"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:01:33 +00:00
parent 44f6dc8b2d
commit 62e04c8f86
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
63 changed files with 3675 additions and 3724 deletions

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-0037",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "33019",
"refsource": "OSVDB",
"url": "http://osvdb.org/33019"
},
{
"name": "3228",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3228"
},
{
"name": "mynews-themefunc-file-include(31971)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31971"
},
{
"name": "22313",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22313"
},
{
"name" : "ADV-2007-0423",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0423"
},
{
"name" : "33019",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33019"
},
{
"name": "23973",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23973"
},
{
"name" : "mynews-themefunc-file-include(31971)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31971"
"name": "ADV-2007-0423",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0423"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070131 [ECHO_ADV_63$2007] Cadre remote file inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/458681/100/0/threaded"
},
{
"name" : "http://echo.or.id/adv/adv63-y3dips-2007.txt",
"refsource" : "MISC",
"url" : "http://echo.or.id/adv/adv63-y3dips-2007.txt"
},
{
"name" : "3237",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3237"
},
{
"name" : "22336",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22336"
"name": "2215",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2215"
},
{
"name": "ADV-2007-0449",
@ -83,14 +68,29 @@
"url": "http://osvdb.org/33631"
},
{
"name" : "2215",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2215"
"name": "22336",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22336"
},
{
"name": "http://echo.or.id/adv/adv63-y3dips-2007.txt",
"refsource": "MISC",
"url": "http://echo.or.id/adv/adv63-y3dips-2007.txt"
},
{
"name": "20070131 [ECHO_ADV_63$2007] Cadre remote file inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/458681/100/0/threaded"
},
{
"name": "cadre-classquickconfigbrowser-file-include(32005)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32005"
},
{
"name": "3237",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3237"
}
]
}

View File

@ -53,64 +53,64 @@
"references": {
"reference_data": [
{
"name" : "20070306 Apple QuickTime Player Remote Heap Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/461983/100/0/threaded"
},
{
"name" : "http://www.piotrbania.com/all/adv/quicktime-heap-adv-7.1.txt",
"refsource" : "MISC",
"url" : "http://www.piotrbania.com/all/adv/quicktime-heap-adv-7.1.txt"
},
{
"name" : "APPLE-SA-2007-03-05",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=305149",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=305149"
},
{
"name" : "TA07-065A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-065A.html"
"name": "ADV-2007-0825",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0825"
},
{
"name": "VU#880561",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/880561"
},
{
"name": "quicktime-quicktime-bo(32817)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32817"
},
{
"name": "22827",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22827"
},
{
"name" : "22843",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22843"
},
{
"name" : "ADV-2007-0825",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0825"
},
{
"name" : "1017725",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017725"
},
{
"name": "24359",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24359"
},
{
"name" : "quicktime-quicktime-bo(32817)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32817"
"name": "APPLE-SA-2007-03-05",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html"
},
{
"name": "1017725",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017725"
},
{
"name": "http://www.piotrbania.com/all/adv/quicktime-heap-adv-7.1.txt",
"refsource": "MISC",
"url": "http://www.piotrbania.com/all/adv/quicktime-heap-adv-7.1.txt"
},
{
"name": "TA07-065A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-065A.html"
},
{
"name": "20070306 Apple QuickTime Player Remote Heap Overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/461983/100/0/threaded"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305149",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305149"
},
{
"name": "22843",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22843"
}
]
}

