mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
2e4b426fc3
commit
5af7f5468b
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "syntaxcms-admin-file-include(29122)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29122"
|
||||
},
|
||||
{
|
||||
"name": "1016914",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016914"
|
||||
},
|
||||
{
|
||||
"name": "20060924 Remote File Include in syntaxCMS",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://marc.info/?l=full-disclosure&m=115913461828660&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.syntaxcms.org/content/article/detail/513",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.syntaxcms.org/content/article/detail/513"
|
||||
},
|
||||
{
|
||||
"name": "2424",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -78,14 +83,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3760"
|
||||
},
|
||||
{
|
||||
"name" : "1016914",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016914"
|
||||
},
|
||||
{
|
||||
"name" : "syntaxcms-admin-file-include(29122)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29122"
|
||||
"name": "http://www.syntaxcms.org/content/article/detail/513",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.syntaxcms.org/content/article/detail/513"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "mxbbfaqrules-faq-file-include(34008)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34008"
|
||||
},
|
||||
{
|
||||
"name": "37613",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37613"
|
||||
},
|
||||
{
|
||||
"name": "3833",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -66,16 +76,6 @@
|
||||
"name": "ADV-2007-1631",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1631"
|
||||
},
|
||||
{
|
||||
"name" : "37613",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37613"
|
||||
},
|
||||
{
|
||||
"name" : "mxbbfaqrules-faq-file-include(34008)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34008"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,21 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3924"
|
||||
},
|
||||
{
|
||||
"name": "geeklogmedia-ftpmedia-file-include(34294)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34294"
|
||||
},
|
||||
{
|
||||
"name": "25272",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25272"
|
||||
},
|
||||
{
|
||||
"name": "36239",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36239"
|
||||
},
|
||||
{
|
||||
"name": "23983",
|
||||
"refsource": "BID",
|
||||
@ -66,21 +81,6 @@
|
||||
"name": "ADV-2007-1827",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1827"
|
||||
},
|
||||
{
|
||||
"name" : "36239",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36239"
|
||||
},
|
||||
{
|
||||
"name" : "25272",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25272"
|
||||
},
|
||||
{
|
||||
"name" : "geeklogmedia-ftpmedia-file-include(34294)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34294"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2007-3029",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,21 +57,16 @@
|
||||
"refsource": "HP",
|
||||
"url": "http://archive.cert.uni-stuttgart.de/bugtraq/2007/07/msg00254.html"
|
||||
},
|
||||
{
|
||||
"name": "1018352",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018352"
|
||||
},
|
||||
{
|
||||
"name": "MS07-036",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-036"
|
||||
},
|
||||
{
|
||||
"name" : "TA07-191A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-191A.html"
|
||||
},
|
||||
{
|
||||
"name" : "22555",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22555"
|
||||
},
|
||||
{
|
||||
"name": "35958",
|
||||
"refsource": "OSVDB",
|
||||
@ -83,14 +78,14 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2478"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:2029",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2029"
|
||||
"name": "excel-active-worksheet-code-execution(35215)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35215"
|
||||
},
|
||||
{
|
||||
"name" : "1018352",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018352"
|
||||
"name": "22555",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22555"
|
||||
},
|
||||
{
|
||||
"name": "25995",
|
||||
@ -98,9 +93,14 @@
|
||||
"url": "http://secunia.com/advisories/25995"
|
||||
},
|
||||
{
|
||||
"name" : "excel-active-worksheet-code-execution(35215)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35215"
|
||||
"name": "TA07-191A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-191A.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:2029",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2029"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "sendcard-sclanguage-file-include(34697)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34697"
|
||||
},
|
||||
{
|
||||
"name": "4029",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4029"
|
||||
},
|
||||
{
|
||||
"name" : "24308",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24308"
|
||||
},
|
||||
{
|
||||
"name": "35741",
|
||||
"refsource": "OSVDB",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2058"
|
||||
},
|
||||
{
|
||||
"name" : "sendcard-sclanguage-file-include(34697)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34697"
|
||||
"name": "24308",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24308"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,25 +53,25 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070708 CodeIgniter 1.5.3 vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/473190/100/0/threaded"
|
||||
"name": "25991",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25991"
|
||||
},
|
||||
{
|
||||
"name": "20070709 CodeIgniter 1.5.3 vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064500.html"
|
||||
},
|
||||
{
|
||||
"name": "20070708 CodeIgniter 1.5.3 vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/473190/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "37905",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37905"
|
||||
},
|
||||
{
|
||||
"name" : "25991",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25991"
|
||||
},
|
||||
{
|
||||
"name": "2877",
