1429544d46c8eb34b2e3a8c37ab299",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d35690beda1429544d46c8eb34b2e3a8c37ab299"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "23056",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23056"
},
{
"name": "filecopa-unspecified-bo(33462)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33462"
},
{
"name": "43559",
"refsource": "OSVDB",
"url": "http://osvdb.org/43559"
},
{
"name": "http://www.immunitysec.com/partners-index.shtml",
"refsource": "MISC",
@ -61,21 +76,6 @@
"name": "https://www.immunityinc.com/downloads/immpartners/filecopa.tar",
"refsource": "MISC",
"url": "https://www.immunityinc.com/downloads/immpartners/filecopa.tar"
},
{
"name" : "23056",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23056"
},
{
"name" : "43559",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/43559"
},
{
"name" : "filecopa-unspecified-bo(33462)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33462"
}
]
}

View File

@ -52,80 +52,80 @@
},
"references": {
"reference_data": [
{
"name" : "20070326 Multiple XSS in IronMail",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/463827/100/0/threaded"
},
{
"name" : "http://www.514.es/2007/03/siaadv07004_multiples_vulnerab.html",
"refsource" : "MISC",
"url" : "http://www.514.es/2007/03/siaadv07004_multiples_vulnerab.html"
},
{
"name" : "ADV-2007-1164",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1164"
},
{
"name" : "34526",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34526"
},
{
"name" : "34527",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34527"
},
{
"name": "34528",
"refsource": "OSVDB",
"url": "http://osvdb.org/34528"
},
{
"name" : "34529",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34529"
},
{
"name" : "34530",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34530"
},
{
"name": "34531",
"refsource": "OSVDB",
"url": "http://osvdb.org/34531"
},
{
"name" : "34532",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34532"
},
{
"name" : "34533",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34533"
},
{
"name": "1017821",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017821"
},
{
"name" : "24657",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24657"
},
{
"name": "2484",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2484"
},
{
"name": "34529",
"refsource": "OSVDB",
"url": "http://osvdb.org/34529"
},
{
"name": "ADV-2007-1164",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1164"
},
{
"name": "ironmail-multiple-xss(33232)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33232"
},
{
"name": "20070326 Multiple XSS in IronMail",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/463827/100/0/threaded"
},
{
"name": "34530",
"refsource": "OSVDB",
"url": "http://osvdb.org/34530"
},
{
"name": "34533",
"refsource": "OSVDB",
"url": "http://osvdb.org/34533"
},
{
"name": "http://www.514.es/2007/03/siaadv07004_multiples_vulnerab.html",
"refsource": "MISC",
"url": "http://www.514.es/2007/03/siaadv07004_multiples_vulnerab.html"
},
{
"name": "24657",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24657"
},
{
"name": "34527",
"refsource": "OSVDB",
"url": "http://osvdb.org/34527"
},
{
"name": "34532",
"refsource": "OSVDB",
"url": "http://osvdb.org/34532"
},
{
"name": "34526",
"refsource": "OSVDB",
"url": "http://osvdb.org/34526"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20070730 phpWebFileManager v0.5 (PN_PathPrefix) Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/475095/100/0/threaded"
},
{
"name": "20070731 WTF: phpWebFileManager v0.5 (PN_PathPrefix) Remote File Include Vulnerability",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-July/001744.html"
},
{
"name" : "2940",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2940"
},
{
"name": "phpwebfilemanager-index-file-include(35690)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35690"
},
{
"name": "20070730 phpWebFileManager v0.5 (PN_PathPrefix) Remote File Include Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/475095/100/0/threaded"
},
{
"name": "2940",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2940"
}
]
}

View File

@ -53,15 +53,30 @@
"references": {
"reference_data": [
{
"name" : "20070920 Multiple Vulnerabilities in CA ARCserve for Laptops & Desktops",
"refsource" : "EEYE",
"url" : "http://research.eeye.com/html/advisories/published/AD20070920.html"
"name": "24348",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24348"
},
{
"name": "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35674",
"refsource": "CONFIRM",
"url": "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35674"
},
{
"name": "25606",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25606"
},
{
"name": "20070920 CA ARCServe Backup for Laptops and Desktops Multiple Buffer Overflow Vulnerabilities",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=599"
},
{
"name": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006",
"refsource": "CONFIRM",
"url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006"
},
{
"name": "20070921 [CAID 35673, 35674, 35675, 35676, 35677]: CA ARCserve Backup for Laptops and Desktops Multiple Server Vulnerabilities",
"refsource": "BUGTRAQ",
@ -73,29 +88,14 @@