View File

@ -53,34 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://docs.info.apple.com/article.html?artnum=305214",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=305214"
"name": "TA07-072A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"name": "APPLE-SA-2007-03-13",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"name" : "TA07-072A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"name": "22948",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22948"
},
{
"name" : "ADV-2007-0930",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0930"
},
{
"name" : "34850",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/34850"
"name": "http://docs.info.apple.com/article.html?artnum=305214",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305214"
},
{
"name": "1017756",
@ -88,14 +78,24 @@
"url": "http://www.securitytracker.com/id?1017756"
},
{
"name" : "24479",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24479"
"name": "34850",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/34850"
},
{
"name": "macos-openssh-dos(32975)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32975"
},
{
"name": "ADV-2007-0930",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0930"
},
{
"name": "24479",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24479"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-0779",
"STATE": "PUBLIC"
},
@ -53,19 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20070226 rPSA-2007-0040-1 firefox",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/461336/100/0/threaded"
"name": "RHSA-2007:0078",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0078.html"
},
{
"name" : "20070303 rPSA-2007-0040-3 firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/461809/100/0/threaded"
},
{
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-04.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2007/mfsa2007-04.html"
"name": "oval:org.mitre.oval:def:8757",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8757"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=361298",
@ -73,24 +68,24 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=361298"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1081",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1081"
"name": "24395",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24395"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1103",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1103"
"name": "20070226 rPSA-2007-0040-1 firefox",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/461336/100/0/threaded"
},
{
"name" : "FEDORA-2007-281",
"refsource" : "FEDORA",
"url" : "http://fedoranews.org/cms/node/2713"
"name": "24328",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24328"
},
{
"name" : "FEDORA-2007-293",
"refsource" : "FEDORA",
"url" : "http://fedoranews.org/cms/node/2728"
"name": "RHSA-2007:0108",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0108.html"
},
{
"name": "GLSA-200703-04",
@ -102,195 +97,200 @@
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml"
},
{
"name" : "HPSBUX02153",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name" : "SSRT061181",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name" : "MDKSA-2007:050",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:050"
},
{
"name" : "RHSA-2007:0079",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0079.html"
},
{
"name" : "RHSA-2007:0077",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0077.html"
},
{
"name" : "RHSA-2007:0078",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0078.html"
},
{
"name" : "RHSA-2007:0097",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0097.html"
},
{
"name" : "RHSA-2007:0108",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0108.html"
},
{
"name" : "20070301-01-P",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"
},
{
"name" : "20070202-01-P",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"
},
{
"name": "SSA:2007-066-03",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851"
},
{
"name" : "SSA:2007-066-05",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"
},
{
"name" : "SUSE-SA:2007:019",
"refsource" : "SUSE",
"url" : "http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html"
},
{
"name" : "SUSE-SA:2007:022",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_22_mozilla.html"
},
{
"name" : "USN-428-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-428-1"
},
{
"name" : "22694",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22694"
},
{
"name" : "oval:org.mitre.oval:def:8757",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8757"
},
{
"name" : "ADV-2007-0718",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0718"
},
{
"name" : "ADV-2008-0083",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name" : "32109",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32109"
},
{
"name" : "1017700",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017700"
},
{
"name" : "24238",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24238"
},
{
"name" : "24287",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24287"
},
{
"name" : "24290",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24290"
},
{
"name" : "24205",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24205"
},
{
"name" : "24328",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24328"
},
{
"name" : "24333",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24333"
},
{
"name" : "24343",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24343"
},
{
"name" : "24320",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24320"
},
{
"name" : "24293",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24293"
},
{
"name" : "24393",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24393"
},
{
"name" : "24395",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24395"
},
{
"name": "24384",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24384"
},
{
"name" : "24437",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24437"
},
{
"name" : "24650",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24650"
},
{
"name" : "24455",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24455"
"name": "1017700",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017700"
},
{
"name": "24457",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24457"
},
{
"name": "24343",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24343"
},
{
"name": "HPSBUX02153",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "ADV-2007-0718",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0718"
},
{
"name": "24650",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24650"
},
{
"name": "USN-428-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-428-1"
},
{
"name": "24320",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24320"
},
{
"name": "https://issues.rpath.com/browse/RPL-1103",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1103"
},
{
"name": "SUSE-SA:2007:019",
"refsource": "SUSE",
"url": "http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html"
},
{
"name": "ADV-2008-0083",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name": "20070303 rPSA-2007-0040-3 firefox thunderbird",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/461809/100/0/threaded"
},
{
"name": "SUSE-SA:2007:022",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_22_mozilla.html"
},
{
"name": "24293",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24293"
},
{
"name": "24238",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24238"
},
{
"name": "24393",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24393"
},
{
"name": "24342",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24342"
},
{
"name": "24287",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24287"
},
{
"name": "22694",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22694"
},
{
"name": "SSRT061181",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "FEDORA-2007-281",
"refsource": "FEDORA",
"url": "http://fedoranews.org/cms/node/2713"
},
{
"name": "RHSA-2007:0097",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0097.html"
},
{
"name": "FEDORA-2007-293",
"refsource": "FEDORA",
"url": "http://fedoranews.org/cms/node/2728"
},
{
"name": "20070301-01-P",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"
},
{
"name": "24205",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24205"
},
{
"name": "https://issues.rpath.com/browse/RPL-1081",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1081"
},
{
"name": "24333",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24333"
},
{
"name": "MDKSA-2007:050",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:050"
},
{
"name": "24290",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24290"
},
{
"name": "24455",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24455"
},
{
"name": "RHSA-2007:0077",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0077.html"
},
{
"name": "20070202-01-P",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"
},
{
"name": "32109",
"refsource": "OSVDB",
"url": "http://osvdb.org/32109"
},
{
"name": "SSA:2007-066-05",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"
},
{
"name": "RHSA-2007:0079",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0079.html"
},
{
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-04.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-04.html"
},
{
"name": "24437",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24437"
}
]
}

