mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
c02e50c914
commit
720a01899c
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070120 Paypal Subscription Manager Multiple HTML Injections",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/457506/100/0/threaded"
|
||||
"name": "2168",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2168"
|
||||
},
|
||||
{
|
||||
"name": "33559",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://osvdb.org/33559"
|
||||
},
|
||||
{
|
||||
"name" : "2168",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/2168"
|
||||
"name": "20070120 Paypal Subscription Manager Multiple HTML Injections",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/457506/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "psm-editmember-xss(31618)",
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070129 Internet Explorer 7 ActiveX bgColor property NULL pointer dereference (DoS)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/458443/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070129 Internet Explorer 7 ActiveX bgColor property NULL pointer dereference (DoS)",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052057.html"
|
||||
},
|
||||
{
|
||||
"name": "20070128 Internet Explorer 7 ActiveX bgColor property NULL pointer dereference (DoS)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0547.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.determina.com/security.research/vulnerabilities/activex-bgcolor.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.determina.com/security.research/vulnerabilities/activex-bgcolor.html"
|
||||
},
|
||||
{
|
||||
"name" : "22288",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22288"
|
||||
"name": "20070129 Internet Explorer 7 ActiveX bgColor property NULL pointer dereference (DoS)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/458443/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "32628",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/32628"
|
||||
},
|
||||
{
|
||||
"name": "ie-activex-bgcolor-dos(31867)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31867"
|
||||
},
|
||||
{
|
||||
"name": "2199",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2199"
|
||||
},
|
||||
{
|
||||
"name" : "ie-activex-bgcolor-dos(31867)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31867"
|
||||
"name": "20070129 Internet Explorer 7 ActiveX bgColor property NULL pointer dereference (DoS)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052057.html"
|
||||
},
|
||||
{
|
||||
"name": "22288",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22288"
|
||||
},
|
||||
{
|
||||
"name": "http://www.determina.com/security.research/vulnerabilities/activex-bgcolor.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.determina.com/security.research/vulnerabilities/activex-bgcolor.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070204 Les News v2.2 [Admin news without password]",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/459186/100/0/threaded"
|
||||
"name": "33686",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33686"
|
||||
},
|
||||
{
|
||||
"name": "http://forums.avenir-geopolitique.net/viewtopic.php?t=2622",
|
||||
"refsource": "MISC",
|
||||
"url": "http://forums.avenir-geopolitique.net/viewtopic.php?t=2622"
|
||||
},
|
||||
{
|
||||
"name" : "33686",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/33686"
|
||||
},
|
||||
{
|
||||
"name": "2226",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2226"
|
||||
},
|
||||
{
|
||||
"name": "20070204 Les News v2.2 [Admin news without password]",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/459186/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-07-011.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-07-011.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-1.ibm.com/support/docview.wss?uid=swg21257028",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg21257028"
|
||||
},
|
||||
{
|
||||
"name": "23173",
|
||||
"refsource": "BID",
|
||||
@ -72,16 +62,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23172"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1133",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1133"
|
||||
},
|
||||
{
|
||||
"name" : "1017823",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1017823"
|
||||
},
|
||||
{
|
||||
"name": "24633",
|
||||
"refsource": "SECUNIA",
|
||||
@ -91,6 +71,26 @@
|
||||
"name": "domino-imap-crammd5-bo(33276)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33276"
|
||||
},
|
||||
{
|
||||
"name": "1017823",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1017823"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-011.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-011.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www-1.ibm.com/support/docview.wss?uid=swg21257028",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21257028"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1133",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1133"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102865-1"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1178",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1178"
|
||||
},
|
||||
{
|
||||
"name": "24624",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24624"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1178",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1178"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,85 +52,85 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070601 bugtraq submission",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/470275"
|
||||
},
|
||||
{
|
||||
"name" : "20070604 RE: bugtraq submission",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/470508/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070601 PHPLive ALL VERSION: RFI + XSS",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://marc.info/?l=full-disclosure&m=118072121020357&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "24276",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24276"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2082",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2082"
|
||||
},
|
||||
{
|
||||
"name": "36986",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36986"
|
||||
},
|
||||
{
|
||||
"name" : "36987",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36987"
|
||||
},
|
||||
{
|
||||
"name" : "36988",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36988"
|
||||
},
|
||||
{
|
||||