"url": "http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp"
},
{
"name" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006",
"refsource" : "CONFIRM",
"url" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006"
},
{
"name" : "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35674",
"refsource" : "CONFIRM",
"url" : "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35674"
},
{
"name" : "24348",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24348"
"name": "20070920 Multiple Vulnerabilities in CA ARCserve for Laptops & Desktops",
"refsource": "EEYE",
"url": "http://research.eeye.com/html/advisories/published/AD20070920.html"
},
{
"name": "1018728",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018728"
},
{
"name" : "25606",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25606"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070919 [waraxe-2007-SA#052] - dBlog CMS Open Source database retrieval",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/479969/100/0/threaded"
},
{
"name" : "http://www.waraxe.us/advisory-52.html",
"refsource" : "MISC",
"url" : "http://www.waraxe.us/advisory-52.html"
"name": "3156",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3156"
},
{
"name": "43970",
@ -68,14 +63,19 @@
"url": "http://osvdb.org/43970"
},
{
"name" : "3156",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3156"
"name": "20070919 [waraxe-2007-SA#052] - dBlog CMS Open Source database retrieval",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/479969/100/0/threaded"
},
{
"name": "dblog-dblog-information-disclosure(36703)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36703"
},
{
"name": "http://www.waraxe.us/advisory-52.html",
"refsource": "MISC",
"url": "http://www.waraxe.us/advisory-52.html"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20071010 Vulnerabilities digest",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
},
{
"name" : "http://securityvulns.ru/Sdocument12.html",
"refsource" : "MISC",
"url" : "http://securityvulns.ru/Sdocument12.html"
"name": "26040",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26040"
},
{
"name": "http://websecurity.com.ua/1210/",
@ -68,9 +63,14 @@
"url": "http://websecurity.com.ua/1210/"
},
{
"name" : "26040",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26040"
"name": "http://securityvulns.ru/Sdocument12.html",
"refsource": "MISC",
"url": "http://securityvulns.ru/Sdocument12.html"
},
{
"name": "20071010 Vulnerabilities digest",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
},
{
"name": "42477",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html",
"refsource" : "MISC",
"url" : "http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html"
},
{
"name": "http://esupport.trendmicro.com/solution/en-US/1109669.aspx",
"refsource": "CONFIRM",
"url": "http://esupport.trendmicro.com/solution/en-US/1109669.aspx"
},
{
"name": "http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html",
"refsource": "MISC",
"url": "http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html"
},
{
"name": "74661",
"refsource": "BID",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3758",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "https://support.apple.com/kb/HT205030"
},
{
"name" : "APPLE-SA-2015-08-13-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
"name": "1033275",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033275"
},
{
"name": "76337",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/76337"
},
{
"name" : "1033275",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033275"
"name": "APPLE-SA-2015-08-13-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6087",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "MS15-112",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-112"
},
{
"name": "1034112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034112"
},
{
"name": "MS15-112",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-112"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7057",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-7258",
"STATE": "PUBLIC"
},
@ -62,15 +62,15 @@
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Nov/48"
},
{
"name" : "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html"
},
{
"name": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html"
},
{
"name": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-7484",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983720",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983720"
},
{
"name": "ibm-relm-cve20157484-info-disc(108619)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/108619"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21983720",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983720"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-7957",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20151216 RCE in Zen Cart via Arbitrary File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/537129/100/0/threaded"
"name": "https://www.htbridge.com/advisory/HTB23282",
"refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23282"
},
{
"name": "39017",
@ -63,9 +63,9 @@
"url": "https://www.exploit-db.com/exploits/39017/"
},
{
"name" : "https://www.htbridge.com/advisory/HTB23282",
"refsource" : "MISC",