View File

@ -52,51 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "24233",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24233"
},
{
"name": "http://secunia.com/secunia_research/2007-39/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2007-39/advisory/"
},
{
"name" : "http://secunia.com/secunia_research/2007-40/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2007-40/advisory/"
},
{
"name" : "GLSA-200704-19",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200704-19.xml"
},
{
"name": "22770",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22770"
},
{
"name" : "ADV-2007-0798",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0798"
},
{
"name" : "33836",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33836"
},
{
"name" : "1017714",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017714"
},
{
"name" : "24232",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24232"
},
{
"name" : "24233",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24233"
},
{
"name": "24991",
"refsource": "SECUNIA",
@ -106,6 +76,36 @@
"name": "blender-kml-kmz-command-execution(32778)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32778"
},
{
"name": "ADV-2007-0798",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0798"
},
{
"name": "http://secunia.com/secunia_research/2007-40/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2007-40/advisory/"
},
{
"name": "24232",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24232"
},
{
"name": "GLSA-200704-19",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200704-19.xml"
},
{
"name": "33836",
"refsource": "OSVDB",
"url": "http://osvdb.org/33836"
},
{
"name": "1017714",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017714"
}
]
}

View File

@ -57,16 +57,16 @@
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?group_id=50071&release_id=488061"
},
{
"name" : "ADV-2007-0790",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0790"
},
{
"name": "35998",
"refsource": "OSVDB",
"url": "http://osvdb.org/35998"
},
{
"name": "ADV-2007-0790",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0790"
},
{
"name": "openbiblio-reports-privilege-escalation(32758)",
"refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070329 AOL 9.0 Deskbar.dll/Toolbar.dll DoS Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2007-03/0392.html"
"name": "aol-deskbar-toolbar-dos(33309)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33309"
},
{
"name": "35207",
@ -63,9 +63,9 @@
"url": "http://osvdb.org/35207"
},
{
"name" : "aol-deskbar-toolbar-dos(33309)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33309"
"name": "20070329 AOL 9.0 Deskbar.dll/Toolbar.dll DoS Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2007-03/0392.html"
}
]
}

