"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:17:02 +00:00
parent 9f4d042e49
commit 4e25d28a01
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
62 changed files with 3436 additions and 3436 deletions

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "3182",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3182"
},
{
"name": "31623",
"refsource": "OSVDB",
"url": "http://osvdb.org/31623"
},
{
"name" : "23901",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23901"
"name": "3182",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3182"
},
{
"name": "sami-http-request-dos(31690)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31690"
},
{
"name": "23901",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23901"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "22501",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22501"
},
{
"name" : "ADV-2007-0665",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0665"
},
{
"name": "38134",
"refsource": "OSVDB",
"url": "http://osvdb.org/38134"
},
{
"name": "22501",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22501"
},
{
"name": "smidgeonsoft-files-bo(32524)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32524"
},
{
"name": "ADV-2007-0665",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0665"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070208 TFTP directory traversal in Kiwi CatTools",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/459500/100/0/threaded"
},
{
"name" : "20070213 Re: TFTP directory traversal in Kiwi CatTools",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/459933/100/0/threaded"
"name": "33162",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/33162"
},
{
"name": "http://www.kiwisyslog.com/kb/idx/5/178/article/",
@ -68,9 +63,14 @@
"url": "http://www.kiwisyslog.com/kb/idx/5/178/article/"
},
{
"name" : "22490",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22490"
"name": "kiwicattools-tftp-directory-traversal(32398)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32398"
},
{
"name": "20070208 TFTP directory traversal in Kiwi CatTools",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459500/100/0/threaded"
},
{
"name": "ADV-2007-0536",
@ -78,14 +78,14 @@
"url": "http://www.vupen.com/english/advisories/2007/0536"
},
{
"name" : "33162",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/33162"
"name": "22490",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22490"
},
{
"name" : "24103",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24103"
"name": "20070213 Re: TFTP directory traversal in Kiwi CatTools",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459933/100/0/threaded"
},
{
"name": "2236",
@ -93,9 +93,9 @@
"url": "http://securityreason.com/securityalert/2236"
},
{
"name" : "kiwicattools-tftp-directory-traversal(32398)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32398"
"name": "24103",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24103"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070210 Virtual Calendar <= (pwd.txt) Remote Password Disclosur Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/459844/100/0/threaded"
},
{
"name" : "33183",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33183"
"name": "2240",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2240"
},
{
"name": "24125",
@ -68,9 +63,14 @@
"url": "http://secunia.com/advisories/24125"
},
{
"name" : "2240",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2240"
"name": "33183",
"refsource": "OSVDB",
"url": "http://osvdb.org/33183"
},
{
"name": "20070210 Virtual Calendar <= (pwd.txt) Remote Password Disclosur Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459844/100/0/threaded"
},
{
"name": "virtualcalendar-pwd-information-disclosure(32446)",

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "20070630 WheatBlog 1.1 RFI/SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/472575/100/0/threaded"
},
{
"name" : "24715",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24715"
},
{
"name": "ADV-2007-2405",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2405"
},
{
"name" : "37063",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37063"
},
{
"name" : "25903",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25903"
},
{
"name": "2856",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2856"
},
{
"name": "20070630 WheatBlog 1.1 RFI/SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/472575/100/0/threaded"
},
{
"name": "25903",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25903"
},
{
"name": "24715",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24715"
},
{
"name": "wheatblog-login-sql-injection(35211)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35211"
},
{
"name": "37063",
"refsource": "OSVDB",
"url": "http://osvdb.org/37063"
}
]
}