|
||||
"refsource": "SREASON",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070711 Powered By Dvbbs Version 7.1.0 Sp1 By Pass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/473374/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "39747",
|
||||
"refsource": "OSVDB",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "2886",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2886"
|
||||
},
|
||||
{
|
||||
"name": "20070711 Powered By Dvbbs Version 7.1.0 Sp1 By Pass",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/473374/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.xs-sniper.com/nmcfeters/Cross-App-Scripting-2.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.xs-sniper.com/nmcfeters/Cross-App-Scripting-2.html"
|
||||
},
|
||||
{
|
||||
"name" : "24927",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24927"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2546",
|
||||
"refsource": "VUPEN",
|
||||
@ -72,6 +62,16 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26086"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xs-sniper.com/nmcfeters/Cross-App-Scripting-2.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.xs-sniper.com/nmcfeters/Cross-App-Scripting-2.html"
|
||||
},
|
||||
{
|
||||
"name": "24927",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24927"
|
||||
},
|
||||
{
|
||||
"name": "trillian-aim-file-create(35449)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,24 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070718 Oracle Security: SQL Injection in package DBMS_PRVTAQIS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/474000"
|
||||
"name": "SSRT061201",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html"
|
||||
"name": "26114",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26114"
|
||||
},
|
||||
{
|
||||
"name": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html",
|
||||
@ -78,14 +68,14 @@
|
||||
"url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMA02133",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143"
|
||||
"name": "26166",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26166"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061201",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html"
|
||||
},
|
||||
{
|
||||
"name": "TA07-200A",
|
||||
@ -103,24 +93,34 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2635"
|
||||
},
|
||||
{
|
||||
"name" : "1018415",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018415"
|
||||
},
|
||||
{
|
||||
"name" : "26114",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26114"
|
||||
},
|
||||
{
|
||||
"name" : "26166",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26166"
|
||||
"name": "HPSBMA02133",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143"
|
||||
},
|
||||
{
|
||||
"name": "oracle-cpu-july2007(35490)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490"
|
||||
},
|
||||
{
|
||||
"name": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf"
|
||||
},
|
||||
{
|
||||
"name": "1018415",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018415"
|
||||
},
|
||||
{
|
||||
"name": "20070718 Oracle Security: SQL Injection in package DBMS_PRVTAQIS",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/474000"
|
||||
},
|
||||
{
|
||||
"name": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070723 n.runs-SA-2007.022 - Norman Antivirus DOC parsing Detection Bypass Advisory",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/474428/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.nruns.com/security_advisory_norman_antivirus_doc_depection_bypass.php",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.nruns.com/security_advisory_norman_antivirus_doc_depection_bypass.php"
|
||||
},
|
||||
{
|
||||
"name" : "25020",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25020"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2619",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2619"
|
||||
},
|
||||
{
|
||||
"name" : "37981",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37981"
|
||||
},
|
||||
{
|
||||
"name" : "1018438",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018438"
|
||||
},
|
||||
{
|
||||
"name" : "26178",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26178"
|
||||
"name": "20070723 n.runs-SA-2007.022 - Norman Antivirus DOC parsing Detection Bypass Advisory",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/474428/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "2913",
|
||||
@ -96,6 +71,31 @@
|
||||
"name": "norman-doc-security-bypass(35558)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35558"
|
||||
},
|
||||
{
|
||||
"name": "37981",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37981"
|
||||
},
|
||||
{
|
||||
"name": "25020",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25020"
|
||||
},
|
||||
{
|
||||
"name": "26178",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26178"
|
||||
},
|
||||
{
|
||||
"name": "1018438",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018438"
|
||||
},
|
||||
{
|
||||
"name": "http://www.nruns.com/security_advisory_norman_antivirus_doc_depection_bypass.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.nruns.com/security_advisory_norman_antivirus_doc_depection_bypass.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kb.cert.org/vuls/id/MIMG-74ZK93",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/MIMG-74ZK93"
|
||||
},
|
||||
{
|
||||
"name" : "VU#563673",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/563673"
|
||||
},
|
||||
{
|
||||
"name" : "25548",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25548"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3076",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3076"
|
||||
},
|
||||
{
|
||||
"name" : "37499",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37499"
|
||||
"name": "26677",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26677"
|
||||
},
|
||||
{
|
||||
"name": "1018660",
|
||||
@ -88,14 +63,39 @@
|
||||
"url": "http://www.securitytracker.com/id?1018660"
|
||||
},
|
||||
{
|
||||
"name" : "26677",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26677"