View File

@ -53,49 +53,49 @@
"references": {
"reference_data": [
{
"name" : "http://www.php-security.org/MOPB/MOPB-42-2007.html",
"refsource" : "MISC",
"url" : "http://www.php-security.org/MOPB/MOPB-42-2007.html"
},
{
"name" : "DSA-1283",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1283"
},
{
"name" : "SUSE-SA:2007:032",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_32_php.html"
},
{
"name" : "USN-455-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-455-1"
"name": "25056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25056"
},
{
"name": "23237",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23237"
},
{
"name": "DSA-1283",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1283"
},
{
"name": "25062",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25062"
},
{
"name": "USN-455-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-455-1"
},
{
"name": "25057",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25057"
},
{
"name" : "25056",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25056"
},
{
"name": "php-phpstreamfiltercreate-bo(33729)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33729"
},
{
"name": "SUSE-SA:2007:032",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_32_php.html"
},
{
"name": "http://www.php-security.org/MOPB/MOPB-42-2007.html",
"refsource": "MISC",
"url": "http://www.php-security.org/MOPB/MOPB-42-2007.html"
}
]
}

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "20070808 Cisco IOS Secure Copy Authorization Bypass Vulnerability",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20070808-scp.shtml"
},
{
"name" : "25240",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25240"
},
{
"name" : "oval:org.mitre.oval:def:5542",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5542"
},
{
"name": "ADV-2007-2817",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2817"
},
{
"name" : "36694",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36694"
},
{
"name" : "1018534",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018534"
},
{
"name": "26361",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26361"
},
{
"name": "20070808 Cisco IOS Secure Copy Authorization Bypass Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070808-scp.shtml"
},
{
"name": "1018534",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018534"
},
{
"name": "oval:org.mitre.oval:def:5542",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5542"
},
{
"name": "cisco-ios-scp-file-overwrite(35872)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35872"
},
{
"name": "25240",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25240"
},
{
"name": "36694",
"refsource": "OSVDB",
"url": "http://osvdb.org/36694"
}
]
}

View File

@ -53,35 +53,30 @@
"references": {
"reference_data": [
{
"name" : "http://docs.info.apple.com/article.html?artnum=307041",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=307041"
},
{
"name" : "APPLE-SA-2007-11-14",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html"
},
{
"name" : "TA07-319A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-319A.html"
"name": "1018950",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018950"
},
{
"name": "26444",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26444"
},
{
"name": "APPLE-SA-2007-11-14",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307041",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307041"
},
{
"name": "ADV-2007-3868",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3868"
},
{
"name" : "1018950",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1018950"
},
{
"name": "27643",
"refsource": "SECUNIA",
@ -91,6 +86,11 @@
"name": "macosx-corefoundation-directory-bo(38464)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38464"
},
{
"name": "TA07-319A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "109642",
"refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/109642"
},
{
"name": "http://packetstormsecurity.com/files/127640/WordPress-Lead-Octopus-Power-SQL-Injection.html",
"refsource": "MISC",
@ -62,11 +67,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68934"
},
{
"name" : "109642",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/show/osvdb/109642"
},
{
"name": "leadoctopuspower-optinpage-sql-injection(94912)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5746",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#159129",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2467",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "37913",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/37913/"
},
{
"name": "MS15-081",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-081"
},
{
"name": "37913",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37913/"
},
{
"name": "1033239",
"refsource": "SECTRACK",

