mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
9f4d042e49
commit
4e25d28a01
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3182",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3182"
|
||||
},
|
||||
{
|
||||
"name": "31623",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/31623"
|
||||
},
|
||||
{
|
||||
"name" : "23901",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23901"
|
||||
"name": "3182",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3182"
|
||||
},
|
||||
{
|
||||
"name": "sami-http-request-dos(31690)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31690"
|
||||
},
|
||||
{
|
||||
"name": "23901",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23901"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "22501",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22501"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-0665",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0665"
|
||||
},
|
||||
{
|
||||
"name": "38134",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38134"
|
||||
},
|
||||
{
|
||||
"name": "22501",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22501"
|
||||
},
|
||||
{
|
||||
"name": "smidgeonsoft-files-bo(32524)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32524"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0665",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0665"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070208 TFTP directory traversal in Kiwi CatTools",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/459500/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070213 Re: TFTP directory traversal in Kiwi CatTools",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/459933/100/0/threaded"
|
||||
"name": "33162",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/33162"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kiwisyslog.com/kb/idx/5/178/article/",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://www.kiwisyslog.com/kb/idx/5/178/article/"
|
||||
},
|
||||
{
|
||||
"name" : "22490",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22490"
|
||||
"name": "kiwicattools-tftp-directory-traversal(32398)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32398"
|
||||
},
|
||||
{
|
||||
"name": "20070208 TFTP directory traversal in Kiwi CatTools",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/459500/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0536",
|
||||
@ -78,14 +78,14 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0536"
|
||||
},
|
||||
{
|
||||
"name" : "33162",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/33162"
|
||||
"name": "22490",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22490"
|
||||
},
|
||||
{
|
||||
"name" : "24103",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24103"
|
||||
"name": "20070213 Re: TFTP directory traversal in Kiwi CatTools",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/459933/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "2236",
|
||||
@ -93,9 +93,9 @@
|
||||
"url": "http://securityreason.com/securityalert/2236"
|
||||
},
|
||||
{
|
||||
"name" : "kiwicattools-tftp-directory-traversal(32398)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32398"
|
||||
"name": "24103",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24103"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070210 Virtual Calendar <= (pwd.txt) Remote Password Disclosur Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/459844/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "33183",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/33183"
|
||||
"name": "2240",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2240"
|
||||
},
|
||||
{
|
||||
"name": "24125",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://secunia.com/advisories/24125"
|
||||
},
|
||||
{
|
||||
"name" : "2240",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/2240"
|
||||
"name": "33183",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33183"
|
||||
},
|
||||
{
|
||||
"name": "20070210 Virtual Calendar <= (pwd.txt) Remote Password Disclosur Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/459844/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "virtualcalendar-pwd-information-disclosure(32446)",
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070630 WheatBlog 1.1 RFI/SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/472575/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "24715",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24715"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2405",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2405"
|
||||
},
|
||||
{
|
||||
"name" : "37063",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37063"
|
||||
},
|
||||
{
|
||||
"name" : "25903",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25903"
|
||||
},
|
||||
{
|
||||
"name": "2856",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2856"
|
||||
},
|
||||
{
|
||||
"name": "20070630 WheatBlog 1.1 RFI/SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/472575/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "25903",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25903"
|
||||
},
|
||||
{
|
||||
"name": "24715",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24715"
|
||||
},
|
||||
{
|
||||
"name": "wheatblog-login-sql-injection(35211)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35211"
|
||||
},
|
||||
{
|
||||
"name": "37063",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37063"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "20070723 [CVE 2007-3816] [Advisory] Vulnerability Facts Related JWIG Advisory",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2007/Jul/0446.html"
|
||||
},
|
||||
{
|
||||
"name": "jwig-externaltemplate-dos(35515)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35515"
|
||||
},
|
||||
{
|
||||
"name": "20070716 WhitePapers By SecNiche Security",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/473707/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070721 [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://seclists.org/bugtraq/2007/Jul/0206.html"
|
||||
},
|
||||
{
|
||||
"name" : "20070721 Re: [WEB SECURITY] [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/474474/100/200/threaded"
|
||||
"name": "http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf"
|
||||
},
|
||||
{
|
||||
"name": "20070721 [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
|
||||
@ -73,9 +78,24 @@
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064768.html"
|
||||
},
|
||||
{
|
||||