View File

@ -52,20 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "20070723 [CVE 2007-3816] [Advisory] Vulnerability Facts Related JWIG Advisory",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Jul/0446.html"
},
{
"name": "jwig-externaltemplate-dos(35515)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35515"
},
{
"name": "20070716 WhitePapers By SecNiche Security",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/473707/100/0/threaded"
},
{
"name" : "20070721 [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
"refsource" : "BUGTRAQ",
"url" : "http://seclists.org/bugtraq/2007/Jul/0206.html"
},
{
"name" : "20070721 Re: [WEB SECURITY] [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/474474/100/200/threaded"
"name": "http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf",
"refsource": "MISC",
"url": "http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf"
},
{
"name": "20070721 [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
@ -73,9 +78,24 @@
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064768.html"
},
{
"name" : "20070723 [CVE 2007-3816] [Advisory] Vulnerability Facts Related JWIG Advisory",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2007/Jul/0446.html"
"name": "1018432",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018432"
},
{
"name": "20070721 Re: [WEB SECURITY] [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474474/100/200/threaded"
},
{
"name": "24974",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24974"
},
{
"name": "20070721 [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2007/Jul/0206.html"
},
{
"name": "20070722 Re: [CVE 2007-3816] [Advisory] Vulnerability Facts Related JWIG Advisory",
@ -86,26 +106,6 @@
"name": "20070726 [CVE 2007-3816] [Advisory] Vulnerability Facts Related JWIG Advisory",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064933.html"
},
{
"name" : "http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf",
"refsource" : "MISC",
"url" : "http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf"
},
{
"name" : "24974",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24974"
},
{
"name" : "1018432",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018432"
},
{
"name" : "jwig-externaltemplate-dos(35515)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35515"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://pridels-team.blogspot.com/2007/08/openrat-vuln.html",
"refsource" : "MISC",
"url" : "http://pridels-team.blogspot.com/2007/08/openrat-vuln.html"
},
{
"name": "39047",
"refsource": "OSVDB",
"url": "http://osvdb.org/39047"
},
{
"name": "http://pridels-team.blogspot.com/2007/08/openrat-vuln.html",
"refsource": "MISC",
"url": "http://pridels-team.blogspot.com/2007/08/openrat-vuln.html"
},
{
"name": "openrat-index-path-disclosure(35750)",
"refsource": "XF",