|
||||
"name": "http://www.kb.cert.org/vuls/id/MIMG-74ZK93",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kb.cert.org/vuls/id/MIMG-74ZK93"
|
||||
},
|
||||
{
|
||||
"name": "cisco-asa-aaa-information-disclosure(36473)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36473"
|
||||
},
|
||||
{
|
||||
"name": "37499",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37499"
|
||||
},
|
||||
{
|
||||
"name": "25548",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25548"
|
||||
},
|
||||
{
|
||||
"name": "http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903",
|
||||
"refsource": "MISC",
|
||||
"url": "http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903"
|
||||
},
|
||||
{
|
||||
"name": "VU#563673",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/563673"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3076",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3076"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2007-6254",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,36 +52,36 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.kb.cert.org/vuls/id/MIMG-732R7X",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/MIMG-732R7X"
|
||||
},
|
||||
{
|
||||
"name" : "VU#329673",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/329673"
|
||||
},
|
||||
{
|
||||
"name": "28292",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28292"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0927",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0927/references"
|
||||
},
|
||||
{
|
||||
"name": "1019668",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019668"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0927",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0927/references"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kb.cert.org/vuls/id/MIMG-732R7X",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kb.cert.org/vuls/id/MIMG-732R7X"
|
||||
},
|
||||
{
|
||||
"name": "29437",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29437"
|
||||
},
|
||||
{
|
||||
"name": "VU#329673",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/329673"
|
||||
},
|
||||
{
|
||||
"name": "businessobjects-rptviewerax-bo(41256)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2007-6256",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4799",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4799"
|
||||
},
|
||||
{
|
||||
"name" : "27056",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27056"
|
||||
},
|
||||
{
|
||||
"name": "39666",
|
||||
"refsource": "OSVDB",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "28231",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28231"
|
||||
},
|
||||
{
|
||||
"name": "27056",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27056"
|
||||
},
|
||||
{
|
||||
"name": "4799",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4799"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.h-fj.com/blog/archives/2007/01/23-111038.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.h-fj.com/blog/archives/2007/01/23-111038.php"
|
||||
},
|
||||
{
|
||||
"name": "JVN#60887968",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN60887968/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2011-000108",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000108.html"
|
||||
},
|
||||
{
|
||||
"name": "movabletype-mailform-xss(72344)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72344"
|
||||
},
|
||||
{
|
||||
"name": "http://www.h-fj.com/blog/archives/2007/01/23-111038.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.h-fj.com/blog/archives/2007/01/23-111038.php"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2011-000108",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000108.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://security.openttd.org/en/CVE-2010-0402",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://security.openttd.org/en/CVE-2010-0402"
|
||||
},
|
||||
{
|
||||
"name": "39669",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/39669"
|
||||
},
|
||||
{
|
||||
"name": "http://security.openttd.org/en/CVE-2010-0402",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://security.openttd.org/en/CVE-2010-0402"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100322 {PRL} Lexmark Multiple Laser printer FTP Remote Denial of Services",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/510285/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=11&Itemid=11",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=11&Itemid=11"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.lexmark.com/index?page=content&id=TE85&locale=EN&userlocale=EN_US",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.lexmark.com/index?page=content&id=TE85&locale=EN&userlocale=EN_US"
|
||||
},
|
||||
{
|
||||
"name": "38906",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38906"
|
||||
},
|
||||
{
|
||||
"name": "http://support.lexmark.com/index?page=content&id=TE85&locale=EN&userlocale=EN_US",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.lexmark.com/index?page=content&id=TE85&locale=EN&userlocale=EN_US"
|
||||
},
|
||||
{
|
||||
"name": "39056",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/39056"
|
||||
},
|
||||
{
|
||||
"name": "20100322 {PRL} Lexmark Multiple Laser printer FTP Remote Denial of Services",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/510285/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2010-1257",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,20 +58,15 @@
|
||||
"url": "http://support.avaya.com/css/P8/documents/100089747"
|
||||
},
|
||||
{
|
||||
"name" : "MS10-035",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035"
|
||||
"name": "ie-tostatichtml-information-disclosure(58866)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58866"
|
||||
},
|
||||
{
|
||||
"name": "MS10-039",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-039"
|
||||
},
|
||||
{
|
||||
"name" : "TA10-159B",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
|
||||
},
|
||||
{
|
||||
"name": "40409",
|
||||
"refsource": "BID",
|
||||