"name": "36989",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36989"
|
||||
},
|
||||
{
|
||||
"name" : "36990",
|
||||
"name": "36987",
|
||||
"refsource": "OSVDB",
|
||||
"url" : "http://osvdb.org/36990"
|
||||
},
|
||||
{
|
||||
"name" : "38379",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/38379"
|
||||
},
|
||||
{
|
||||
"name" : "38380",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/38380"
|
||||
},
|
||||
{
|
||||
"name" : "38381",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/38381"
|
||||
},
|
||||
{
|
||||
"name" : "38382",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/38382"
|
||||
"url": "http://osvdb.org/36987"
|
||||
},
|
||||
{
|
||||
"name": "38383",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38383"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2082",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2082"
|
||||
},
|
||||
{
|
||||
"name": "36988",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36988"
|
||||
},
|
||||
{
|
||||
"name": "20070601 PHPLive ALL VERSION: RFI + XSS",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://marc.info/?l=full-disclosure&m=118072121020357&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20070601 bugtraq submission",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/470275"
|
||||
},
|
||||
{
|
||||
"name": "38381",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38381"
|
||||
},
|
||||
{
|
||||
"name": "24276",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24276"
|
||||
},
|
||||
{
|
||||
"name": "38379",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38379"
|
||||
},
|
||||
{
|
||||
"name": "38382",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38382"
|
||||
},
|
||||
{
|
||||
"name": "25441",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25441"
|
||||
},
|
||||
{
|
||||
"name": "36990",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36990"
|
||||
},
|
||||
{
|
||||
"name": "38380",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38380"
|
||||
},
|
||||
{
|
||||
"name": "20070604 RE: bugtraq submission",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/470508/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4054",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4054"
|
||||
"name": "evisioncms-functions-file-include(34792)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34792"
|
||||
},
|
||||
{
|
||||
"name": "24398",
|
||||
@ -63,9 +63,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/24398"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2123",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2123"
|
||||
"name": "4054",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4054"
|
||||
},
|
||||
{
|
||||
"name": "evisioncms-showimg-directory-traversal(34794)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34794"
|
||||
},
|
||||
{
|
||||
"name": "38466",
|
||||
@ -73,9 +78,9 @@
|
||||
"url": "http://osvdb.org/38466"
|
||||
},
|
||||
{
|
||||
"name" : "38467",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/38467"
|
||||
"name": "ADV-2007-2123",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2123"
|
||||
},
|
||||
{
|
||||
"name": "25605",
|
||||
@ -83,14 +88,9 @@
|
||||
"url": "http://secunia.com/advisories/25605"
|
||||
},
|
||||
{
|
||||
"name" : "evisioncms-functions-file-include(34792)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34792"
|
||||
},
|
||||
{
|
||||
"name" : "evisioncms-showimg-directory-traversal(34794)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34794"
|
||||
"name": "38467",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38467"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.sipera.com/index.php?action=resources,threat_advisory&tid=273&",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.sipera.com/index.php?action=resources,threat_advisory&tid=273&"
|
||||
},
|
||||
{
|
||||
"name": "http://www.polycom.com/common/documents/support/downloads/voice/soundpoint_ip_soundstation_ip_sip_2.1.1_release_notes.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.polycom.com/common/documents/support/downloads/voice/soundpoint_ip_soundstation_ip_sip_2.1.1_release_notes.pdf"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sipera.com/index.php?action=resources,threat_advisory&tid=273&",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.sipera.com/index.php?action=resources,threat_advisory&tid=273&"
|
||||
},
|
||||
{
|
||||
"name": "24547",
|
||||
"refsource": "BID",
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.sipera.com/index.php?action=resources,threat_advisory&tid=294&"
|
||||
},
|
||||
{
|
||||
"name" : "45428",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/45428"
|
||||
},
|
||||
{
|
||||
"name": "aol-sipmessage-dos(35070)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35070"
|
||||
},
|
||||
{
|
||||
"name": "45428",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/45428"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/472438/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.securinfos.info/english/security-advisories-alerts/20070628_PCSoft.WinDEV.wdp.Project.File.Handling.Buffer.Overflow.php",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.securinfos.info/english/security-advisories-alerts/20070628_PCSoft.WinDEV.wdp.Project.File.Handling.Buffer.Overflow.php"
|
||||
},
|
||||
{
|
||||
"name": "38909",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38909"
|
||||
},
|
||||
{
|
||||
"name": "https://www.securinfos.info/english/security-advisories-alerts/20070628_PCSoft.WinDEV.wdp.Project.File.Handling.Buffer.Overflow.php",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.securinfos.info/english/security-advisories-alerts/20070628_PCSoft.WinDEV.wdp.Project.File.Handling.Buffer.Overflow.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://lostmon.blogspot.com/2007/07/alstrasoft-multiple-products-multiple.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://lostmon.blogspot.com/2007/07/alstrasoft-multiple-products-multiple.html"
|
||||
},
|
||||
{
|
||||
"name" : "25022",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25022"
|
||||
},
|
||||
{
|
||||
"name": "37867",
|
||||
"refsource": "OSVDB",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "37868",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37868"
|
||||
},
|
||||
{
|
||||
"name": "http://lostmon.blogspot.com/2007/07/alstrasoft-multiple-products-multiple.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://lostmon.blogspot.com/2007/07/alstrasoft-multiple-products-multiple.html"