"name" : "20070723 [CVE 2007-3816] [Advisory] Vulnerability Facts Related JWIG Advisory",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2007/Jul/0446.html"
|
||||
"name": "1018432",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018432"
|
||||
},
|
||||
{
|
||||
"name": "20070721 Re: [WEB SECURITY] [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/474474/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "24974",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24974"
|
||||
},
|
||||
{
|
||||
"name": "20070721 [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://seclists.org/bugtraq/2007/Jul/0206.html"
|
||||
},
|
||||
{
|
||||
"name": "20070722 Re: [CVE 2007-3816] [Advisory] Vulnerability Facts Related JWIG Advisory",
|
||||
@ -86,26 +106,6 @@
|
||||
"name": "20070726 [CVE 2007-3816] [Advisory] Vulnerability Facts Related JWIG Advisory",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064933.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "24974",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24974"
|
||||
},
|
||||
{
|
||||
"name" : "1018432",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018432"
|
||||
},
|
||||
{
|
||||
"name" : "jwig-externaltemplate-dos(35515)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35515"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://pridels-team.blogspot.com/2007/08/openrat-vuln.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://pridels-team.blogspot.com/2007/08/openrat-vuln.html"
|
||||
},
|
||||
{
|
||||
"name": "39047",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/39047"
|
||||
},
|
||||
{
|
||||
"name": "http://pridels-team.blogspot.com/2007/08/openrat-vuln.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://pridels-team.blogspot.com/2007/08/openrat-vuln.html"
|
||||
},
|
||||
{
|
||||
"name": "openrat-index-path-disclosure(35750)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,150 +52,150 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://docs.info.apple.com/article.html?artnum=307177",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://docs.info.apple.com/article.html?artnum=307177"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2007-12-14",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "BEA07-177.00",
|
||||
"refsource" : "BEA",
|
||||
"url" : "http://dev2dev.bea.com/pub/advisory/248"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200709-15",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0956",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:1086",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1086.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0132",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0132.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0100",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0100.html"
|
||||
},
|
||||
{
|
||||
"name" : "103024",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103024-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2008:025",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name" : "25340",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25340"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10290",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10290"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3009",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3009"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2910",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2910"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-4224",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/4224"
|
||||
},
|
||||
{
|
||||
"name" : "1018576",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018576"
|
||||
},
|
||||
{
|
||||
"name" : "26631",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26631"
|
||||
},
|
||||
{
|
||||
"name": "26933",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26933"
|
||||
},
|
||||
{
|
||||
"name": "http://docs.info.apple.com/article.html?artnum=307177",
|
||||
"refsource": "MISC",
|
||||
"url": "http://docs.info.apple.com/article.html?artnum=307177"
|
||||
},
|
||||
{
|
||||
"name": "26402",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26402"
|
||||
},
|
||||
{
|
||||
"name" : "27203",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27203"
|
||||
"name": "BEA07-177.00",
|
||||
"refsource": "BEA",
|
||||
"url": "http://dev2dev.bea.com/pub/advisory/248"
|
||||
},
|
||||
{
|
||||
"name" : "27716",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27716"
|
||||
},
|
||||
{
|
||||
"name" : "28056",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28056"
|
||||
},
|
||||
{
|
||||
"name" : "28115",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28115"
|
||||
},
|
||||
{
|
||||
"name" : "28777",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28777"
|
||||
},
|
||||
{
|
||||
"name" : "28880",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28880"
|
||||
},
|
||||
{
|
||||
"name" : "29340",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29340"
|
||||
"name": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html"
|
||||
},
|
||||
{
|
||||
"name": "29897",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29897"
|
||||
},
|
||||
{
|
||||
"name": "103024",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103024-1"
|
||||
},
|
||||
{
|
||||
"name": "28056",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28056"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2007-12-14",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0100",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0100.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10290",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10290"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2910",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2910"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2008:025",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0956",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
|
||||
},
|
||||
{
|
||||
"name": "sun-java-font-privilege-escalation(36061)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36061"
|
||||
},
|
||||
{
|
||||
"name": "1018576",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018576"
|
||||
},
|
||||
{
|
||||
"name": "28777",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28777"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-4224",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/4224"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3009",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3009"
|
||||
},
|
||||
{
|
||||
"name": "28880",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28880"
|
||||
},
|