View File

@ -52,150 +52,150 @@
},
"references": {
"reference_data": [
{
"name" : "http://docs.info.apple.com/article.html?artnum=307177",
"refsource" : "MISC",
"url" : "http://docs.info.apple.com/article.html?artnum=307177"
},
{
"name" : "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html"
},
{
"name" : "APPLE-SA-2007-12-14",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
},
{
"name" : "BEA07-177.00",
"refsource" : "BEA",
"url" : "http://dev2dev.bea.com/pub/advisory/248"
},
{
"name" : "GLSA-200709-15",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml"
},
{
"name" : "RHSA-2007:0956",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
},
{
"name" : "RHSA-2007:1086",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1086.html"
},
{
"name": "RHSA-2008:0132",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0132.html"
},
{
"name" : "RHSA-2008:0100",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0100.html"
},
{
"name" : "103024",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103024-1"
},
{
"name" : "SUSE-SA:2008:025",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html"
},
{
"name" : "25340",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25340"
},
{
"name" : "oval:org.mitre.oval:def:10290",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10290"
},
{
"name" : "ADV-2007-3009",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3009"
},
{
"name" : "ADV-2007-2910",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2910"
},
{
"name" : "ADV-2007-4224",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/4224"
},
{
"name" : "1018576",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018576"
},
{
"name" : "26631",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26631"
},
{
"name": "26933",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26933"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307177",
"refsource": "MISC",
"url": "http://docs.info.apple.com/article.html?artnum=307177"
},
{
"name": "26402",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26402"
},
{
"name" : "27203",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27203"
"name": "BEA07-177.00",
"refsource": "BEA",
"url": "http://dev2dev.bea.com/pub/advisory/248"
},
{
"name" : "27716",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27716"
},
{
"name" : "28056",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28056"
},
{
"name" : "28115",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28115"
},
{
"name" : "28777",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28777"
},
{
"name" : "28880",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28880"
},
{
"name" : "29340",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29340"
"name": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html"
},
{
"name": "29897",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29897"
},
{
"name": "103024",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103024-1"
},
{
"name": "28056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28056"
},
{
"name": "APPLE-SA-2007-12-14",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
},
{
"name": "RHSA-2008:0100",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0100.html"
},
{
"name": "oval:org.mitre.oval:def:10290",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10290"
},
{
"name": "ADV-2007-2910",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2910"
},
{
"name": "SUSE-SA:2008:025",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html"
},
{
"name": "RHSA-2007:0956",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
},
{
"name": "sun-java-font-privilege-escalation(36061)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36061"
},
{
"name": "1018576",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018576"
},
{
"name": "28777",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28777"
},
{
"name": "ADV-2007-4224",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4224"
},
{
"name": "ADV-2007-3009",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3009"
},
{
"name": "28880",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28880"
},
{
"name": "27716",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27716"
},
{
"name": "GLSA-200709-15",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml"
},
{
"name": "28115",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28115"
},
{
"name": "29340",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29340"
},
{
"name": "25340",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25340"
},
{
"name": "RHSA-2007:1086",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1086.html"
},
{
"name": "27203",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27203"
},
{
"name": "26631",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26631"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "phpress-adisplay-file-include(36219)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36219"
},
{
"name": "3055",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3055"
},
{
"name": "20070822 phpress 0.2.0 (adisplay.php) Remote File Inclusion",
"refsource": "BUGTRAQ",
@ -62,25 +72,15 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4382"
},
{
"name" : "25415",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25415"
},
{
"name": "38351",
"refsource": "OSVDB",
"url": "http://osvdb.org/38351"
},
{
"name" : "3055",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3055"
},
{
"name" : "phpress-adisplay-file-include(36219)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36219"
"name": "25415",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25415"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "BEA07-134.00",
"refsource" : "BEA",
"url" : "http://dev2dev.bea.com/pub/advisory/201"
},
{
"name": "22082",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22082"
},
{
"name": "BEA07-134.00",
"refsource": "BEA",
"url": "http://dev2dev.bea.com/pub/advisory/201"
},
{
"name": "45838",
"refsource": "OSVDB",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-5398",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5699",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#956233",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/956233"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#956233",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/956233"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150228 Re: CVE request: pngcrush 1.7.83 crash bug (most likely exploitable)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/03/01/1"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1198171",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1198171"
},
{
"name": "https://sourceforge.net/p/pmt/news/2015/02/pngcrush-1784-released/",
"refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "72830",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72830"
},
{
"name": "[oss-security] 20150228 Re: CVE request: pngcrush 1.7.83 crash bug (most likely exploitable)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/03/01/1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1198171",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198171"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html"
"name": "1032529",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032529"
},
{
"name": "75095",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/75095"
},
{
"name" : "1032529",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032529"
"name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html"
},
{
"name": "1032530",