"url" : "https://www.htbridge.com/advisory/HTB23282"
"name": "20151216 RCE in Zen Cart via Arbitrary File Inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537129/100/0/threaded"
},
{
"name": "https://www.zen-cart.com/showthread.php?218914-Security-Patches-for-v1-5-4-November-2015",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://github.com/redmine/redmine/commit/8d8f612fa368a72c56b63f7ce6b7e98cab9feb22",
"refsource" : "CONFIRM",
"url" : "https://github.com/redmine/redmine/commit/8d8f612fa368a72c56b63f7ce6b7e98cab9feb22"
},
{
"name" : "https://www.redmine.org/issues/21136",
"refsource" : "CONFIRM",
"url" : "https://www.redmine.org/issues/21136"
"name": "78621",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/78621"
},
{
"name": "https://www.redmine.org/projects/redmine/wiki/Changelog_3_0",
@ -68,24 +63,29 @@
"url": "https://www.redmine.org/projects/redmine/wiki/Changelog_3_0"
},
{
"name" : "https://www.redmine.org/projects/redmine/wiki/Changelog_3_1",
"name": "https://www.redmine.org/issues/21136",
"refsource": "CONFIRM",
"url" : "https://www.redmine.org/projects/redmine/wiki/Changelog_3_1"
"url": "https://www.redmine.org/issues/21136"
},
{
"name": "https://www.redmine.org/versions/105",
"refsource": "CONFIRM",
"url": "https://www.redmine.org/versions/105"
},
{
"name": "https://www.redmine.org/projects/redmine/wiki/Changelog_3_1",
"refsource": "CONFIRM",
"url": "https://www.redmine.org/projects/redmine/wiki/Changelog_3_1"
},
{
"name": "DSA-3529",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3529"
},
{
"name" : "78621",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/78621"
"name": "https://github.com/redmine/redmine/commit/8d8f612fa368a72c56b63f7ce6b7e98cab9feb22",
"refsource": "CONFIRM",
"url": "https://github.com/redmine/redmine/commit/8d8f612fa368a72c56b63f7ce6b7e98cab9feb22"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-8650",
"STATE": "PUBLIC"
},
@ -53,69 +53,69 @@
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-651",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-651"
"name": "openSUSE-SU-2015:2403",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-01.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-01.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name" : "GLSA-201601-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201601-03"
"name": "1034544",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034544"
},
{
"name": "RHSA-2015:2697",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2697.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-01.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-01.html"
},
{
"name": "SUSE-SU-2015:2401",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "SUSE-SU-2015:2402",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html"
},
{
"name" : "openSUSE-SU-2015:2400",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html"
},
{
"name" : "openSUSE-SU-2015:2403",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html"
},
{
"name": "79701",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/79701"
},
{
"name" : "1034544",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034544"
"name": "openSUSE-SU-2015:2400",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html"
},
{
"name": "GLSA-201601-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-03"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-651",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-651"
}
]
}

View File

@ -57,16 +57,16 @@
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2015-59.html"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11876",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11876"
},
{
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=2290eba5cb25f927f9142680193ac1158d35506e",
"refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=2290eba5cb25f927f9142680193ac1158d35506e"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11876",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11876"
},
{
"name": "GLSA-201604-05",
"refsource": "GENTOO",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0154",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "MS16-037",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-037"
},
{
"name" : "MS16-038",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-038"
},
{
"name": "1035521",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035521"
},
{
"name": "MS16-037",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-037"
},
{
"name": "1035522",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035522"
},
{
"name": "MS16-038",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-038"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0199",
"STATE": "PUBLIC"
},
@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20160614 Microsoft Internet Explorer 11 Garbage Collector Attribute Type Confusion Vulnerability",
"refsource" : "IDEFENSE",
"url" : "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1226"
},
{
"name" : "20160617 CVE-2016-0199 / MS16-063: MSIE 11 garbage collector attribute type confusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/538706/100/0/threaded"
},
{
"name" : "39994",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39994/"
},
{