||||
{
|
||||
"name": "27716",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27716"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200709-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml"
|
||||
},
|
||||
{
|
||||
"name": "28115",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28115"
|
||||
},
|
||||
{
|
||||
"name": "29340",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29340"
|
||||
},
|
||||
{
|
||||
"name": "25340",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25340"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:1086",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-1086.html"
|
||||
},
|
||||
{
|
||||
"name": "27203",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27203"
|
||||
},
|
||||
{
|
||||
"name": "26631",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26631"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "phpress-adisplay-file-include(36219)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36219"
|
||||
},
|
||||
{
|
||||
"name": "3055",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3055"
|
||||
},
|
||||
{
|
||||
"name": "20070822 phpress 0.2.0 (adisplay.php) Remote File Inclusion",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -62,25 +72,15 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4382"
|
||||
},
|
||||
{
|
||||
"name" : "25415",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25415"
|
||||
},
|
||||
{
|
||||
"name": "38351",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38351"
|
||||
},
|
||||
{
|
||||
"name" : "3055",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3055"
|
||||
},
|
||||
{
|
||||
"name" : "phpress-adisplay-file-include(36219)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36219"
|
||||
"name": "25415",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25415"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "BEA07-134.00",
|
||||
"refsource" : "BEA",
|
||||
"url" : "http://dev2dev.bea.com/pub/advisory/201"
|
||||
},
|
||||
{
|
||||
"name": "22082",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22082"
|
||||
},
|
||||
{
|
||||
"name": "BEA07-134.00",
|
||||
"refsource": "BEA",
|
||||
"url": "http://dev2dev.bea.com/pub/advisory/201"
|
||||
},
|
||||
{
|
||||
"name": "45838",
|
||||
"refsource": "OSVDB",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2014-5398",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-5699",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#956233",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/956233"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#956233",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/956233"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150228 Re: CVE request: pngcrush 1.7.83 crash bug (most likely exploitable)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/03/01/1"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1198171",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1198171"
|
||||
},
|
||||
{
|
||||
"name": "https://sourceforge.net/p/pmt/news/2015/02/pngcrush-1784-released/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "72830",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72830"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150228 Re: CVE request: pngcrush 1.7.83 crash bug (most likely exploitable)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/03/01/1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1198171",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198171"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html"
|
||||
"name": "1032529",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032529"
|
||||
},
|
||||
{
|
||||
"name": "75095",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/75095"
|
||||
},
|
||||
{
|
||||
"name" : "1032529",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032529"
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html"
|
||||
},
|
||||
{
|
||||
"name": "1032530",
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/534935/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "20150319 Citrix NITRO SDK xen_hotfix page is vulnerable to Cross-Site Scripting",
|
||||
"refsource": "FULLDISC",
|
||||
@ -67,11 +72,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/130931/Citrix-NITRO-SDK-xen_hotfix-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "73311",
|
||||
"refsource": "BID",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-6182",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-6278",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-6305",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1033643",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033643"
|
||||
},
|
||||
{
|
||||
"name": "38289",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -62,6 +67,11 @@
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Sep/80"
|
||||
},
|
||||
{
|
||||
"name": "20150922 Cisco AnyConnect Secure Mobility Client for Windows Privilege Escalation Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41136"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/google-security-research/issues/detail?id=460",
|
||||
"refsource": "MISC",
|
||||
@ -71,16 +81,6 @@
|
||||
"name": "http://packetstormsecurity.com/files/133876/Cisco-AnyConnect-Secure-Mobility-Client-3.1.08009-Privilege-Elevation.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/133876/Cisco-AnyConnect-Secure-Mobility-Client-3.1.08009-Privilege-Elevation.html"
|
||||
},
|
||||
{
|
||||
"name" : "20150922 Cisco AnyConnect Secure Mobility Client for Windows Privilege Escalation Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=41136"
|
||||
},
|
||||
{
|
||||
"name" : "1033643",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033643"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-6375",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20151120 Cisco Networking Services Sensitive Information Disclosure Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151120-ns"
|
||||
},
|
||||
{
|
||||
"name": "77676",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/77676"
|
||||
},
|
||||
{
|
||||
"name": "20151120 Cisco Networking Services Sensitive Information Disclosure Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151120-ns"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"ID": "CVE-2015-6832",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "DSA-3344",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3344"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php.net/ChangeLog-5.php",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.php.net/bug.php?id=70068"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3344",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3344"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201606-10",