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534935/100/0/threaded"
},
{
"name": "https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html",
"refsource": "MISC",
"url": "https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html"
},
{
"name": "20150319 Citrix NITRO SDK xen_hotfix page is vulnerable to Cross-Site Scripting",
"refsource": "FULLDISC",
@ -67,11 +72,6 @@
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/130931/Citrix-NITRO-SDK-xen_hotfix-Cross-Site-Scripting.html"
},
{
"name" : "https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html",
"refsource" : "MISC",
"url" : "https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html"
},
{
"name": "73311",
"refsource": "BID",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6182",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6278",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6305",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1033643",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033643"
},
{
"name": "38289",
"refsource": "EXPLOIT-DB",
@ -62,6 +67,11 @@
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Sep/80"
},
{
"name": "20150922 Cisco AnyConnect Secure Mobility Client for Windows Privilege Escalation Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41136"
},
{
"name": "https://code.google.com/p/google-security-research/issues/detail?id=460",
"refsource": "MISC",
@ -71,16 +81,6 @@
"name": "http://packetstormsecurity.com/files/133876/Cisco-AnyConnect-Secure-Mobility-Client-3.1.08009-Privilege-Elevation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133876/Cisco-AnyConnect-Secure-Mobility-Client-3.1.08009-Privilege-Elevation.html"
},
{
"name" : "20150922 Cisco AnyConnect Secure Mobility Client for Windows Privilege Escalation Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=41136"
},
{
"name" : "1033643",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033643"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6375",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20151120 Cisco Networking Services Sensitive Information Disclosure Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151120-ns"
},
{
"name": "77676",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77676"
},
{
"name": "20151120 Cisco Networking Services Sensitive Information Disclosure Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151120-ns"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@suse.com",
"ID": "CVE-2015-6832",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "DSA-3344",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3344"
},
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=70068"
},
{
"name" : "DSA-3344",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3344"
},
{
"name": "GLSA-201606-10",
"refsource": "GENTOO",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-7651",
"STATE": "PUBLIC"
},
@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-556",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-556"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
},
{
"name" : "GLSA-201511-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201511-02"
},
{
"name" : "RHSA-2015:2023",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
"name": "1034111",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034111"
},
{
"name": "RHSA-2015:2024",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
},
{
"name": "openSUSE-SU-2015:1984",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"
},
{
"name": "GLSA-201511-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201511-02"
},
{
"name": "77533",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77533"
},
{
"name" : "1034111",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034111"
"name": "RHSA-2015:2023",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-556",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-556"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "http://seclists.org/fulldisclosure/2016/Jan/95"
},
{
"name" : "http://packetstormsecurity.com/files/135461/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/135461/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Scripting.html"
"name": "http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf",
"refsource": "CONFIRM",
"url": "http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf"
},
{
"name": "https://profundis-labs.com/advisories/CVE-2015-7679.txt",
@ -68,9 +68,9 @@
"url": "https://profundis-labs.com/advisories/CVE-2015-7679.txt"
},
{
"name" : "http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf",
"refsource" : "CONFIRM",
"url" : "http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf"
"name": "http://packetstormsecurity.com/files/135461/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135461/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Scripting.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21981103",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21981103"
},
{
"name": "ibm-curam-cve20160261-xss(110604)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/110604"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21981103",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21981103"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0581",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0696",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1379",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1437",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20160621 Cisco Prime Collaboration Deployment SQL Injection Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160621-pcd"
},
{
"name": "1036151",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036151"
},
{
"name": "20160621 Cisco Prime Collaboration Deployment SQL Injection Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160621-pcd"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2016-4328",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2016-4331",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0177/"
},
{
"name" : "DSA-3727",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3727"
"name": "94411",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94411"
},
{
"name": "GLSA-201701-13",
@ -68,9 +68,9 @@
"url": "https://security.gentoo.org/glsa/201701-13"
},
{
"name" : "94411",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94411"
"name": "DSA-3727",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3727"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05325823",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05325823"
},
{
"name": "94195",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94195"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05325823",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05325823"
}
]
}

View File

@ -53,54 +53,54 @@
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT206902",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206902"
},
{
"name" : "https://support.apple.com/HT206903",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206903"
},
{
"name" : "https://support.apple.com/HT206904",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206904"
},
{
"name" : "https://support.apple.com/HT206905",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206905"
},
{
"name" : "APPLE-SA-2016-07-18-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name" : "APPLE-SA-2016-07-18-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
},
{
"name" : "APPLE-SA-2016-07-18-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
"name": "1036344",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036344"
},
{
"name": "APPLE-SA-2016-07-18-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
},
{
"name": "APPLE-SA-2016-07-18-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
},
{
"name": "APPLE-SA-2016-07-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
},
{
"name": "91834",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91834"
},
{
"name" : "1036344",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036344"
"name": "APPLE-SA-2016-07-18-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name": "https://support.apple.com/HT206905",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206905"
},
{
"name": "https://support.apple.com/HT206903",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206903"
},
{
"name": "https://support.apple.com/HT206902",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206902"
},
{
"name": "https://support.apple.com/HT206904",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206904"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT207275",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207275"
"name": "1037086",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037086"
},
{
"name": "93852",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/93852"
},
{
"name" : "1037086",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037086"
"name": "https://support.apple.com/HT207275",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207275"
}
]
}