View File

@ -52,6 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "http://typo3.org/extensions/repository/view/sb_akronymmanager",
"refsource": "CONFIRM",
"url": "http://typo3.org/extensions/repository/view/sb_akronymmanager"
},
{
"name": "http://packetstormsecurity.com/files/132302/TYPO3-Extension-Akronymmanager-0.5.0-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132302/TYPO3-Extension-Akronymmanager-0.5.0-SQL-Injection.html"
},
{
"name": "20150615 [RT-SA-2015-002] SQL Injection in TYPO3 Extension Akronymmanager",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jun/43"
},
{
"name": "75191",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75191"
},
{
"name": "20150615 [RT-SA-2015-002] SQL Injection in TYPO3 Extension Akronymmanager",
"refsource": "BUGTRAQ",
@ -62,30 +82,10 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37301/"
},
{
"name" : "20150615 [RT-SA-2015-002] SQL Injection in TYPO3 Extension Akronymmanager",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Jun/43"
},
{
"name" : "http://packetstormsecurity.com/files/132302/TYPO3-Extension-Akronymmanager-0.5.0-SQL-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/132302/TYPO3-Extension-Akronymmanager-0.5.0-SQL-Injection.html"
},
{
"name": "https://www.redteam-pentesting.de/advisories/rt-sa-2015-002",
"refsource": "MISC",
"url": "https://www.redteam-pentesting.de/advisories/rt-sa-2015-002"
},
{
"name" : "http://typo3.org/extensions/repository/view/sb_akronymmanager",
"refsource" : "CONFIRM",
"url" : "http://typo3.org/extensions/repository/view/sb_akronymmanager"
},
{
"name" : "75191",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75191"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-2956",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://jvn.jp/en/jp/JVN52478686/995646/index.html",
"refsource" : "CONFIRM",
"url" : "http://jvn.jp/en/jp/JVN52478686/995646/index.html"
},
{
"name": "JVN#52478686",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN52478686/index.html"
},
{
"name": "http://jvn.jp/en/jp/JVN52478686/995646/index.html",
"refsource": "CONFIRM",
"url": "http://jvn.jp/en/jp/JVN52478686/995646/index.html"
},
{
"name": "JVNDB-2015-000081",
"refsource": "JVNDB",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3664",
"STATE": "PUBLIC"
},
@ -57,11 +57,6 @@
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT204947"
},
{
"name" : "APPLE-SA-2015-06-30-5",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Jun/msg00005.html"
},
{
"name": "75499",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "1032756",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032756"
},
{
"name": "APPLE-SA-2015-06-30-5",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00005.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6110",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-6684",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2015-6760",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
},
{
"name": "https://chromium.googlesource.com/angle/angle.git/+/39939686b3731eaaf6c0b639ab64db0277c72475",
"refsource": "CONFIRM",
@ -67,6 +62,16 @@
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=519642"
},
{
"name": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
},
{
"name": "77071",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77071"
},
{
"name": "DSA-3376",
"refsource": "DEBIAN",
@ -77,20 +82,15 @@
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-09"
},
{
"name" : "RHSA-2015:1912",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1912.html"
},
{
"name" : "77071",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/77071"
},
{
"name": "1033816",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033816"
},
{
"name": "RHSA-2015:1912",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1912.html"
}
]
}