|
||||
},
|
||||
{
|
||||
"name": "25022",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25022"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070730 BellaBiblio Admin Login Bypass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/475103/100/0/threaded"
|
||||
"name": "39032",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/39032"
|
||||
},
|
||||
{
|
||||
"name": "20070731 WTF: BellaBiblio Admin Login Bypass",
|
||||
"refsource": "VIM",
|
||||
"url": "http://www.attrition.org/pipermail/vim/2007-July/001733.html"
|
||||
},
|
||||
{
|
||||
"name": "2991",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2991"
|
||||
},
|
||||
{
|
||||
"name": "25140",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25140"
|
||||
},
|
||||
{
|
||||
"name": "20070730 BellaBiblio Admin Login Bypass",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/475103/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20070731 WTF: BellaBiblio Admin Login Bypass",
|
||||
"refsource": "VIM",
|
||||
@ -71,21 +86,6 @@
|
||||
"name": "20070731 WTF: BellaBiblio Admin Login Bypass",
|
||||
"refsource": "VIM",
|
||||
"url": "http://www.attrition.org/pipermail/vim/2007-July/001745.html"
|
||||
},
|
||||
{
|
||||
"name" : "25140",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25140"
|
||||
},
|
||||
{
|
||||
"name" : "39032",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/39032"
|
||||
},
|
||||
{
|
||||
"name" : "2991",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/2991"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1018572",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018572"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2904",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2904"
|
||||
},
|
||||
{
|
||||
"name": "26635",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26635"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:050",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-08/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/support/search/view/865/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -63,44 +83,24 @@
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200708-17.xml"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:050",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2007-08/msg00006.html"
|
||||
"name": "opera-javascript-code-execution(36039)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36039"
|
||||
},
|
||||
{
|
||||
"name": "25331",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25331"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2904",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2904"
|
||||
},
|
||||
{
|
||||
"name" : "1018572",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018572"
|
||||
},
|
||||
{
|
||||
"name" : "26477",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26477"
|
||||
},
|
||||
{
|
||||
"name" : "26635",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26635"
|
||||
},
|
||||
{
|
||||
"name": "26545",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26545"
|
||||
},
|
||||
{
|
||||
"name" : "opera-javascript-code-execution(36039)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36039"
|
||||
"name": "26477",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26477"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070812 CounterPath X-Lite SIP phone Remote Denial of Service vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/476259/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "4285",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4285"
|
||||
},
|
||||
{
|
||||
"name": "counterpath-sip-invite-dos(35975)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35975"
|
||||
},
|
||||
{
|
||||
"name": "25299",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25299"
|
||||
},
|
||||
{
|
||||
"name": "20070812 CounterPath X-Lite SIP phone Remote Denial of Service vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/476259/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "3027",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3027"
|
||||
},
|
||||
{
|
||||
"name" : "counterpath-sip-invite-dos(35975)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35975"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://groups.google.com/group/intersystems-public-cache/browse_thread/thread/57d7c80dde26fda3/7845e246da5b095b"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.intersystems.com/support/cflash/2007announce.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.intersystems.com/support/cflash/2007announce.html"
|
||||
},
|
||||
{
|
||||
"name": "40178",
|
||||
"refsource": "OSVDB",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "26541",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26541"
|
||||
},
|
||||
{
|
||||
"name": "http://www.intersystems.com/support/cflash/2007announce.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.intersystems.com/support/cflash/2007announce.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070925 SimpNews version 2.41.03 Multiple XSS Attack Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/480598/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.netvigilance.com/advisory0070",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.netvigilance.com/advisory0070"
|
||||
},
|
||||
{
|
||||
"name": "http://forum.boesch-it.de/viewtopic.php?t=2791",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://forum.boesch-it.de/viewtopic.php?t=2791"
|
||||
},
|
||||
{
|
||||
"name": "3166",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3166"
|
||||
},
|
||||
{
|
||||
"name": "25809",
|
||||
"refsource": "BID",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "http://secunia.com/advisories/26965"
|
||||
},
|
||||
{
|
||||
"name" : "3166",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3166"
|
||||
"name": "20070925 SimpNews version 2.41.03 Multiple XSS Attack Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/480598/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.netvigilance.com/advisory0070",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.netvigilance.com/advisory0070"
|
||||
},
|
||||
{
|
||||
"name": "simpnews-comment-layout-xss(36774)",
|
||||
|
@ -58,34 +58,34 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/479600/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://airscanner.com/security/07080701_axis.htm",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://airscanner.com/security/07080701_axis.htm"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.informit.com/articles/article.aspx?p=1016102",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.informit.com/articles/article.aspx?p=1016102"