"name" : "20160618 CVE-2016-0199 / MS16-063: MSIE 11 garbage collector attribute type confusion",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Jun/44"
},
{
"name": "http://packetstormsecurity.com/files/137533/Microsoft-Internet-Explorer-11-Garbage-Collector-Attribute-Type-Confusion.html",
"refsource": "MISC",
@ -82,10 +62,30 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-063"
},
{
"name": "20160614 Microsoft Internet Explorer 11 Garbage Collector Attribute Type Confusion Vulnerability",
"refsource": "IDEFENSE",
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1226"
},
{
"name": "39994",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39994/"
},
{
"name": "20160617 CVE-2016-0199 / MS16-063: MSIE 11 garbage collector attribute type confusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/538706/100/0/threaded"
},
{
"name": "1036096",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036096"
},
{
"name": "20160618 CVE-2016-0199 / MS16-063: MSIE 11 garbage collector attribute type confusion",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Jun/44"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0638",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1160",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://wordpress.org/plugins/wp-favorite-posts/changelog/",
"refsource" : "CONFIRM",
"url" : "https://wordpress.org/plugins/wp-favorite-posts/changelog/"
"name": "JVNDB-2016-000034",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000034"
},
{
"name": "JVN#86517621",
@ -63,9 +63,9 @@
"url": "http://jvn.jp/en/jp/JVN86517621/index.html"
},
{
"name" : "JVNDB-2016-000034",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000034"
"name": "https://wordpress.org/plugins/wp-favorite-posts/changelog/",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/wp-favorite-posts/changelog/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1415",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "40509",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40509/"
},
{
"name": "20160831 Cisco WebEx Meetings Player Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-webex"
},
{
"name": "1036713",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036713"
},
{
"name": "92711",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92711"
},
{
"name" : "1036713",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036713"
"name": "40509",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40509/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2016-1705",
"STATE": "PUBLIC"
},
@ -52,6 +52,111 @@
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2016:1868",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
},
{
"name": "http://crbug.com/612939",
"refsource": "CONFIRM",
"url": "http://crbug.com/612939"
},
{
"name": "http://crbug.com/600953",
"refsource": "CONFIRM",
"url": "http://crbug.com/600953"
},
{
"name": "openSUSE-SU-2016:1869",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
},
{
"name": "http://crbug.com/614989",
"refsource": "CONFIRM",
"url": "http://crbug.com/614989"
},
{
"name": "92053",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92053"
},
{
"name": "http://crbug.com/613869",
"refsource": "CONFIRM",
"url": "http://crbug.com/613869"
},
{
"name": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
},
{
"name": "http://crbug.com/620737",
"refsource": "CONFIRM",
"url": "http://crbug.com/620737"
},
{
"name": "http://crbug.com/622522",
"refsource": "CONFIRM",
"url": "http://crbug.com/622522"
},
{
"name": "http://crbug.com/621843",
"refsource": "CONFIRM",
"url": "http://crbug.com/621843"
},
{
"name": "http://crbug.com/614701",
"refsource": "CONFIRM",
"url": "http://crbug.com/614701"
},
{
"name": "http://crbug.com/609286",
"refsource": "CONFIRM",
"url": "http://crbug.com/609286"
},
{
"name": "USN-3041-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3041-1"
},
{
"name": "http://crbug.com/619378",
"refsource": "CONFIRM",
"url": "http://crbug.com/619378"
},
{
"name": "openSUSE-SU-2016:1918",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
},
{
"name": "http://crbug.com/615820",
"refsource": "CONFIRM",
"url": "http://crbug.com/615820"
},
{
"name": "http://crbug.com/619382",
"refsource": "CONFIRM",
"url": "http://crbug.com/619382"
},
{
"name": "http://crbug.com/613971",
"refsource": "CONFIRM",
"url": "http://crbug.com/613971"
},
{
"name": "https://crbug.com/629852",
"refsource": "CONFIRM",
"url": "https://crbug.com/629852"
},
{
"name": "http://crbug.com/614405",
"refsource": "CONFIRM",
"url": "http://crbug.com/614405"
},
{
"name": "http://crbug.com/590619",
"refsource": "CONFIRM",
@ -63,79 +168,9 @@
"url": "http://crbug.com/599458"
},
{
"name" : "http://crbug.com/600953",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/600953"
},
{
"name" : "http://crbug.com/609286",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/609286"
},
{
"name" : "http://crbug.com/611959",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/611959"
},
{
"name" : "http://crbug.com/612939",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/612939"
},
{
"name" : "http://crbug.com/613869",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/613869"
},
{
"name" : "http://crbug.com/613971",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/613971"