View File

@ -52,60 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "38447",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/38447/"
},
{
"name" : "[oss-security] 20151103 CVE request: libsndfile 1.0.25 heap overflow",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/11/03/3"
},
{
"name": "[oss-security] 20151103 Re: CVE request: libsndfile 1.0.25 heap overflow",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/11/03/7"
},
{
"name" : "http://packetstormsecurity.com/files/133926/libsndfile-1.0.25-Heap-Overflow.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/133926/libsndfile-1.0.25-Heap-Overflow.html"
},
{
"name" : "http://www.nemux.org/2015/10/13/libsndfile-1-0-25-heap-overflow/",
"refsource" : "MISC",
"url" : "http://www.nemux.org/2015/10/13/libsndfile-1-0-25-heap-overflow/"
},
{
"name" : "FEDORA-2015-5afed1aad2",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171466.html"
},
{
"name" : "FEDORA-2015-0f405832d3",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172607.html"
},
{
"name" : "FEDORA-2015-56be43eae6",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172593.html"
},
{
"name" : "GLSA-201612-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201612-03"
},
{
"name": "openSUSE-SU-2015:1995",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html"
},
{
"name" : "openSUSE-SU-2015:2119",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html"
"name": "77427",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77427"
},
{
"name": "http://packetstormsecurity.com/files/133926/libsndfile-1.0.25-Heap-Overflow.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133926/libsndfile-1.0.25-Heap-Overflow.html"
},
{
"name": "USN-2832-1",
@ -113,9 +78,44 @@
"url": "http://www.ubuntu.com/usn/USN-2832-1"
},
{
"name" : "77427",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/77427"
"name": "GLSA-201612-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-03"
},
{
"name": "FEDORA-2015-0f405832d3",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172607.html"
},
{
"name": "openSUSE-SU-2015:2119",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html"
},
{
"name": "[oss-security] 20151103 CVE request: libsndfile 1.0.25 heap overflow",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/11/03/3"
},
{
"name": "http://www.nemux.org/2015/10/13/libsndfile-1-0-25-heap-overflow/",
"refsource": "MISC",
"url": "http://www.nemux.org/2015/10/13/libsndfile-1-0-25-heap-overflow/"
},
{
"name": "FEDORA-2015-56be43eae6",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172593.html"
},
{
"name": "FEDORA-2015-5afed1aad2",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171466.html"
},
{
"name": "38447",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38447/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-7907",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0116",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "MS16-024",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-024"
},
{
"name": "1035204",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035204"
},
{
"name": "MS16-024",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-024"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986853"
},
{
"name" : "https://www.ibm.com/blogs/psirt/ibm-security-bulletin-cross-site-scripting-vulnerability-in-tivoli-business-service-manager-cve-2016-0311/",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/blogs/psirt/ibm-security-bulletin-cross-site-scripting-vulnerability-in-tivoli-business-service-manager-cve-2016-0311/"
},
{
"name": "ibm-tivoli-cve20160311-xss(111480)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/111480"
},
{
"name": "https://www.ibm.com/blogs/psirt/ibm-security-bulletin-cross-site-scripting-vulnerability-in-tivoli-business-service-manager-cve-2016-0311/",
"refsource": "CONFIRM",
"url": "https://www.ibm.com/blogs/psirt/ibm-security-bulletin-cross-site-scripting-vulnerability-in-tivoli-business-service-manager-cve-2016-0311/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0450",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-021",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-021"
},
{
"name" : "https://redr2e.com/cve-to-poc-cve-2016-0450/",
"refsource" : "MISC",
"url" : "https://redr2e.com/cve-to-poc-cve-2016-0450/"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "81117",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/81117"
},
{
"name": "https://redr2e.com/cve-to-poc-cve-2016-0450/",
"refsource": "MISC",
"url": "https://redr2e.com/cve-to-poc-cve-2016-0450/"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-021",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-021"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2016-0875",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1081",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{
"name": "1035828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2016/01/05/3"
},
{
"name" : "[oss-security] 20160105 CVE Request: python-rsa signature forgery",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/01/05/1"
"name": "79829",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/79829"
},
{
"name": "https://blog.filippo.io/bleichenbacher-06-signature-forgery-in-python-rsa/",
@ -68,29 +68,29 @@
"url": "https://blog.filippo.io/bleichenbacher-06-signature-forgery-in-python-rsa/"
},
{
"name" : "https://bitbucket.org/sybren/python-rsa/pull-requests/14/security-fix-bb06-attack-in-verify-by/diff",
"refsource" : "CONFIRM",
"url" : "https://bitbucket.org/sybren/python-rsa/pull-requests/14/security-fix-bb06-attack-in-verify-by/diff"
"name": "[oss-security] 20160105 CVE Request: python-rsa signature forgery",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/05/1"
},
{
"name": "FEDORA-2016-70edfbbcef",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175897.html"
},
{
"name" : "FEDORA-2016-c845706426",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175942.html"
},
{