|
||||
"refsource": "GENTOO",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2015-7651",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-556",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-556"
|
||||
},
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201511-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201511-02"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:2023",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
|
||||
"name": "1034111",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034111"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:2024",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1984",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201511-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201511-02"
|
||||
},
|
||||
{
|
||||
"name": "77533",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/77533"
|
||||
},
|
||||
{
|
||||
"name" : "1034111",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1034111"
|
||||
"name": "RHSA-2015:2023",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-556",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-556"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2016/Jan/95"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/135461/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/135461/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Scripting.html"
|
||||
"name": "http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf"
|
||||
},
|
||||
{
|
||||
"name": "https://profundis-labs.com/advisories/CVE-2015-7679.txt",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "https://profundis-labs.com/advisories/CVE-2015-7679.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf"
|
||||
"name": "http://packetstormsecurity.com/files/135461/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/135461/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Scripting.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21981103",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21981103"
|
||||
},
|
||||
{
|
||||
"name": "ibm-curam-cve20160261-xss(110604)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/110604"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21981103",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21981103"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-0581",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-0696",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1379",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1437",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160621 Cisco Prime Collaboration Deployment SQL Injection Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160621-pcd"
|
||||
},
|
||||
{
|
||||
"name": "1036151",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036151"
|
||||
},
|
||||
{
|
||||
"name": "20160621 Cisco Prime Collaboration Deployment SQL Injection Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160621-pcd"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2016-4328",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2016-4331",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,9 +58,9 @@
|
||||
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0177/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3727",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3727"
|
||||
"name": "94411",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94411"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-13",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "https://security.gentoo.org/glsa/201701-13"
|
||||
},
|
||||
{
|
||||
"name" : "94411",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94411"
|
||||
"name": "DSA-3727",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3727"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05325823",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05325823"
|
||||
},
|
||||
{
|
||||
"name": "94195",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94195"
|
||||
},
|
||||
{
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05325823",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05325823"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,54 +53,54 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206902",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206902"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206903",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206903"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206904",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206904"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206905",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206905"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-07-18-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-07-18-2",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-07-18-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
|
||||
"name": "1036344",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036344"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-07-18-4",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-07-18-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-07-18-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "91834",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91834"
|
||||
},
|
||||
{
|
||||
"name" : "1036344",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036344"
|
||||
"name": "APPLE-SA-2016-07-18-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206905",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206905"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206903",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206903"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206902",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206902"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206904",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206904"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207275",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207275"
|
||||
"name": "1037086",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037086"
|
||||
},
|
||||
{
|
||||
"name": "93852",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/93852"
|
||||
},
|
||||
{
|
||||
"name" : "1037086",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1037086"
|
||||
"name": "https://support.apple.com/HT207275",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207275"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user