},
{
"name" : "http://crbug.com/614405",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/614405"
},
{
"name" : "http://crbug.com/614701",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/614701"
},
{
"name" : "http://crbug.com/614989",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/614989"
},
{
"name" : "http://crbug.com/615820",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/615820"
},
{
"name" : "http://crbug.com/619378",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/619378"
},
{
"name" : "http://crbug.com/619382",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/619382"
},
{
"name" : "http://crbug.com/620694",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/620694"
},
{
"name" : "http://crbug.com/620737",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/620737"
},
{
"name" : "http://crbug.com/620858",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/620858"
"name": "openSUSE-SU-2016:1865",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
},
{
"name": "http://crbug.com/620952",
@ -143,29 +178,9 @@
"url": "http://crbug.com/620952"
},
{
"name" : "http://crbug.com/621843",
"name": "http://crbug.com/611959",
"refsource": "CONFIRM",
"url" : "http://crbug.com/621843"
},
{
"name" : "http://crbug.com/622522",
"refsource" : "CONFIRM",
"url" : "http://crbug.com/622522"
},
{
"name" : "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
},
{
"name" : "https://crbug.com/629852",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/629852"
},
{
"name" : "DSA-3637",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3637"
"url": "http://crbug.com/611959"
},
{
"name": "RHSA-2016:1485",
@ -173,39 +188,24 @@
"url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
},
{
"name" : "openSUSE-SU-2016:1865",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
},
{
"name" : "openSUSE-SU-2016:1868",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
},
{
"name" : "openSUSE-SU-2016:1869",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
},
{
"name" : "openSUSE-SU-2016:1918",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
},
{
"name" : "USN-3041-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3041-1"
},
{
"name" : "92053",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92053"
"name": "http://crbug.com/620694",
"refsource": "CONFIRM",
"url": "http://crbug.com/620694"
},
{
"name": "1036428",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036428"
},
{
"name": "DSA-3637",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3637"
},
{
"name": "http://crbug.com/620858",
"refsource": "CONFIRM",
"url": "http://crbug.com/620858"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1717",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT205729",
"name": "https://support.apple.com/HT206168",
"refsource": "CONFIRM",
"url" : "https://support.apple.com/HT205729"
"url": "https://support.apple.com/HT206168"
},
{
"name": "https://support.apple.com/HT205731",
@ -63,39 +63,39 @@
"url": "https://support.apple.com/HT205731"
},
{
"name" : "https://support.apple.com/HT205732",
"name": "https://support.apple.com/HT205729",
"refsource": "CONFIRM",
"url" : "https://support.apple.com/HT205732"
},
{
"name" : "https://support.apple.com/HT206168",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206168"
},
{
"name" : "APPLE-SA-2016-01-19-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html"
},
{
"name" : "APPLE-SA-2016-01-19-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html"
"url": "https://support.apple.com/HT205729"
},
{
"name": "APPLE-SA-2016-01-25-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00005.html"
},
{
"name": "1034736",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034736"
},
{
"name": "APPLE-SA-2016-01-19-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html"
},
{
"name": "APPLE-SA-2016-03-21-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html"
},
{
"name" : "1034736",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034736"
"name": "APPLE-SA-2016-01-19-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html"
},
{
"name": "https://support.apple.com/HT205732",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205732"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160118 Buffer Overflow in lha compression utility",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/01/18/3"
},
{
"name": "[oss-security] 20160118 Re: Buffer Overflow in lha compression utility",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/18/8"
},
{
"name": "[oss-security] 20160118 Buffer Overflow in lha compression utility",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/18/3"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#diff-37b0d289d6375ba4a7740401950ccdd6R199",
"refsource" : "CONFIRM",
"url" : "https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#diff-37b0d289d6375ba4a7740401950ccdd6R199"
},
{
"name": "92741",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92741"
},
{
"name": "https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#diff-37b0d289d6375ba4a7740401950ccdd6R199",
"refsource": "CONFIRM",
"url": "https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#diff-37b0d289d6375ba4a7740401950ccdd6R199"
}
]
}