|
||||
"name": "3145",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3145"
|
||||
},
|
||||
{
|
||||
"name": "25678",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25678"
|
||||
},
|
||||
{
|
||||
"name": "http://airscanner.com/security/07080701_axis.htm",
|
||||
"refsource": "MISC",
|
||||
"url": "http://airscanner.com/security/07080701_axis.htm"
|
||||
},
|
||||
{
|
||||
"name": "1018699",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018699"
|
||||
},
|
||||
{
|
||||
"name": "http://www.informit.com/articles/article.aspx?p=1016102",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.informit.com/articles/article.aspx?p=1016102"
|
||||
},
|
||||
{
|
||||
"name": "26831",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26831"
|
||||
},
|
||||
{
|
||||
"name" : "3145",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3145"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-5592",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#803465",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/803465"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#803465",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/803465"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150228 CVE Request: PuTTY fails to clear private key information from memory",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/02/28/4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20150228 Re: CVE Request: PuTTY fails to clear private key information from memory",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/02/28/5"
|
||||
},
|
||||
{
|
||||
"name": "http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html"
|
||||
"name": "FEDORA-2015-3160",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151933.html"
|
||||
},
|
||||
{
|
||||
"name": "72825",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72825"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3190",
|
||||
@ -83,14 +78,19 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151790.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2015-3204",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151839.html"
|
||||
"name": "[oss-security] 20150228 CVE Request: PuTTY fails to clear private key information from memory",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/02/28/4"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2015-3160",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151933.html"
|
||||
"name": "http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150228 Re: CVE Request: PuTTY fails to clear private key information from memory",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/02/28/5"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0474",
|
||||
@ -98,9 +98,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00032.html"
|
||||
},
|
||||
{
|
||||
"name" : "72825",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/72825"
|
||||
"name": "FEDORA-2015-3204",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151839.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.theregister.co.uk/2014/12/19/hack_hijacks_boosted_skateboards_kills_hipsters/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.theregister.co.uk/2014/12/19/hack_hijacks_boosted_skateboards_kills_hipsters/"
|
||||
},
|
||||
{
|
||||
"name": "https://speakerdeck.com/richo/building-a-hipster-catapult-or-how2own-your-skateboard",
|
||||
"refsource": "MISC",
|
||||
"url": "https://speakerdeck.com/richo/building-a-hipster-catapult-or-how2own-your-skateboard"
|
||||
},
|
||||
{
|
||||
"name" : "https://twitter.com/aphyr/status/576502129264738304",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://twitter.com/aphyr/status/576502129264738304"
|
||||
},
|
||||
{
|
||||
"name": "https://twitter.com/rich0H/status/576484574504439808",
|
||||
"refsource": "MISC",
|
||||
"url": "https://twitter.com/rich0H/status/576484574504439808"
|
||||
},
|
||||
{
|
||||
"name": "http://www.theregister.co.uk/2014/12/19/hack_hijacks_boosted_skateboards_kills_hipsters/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.theregister.co.uk/2014/12/19/hack_hijacks_boosted_skateboards_kills_hipsters/"
|
||||
},
|
||||
{
|
||||
"name": "https://twitter.com/aphyr/status/576502129264738304",
|
||||
"refsource": "MISC",
|
||||
"url": "https://twitter.com/aphyr/status/576502129264738304"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2015-2446",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS15-079",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-079"
|
||||
"name": "1033237",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033237"
|
||||
},
|
||||
{
|
||||
"name": "MS15-091",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-091"
|
||||
},
|
||||
{
|
||||
"name" : "1033237",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033237"
|
||||
"name": "MS15-079",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-079"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2015-2864",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,20 +53,15 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.youtube.com/watch?v=MB8AL5u7JCA",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.youtube.com/watch?v=MB8AL5u7JCA"
|
||||
"name": "VU#101500",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/101500"
|
||||
},
|
||||
{
|
||||
"name": "http://www.retrospect.com/support/kb/cve_2015_2864",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.retrospect.com/support/kb/cve_2015_2864"
|
||||
},
|
||||
{
|
||||
"name" : "VU#101500",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/101500"
|
||||
},
|
||||
{
|
||||
"name": "75201",
|
||||
"refsource": "BID",
|
||||
@ -76,6 +71,11 @@
|
||||
"name": "1033948",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033948"
|
||||
},
|
||||
{
|
||||
"name": "https://www.youtube.com/watch?v=MB8AL5u7JCA",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.youtube.com/watch?v=MB8AL5u7JCA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2015-6645",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://source.android.com/security/bulletin/2016-01-01.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://source.android.com/security/bulletin/2016-01-01.html"
|
||||
},
|
||||
{
|
||||
"name": "1034592",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034592"
|
||||
},
|
||||
{
|
||||