"name": "openSUSE-SU-2016:0108",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00032.html"
},
{
"name" : "79829",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/79829"
"name": "https://bitbucket.org/sybren/python-rsa/pull-requests/14/security-fix-bb06-attack-in-verify-by/diff",
"refsource": "CONFIRM",
"url": "https://bitbucket.org/sybren/python-rsa/pull-requests/14/security-fix-bb06-attack-in-verify-by/diff"
},
{
"name": "FEDORA-2016-c845706426",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175942.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-1972",
"STATE": "PUBLIC"
},
@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-32.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-32.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1218124",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1218124"
},
{
"name" : "GLSA-201605-06",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201605-06"
},
{
"name" : "openSUSE-SU-2016:0731",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html"
},
{
"name" : "openSUSE-SU-2016:0733",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html"
},
{
"name": "84220",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84220"
},
{
"name": "openSUSE-SU-2016:0731",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html"
},
{
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-32.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-32.html"
},
{
"name": "openSUSE-SU-2016:0733",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html"
},
{
"name": "1035215",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035215"
},
{
"name": "GLSA-201605-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201605-06"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4121",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html"
},
{
"name": "GLSA-201606-08",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201606-08"
},
{
"name" : "RHSA-2016:1079",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1079.html"
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html"
},
{
"name": "90797",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90797"
},
{
"name": "RHSA-2016:1079",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1079.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4428",
"STATE": "PUBLIC"
},
@ -52,65 +52,65 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160617 [OSSA-2016-010] XSS in Horizon client side template (CVE-2016-4428)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/17/4"
},
{
"name" : "https://bugs.launchpad.net/horizon/+bug/1567673",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/horizon/+bug/1567673"
},
{
"name" : "https://review.openstack.org/329996",
"refsource" : "CONFIRM",
"url" : "https://review.openstack.org/329996"
},
{
"name" : "https://review.openstack.org/329997",
"refsource" : "CONFIRM",
"url" : "https://review.openstack.org/329997"
},
{
"name" : "https://review.openstack.org/329998",
"refsource" : "CONFIRM",
"url" : "https://review.openstack.org/329998"
},
{
"name" : "https://security.openstack.org/ossa/OSSA-2016-010.html",
"refsource" : "CONFIRM",
"url" : "https://security.openstack.org/ossa/OSSA-2016-010.html"
},
{
"name" : "DSA-3617",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3617"
},
{
"name": "RHSA-2016:1268",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1268"
},
{
"name" : "RHSA-2016:1269",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1269"
},
{
"name": "RHSA-2016:1270",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1270"
},
{
"name" : "RHSA-2016:1271",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1271"
"name": "DSA-3617",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3617"
},
{
"name": "RHSA-2016:1272",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1272"
},
{
"name": "https://security.openstack.org/ossa/OSSA-2016-010.html",
"refsource": "CONFIRM",
"url": "https://security.openstack.org/ossa/OSSA-2016-010.html"
},
{
"name": "https://review.openstack.org/329997",
"refsource": "CONFIRM",
"url": "https://review.openstack.org/329997"
},
{
"name": "https://bugs.launchpad.net/horizon/+bug/1567673",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/horizon/+bug/1567673"
},
{
"name": "RHSA-2016:1269",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1269"
},
{
"name": "[oss-security] 20160617 [OSSA-2016-010] XSS in Horizon client side template (CVE-2016-4428)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/17/4"
},
{
"name": "RHSA-2016:1271",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1271"
},
{
"name": "https://review.openstack.org/329998",
"refsource": "CONFIRM",
"url": "https://review.openstack.org/329998"
},
{
"name": "https://review.openstack.org/329996",
"refsource": "CONFIRM",
"url": "https://review.openstack.org/329996"
}
]
}

View File

@ -76,11 +76,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10874246"
},
{
"name": "107223",
"refsource": "BID",
@ -90,6 +85,11 @@
"name": "ibm-sterling-cve20194029-xss(155907)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/155907"
},
{
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
"refsource": "CONFIRM",
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10874246"
}
]
}

View File

@ -2,30 +2,7 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-6501",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
@ -34,33 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "In QEMU 3.1, scsi_handle_inquiry_reply in hw/scsi/scsi-generic.c allows out-of-bounds write and read operations."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MLIST",
"name": "MLIST [oss-security] 20190124 CVE-2019-6501 QEMU: scsi-generic: possible OOB access while handling inquiry request",
"url": "http://www.openwall.com/lists/oss-security/2019/01/24/1"
},
{
"refsource": "MLIST",
"name": "[Qemu-devel][PATCH] 20190111 scsi-generic: avoid possible out-of-bounds access to r->buf",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg02324.html"
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}