@ -83,9 +78,14 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6677"
|
||||
},
|
||||
{
|
||||
"name" : "ie-tostatichtml-information-disclosure(58866)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58866"
|
||||
"name": "MS10-035",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035"
|
||||
},
|
||||
{
|
||||
"name": "TA10-159B",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100520 Drupal Chaos Tools Suite (Ctools) Module Multiple Vulns",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2010/May/272"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.madirish.net/?article=458",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.madirish.net/?article=458"
|
||||
},
|
||||
{
|
||||
"name" : "http://drupal.org/node/803944",
|
||||
"name": "http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/page_manager.admin.inc?view=log",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://drupal.org/node/803944"
|
||||
"url": "http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/page_manager.admin.inc?view=log"
|
||||
},
|
||||
{
|
||||
"name": "http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/page_manager.admin.inc?r1=1.27.2.9&r2=1.27.2.10",
|
||||
@ -73,14 +63,9 @@
|
||||
"url": "http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/page_manager.admin.inc?r1=1.27.2.9&r2=1.27.2.10"
|
||||
},
|
||||
{
|
||||
"name" : "http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/page_manager.admin.inc?view=log",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/page_manager.admin.inc?view=log"
|
||||
},
|
||||
{
|
||||
"name" : "http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/plugins/tasks/page.admin.inc?r1=1.18.2.6&r2=1.18.2.7",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/plugins/tasks/page.admin.inc?r1=1.18.2.6&r2=1.18.2.7"
|
||||
"name": "39884",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/39884"
|
||||
},
|
||||
{
|
||||
"name": "http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/plugins/tasks/page.admin.inc?view=log",
|
||||
@ -88,19 +73,34 @@
|
||||
"url": "http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/plugins/tasks/page.admin.inc?view=log"
|
||||
},
|
||||
{
|
||||
"name" : "40285",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/40285"
|
||||
"name": "20100520 Drupal Chaos Tools Suite (Ctools) Module Multiple Vulns",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2010/May/272"
|
||||
},
|
||||
{
|
||||
"name" : "39884",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/39884"
|
||||
"name": "http://drupal.org/node/803944",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/803944"
|
||||
},
|
||||
{
|
||||
"name": "chaos-tool-import-code-execution(58723)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58723"
|
||||
},
|
||||
{
|
||||
"name": "http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/plugins/tasks/page.admin.inc?r1=1.18.2.6&r2=1.18.2.7",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/plugins/tasks/page.admin.inc?r1=1.18.2.6&r2=1.18.2.7"
|
||||
},
|
||||
{
|
||||
"name": "40285",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/40285"
|
||||
},
|
||||
{
|
||||
"name": "http://www.madirish.net/?article=458",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.madirish.net/?article=458"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,45 +57,45 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html"
|
||||
},
|
||||
{
|
||||
"name" : "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
|
||||
},
|
||||
{
|
||||
"name": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/"
|
||||
},
|
||||
{
|
||||
"name" : "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
|
||||
},
|
||||
{
|
||||
"name" : "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.f-secure.com/weblog/archives/00001949.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.f-secure.com/weblog/archives/00001949.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
|
||||
},
|
||||
{
|
||||
"name": "39924",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/39924"
|
||||
},
|
||||
{
|
||||
"name": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
|
||||
},
|
||||
{
|
||||
"name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
|
||||
},
|
||||
{
|
||||
"name": "67660",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/67660"
|
||||
},
|
||||
{
|
||||
"name": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.f-secure.com/weblog/archives/00001949.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.f-secure.com/weblog/archives/00001949.html"
|
||||
},
|
||||
{
|
||||
"name": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2014-0554",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://helpx.adobe.com/security/products/flash-player/apsb14-21.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://helpx.adobe.com/security/products/flash-player/apsb14-21.html"
|
||||
"name": "69697",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/69697"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201409-05",
|
||||
@ -63,14 +63,9 @@
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201409-05.xml"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:1124",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:1110",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html"
|
||||
"name": "61089",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/61089"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:1130",
|
||||
@ -78,24 +73,29 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html"
|
||||
},
|
||||
{
|
||||
"name" : "69697",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/69697"
|
||||
},
|
||||
{
|
||||
"name" : "1030822",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030822"
|
||||
},
|
||||
{
|
||||
"name" : "61089",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/61089"
|
||||
"name": "openSUSE-SU-2014:1110",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "adobe-flash-cve20140554-sec-bypass(95824)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95824"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:1124",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name": "http://helpx.adobe.com/security/products/flash-player/apsb14-21.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-21.html"