"name": "http://source.android.com/security/bulletin/2016-01-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://source.android.com/security/bulletin/2016-01-01.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-7137",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2015-7614",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-509",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-509"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1033796",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033796"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-509",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-509"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2016-0182",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160510 Microsoft Windows Journal OOB Write Memory Corruption Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1225"
|
||||
},
|
||||
{
|
||||
"name" : "MS16-056",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-056"
|
||||
},
|
||||
{
|
||||
"name": "89867",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "1035824",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035824"
|
||||
},
|
||||
{
|
||||
"name": "MS16-056",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-056"
|
||||
},
|
||||
{
|
||||
"name": "20160510 Microsoft Windows Journal OOB Write Memory Corruption Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1225"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-0575",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-0717",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2016-10144",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,24 +58,9 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/01/16/6"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20170116 Re: CVE Request: Imagemagick: various flaws: memory corruption, out-of-bounds writes, memory leaks, double-frees, off-by-one errors",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2017/01/17/5"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851485",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851485"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3799",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2017/dsa-3799"
|
||||
"name": "95750",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95750"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201702-09",
|
||||
@ -83,9 +68,24 @@
|
||||
"url": "https://security.gentoo.org/glsa/201702-09"
|
||||
},
|
||||
{
|
||||
"name" : "95750",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/95750"
|
||||
"name": "DSA-3799",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3799"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20170116 Re: CVE Request: Imagemagick: various flaws: memory corruption, out-of-bounds writes, memory leaks, double-frees, off-by-one errors",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/01/17/5"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851485",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851485"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20181129 [SECURITY] [DLA 1600-1] libarchive security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html"
|
||||
"name": "97327",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97327"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/libarchive/libarchive/issues/842",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/libarchive/libarchive/issues/842"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20181129 [SECURITY] [DLA 1600-1] libarchive security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4360",
|
||||
"refsource": "DEBIAN",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "USN-3736-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3736-1/"
|
||||
},
|
||||
{
|
||||
"name" : "97327",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/97327"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-10297",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2017-05-01",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2017-05-01"
|
||||
},
|
||||
{
|
||||
"name": "98241",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/98241"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2017-05-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-05-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1482",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160914 Cisco WebEx Meetings Server Remote Command Execution Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-wem"
|
||||
"name": "1036809",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036809"
|
||||
},
|
||||
{
|
||||
"name": "92959",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/92959"
|
||||
},
|
||||
{
|
||||
"name" : "1036809",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036809"
|
||||
"name": "20160914 Cisco WebEx Meetings Server Remote Command Execution Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-wem"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160622 Open-Xchange Security Advisory 2016-06-22",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/538732/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1036157",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036157"
|
||||
},
|
||||
{
|
||||
"name": "20160622 Open-Xchange Security Advisory 2016-06-22",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/538732/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20160419 Re: CVE Request: Privilege escalation in webdav - Plone",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/04/20/1"
|
||||
},
|
||||
{
|
||||
"name": "https://plone.org/security/hotfix/20160419/privilege-escalation-in-webdav",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://plone.org/security/hotfix/20160419/privilege-escalation-in-webdav"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160419 Re: CVE Request: Privilege escalation in webdav - Plone",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/04/20/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-4164",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-4199",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,11 +57,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-417"
|
||||
},
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
|
||||
},
|
||||
{
|
||||
"name": "91716",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "1036281",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036281"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2016-4986",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user