|
||||
},
|
||||
{
|
||||
"name": "1030822",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030822"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2014-0588",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20141112 Adobe Flash Player Byte Array Uncompress Use-after-Free Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1084"
|
||||
},
|
||||
{
|
||||
"name": "http://helpx.adobe.com/security/products/flash-player/apsb14-24.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "openSUSE-SU-2015:0725",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "20141112 Adobe Flash Player Byte Array Uncompress Use-after-Free Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1084"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2014-0890",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-1765",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://twitter.com/thezdi/statuses/444216845734666240",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://twitter.com/thezdi/statuses/444216845734666240"
|
||||
},
|
||||
{
|
||||
"name": "http://www.pwn2own.com/2014/03/pwn2own-results-thursday-day-two/",
|
||||
"refsource": "MISC",
|
||||
@ -68,14 +63,19 @@
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037"
|
||||
},
|
||||
{
|
||||
"name" : "1030532",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030532"
|
||||
"name": "http://twitter.com/thezdi/statuses/444216845734666240",
|
||||
"refsource": "MISC",
|
||||
"url": "http://twitter.com/thezdi/statuses/444216845734666240"
|
||||
},
|
||||
{
|
||||
"name": "59775",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59775"
|
||||
},
|
||||
{
|
||||
"name": "1030532",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030532"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-4120",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-5043",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-14-272/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-14-272/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-14-273/",
|
||||
"refsource": "MISC",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "http://forums.alienvault.com/discussion/2559/security-advisory-multiple-vulnerabilities",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://forums.alienvault.com/discussion/2559/security-advisory-multiple-vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-14-272/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-14-272/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=765",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=765"
|
||||
},
|
||||
{
|
||||
"name": "84841",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/84841"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=765",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=765"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
||||
},
|
||||
{
|
||||
"name": "93716",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93716"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
||||
},
|
||||
{
|
||||
"name": "1037046",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -53,25 +53,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
|
||||
},
|
||||
{
|
||||
"name": "1037492",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037492"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||
},
|
||||
{
|
||||
"name" : "1037492",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1037492"
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "psampaio@redhat.com",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2016-8637",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -68,11 +68,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20161107 CVE-2016-8637: dracut creates world readble initramfs when early cpio is used",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2016/q4/352"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8637",
|
||||
"refsource": "CONFIRM",
|
||||
@ -87,6 +82,11 @@
|
||||
"name": "94128",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94128"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20161107 CVE-2016-8637: dracut creates world readble initramfs when early cpio is used",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2016/q4/352"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-8766",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-8849",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-9883",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20161208 roundcube code execution via mail()",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/12/08/10"
|
||||
},
|
||||
{
|
||||
"name": "https://blog.ripstech.com/2016/roundcube-command-execution-via-email/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blog.ripstech.com/2016/roundcube-command-execution-via-email/"
|
||||
},
|
||||
{
|
||||
"name": "94858",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94858"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20161208 roundcube code execution via mail()",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/12/08/10"
|
||||
},
|
||||
{
|
||||
"name": "https://roundcube.net/news/2016/11/28/updates-1.2.3-and-1.1.7-released",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "GLSA-201612-44",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201612-44"
|
||||
},
|
||||
{
|
||||
"name" : "94858",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94858"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,25 +61,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "106619",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106619"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://security.netapp.com/advisory/ntap-20190118-0002/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20190118-0002/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3867-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3867-1/"
|
||||
},
|
||||
{
|
||||
"name" : "106619",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/106619"
|
||||
"name": "https://security.netapp.com/advisory/ntap-20190118-0002/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user