"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:20:55 +00:00
parent 979bdf904c
commit 73c87a06a8
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
63 changed files with 3409 additions and 3409 deletions

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://projects.info-pull.com/moab/MOAB-22-01-2007.html", "name": "32695",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://projects.info-pull.com/moab/MOAB-22-01-2007.html" "url": "http://www.osvdb.org/32695"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=305102",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=305102"
}, },
{ {
"name": "APPLE-SA-2007-02-15", "name": "APPLE-SA-2007-02-15",
@ -73,44 +68,49 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA07-047A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA07-047A.html"
}, },
{ {
"name" : "VU#315856", "name": "24198",
"refsource" : "CERT-VN", "refsource": "SECUNIA",
"url" : "http://www.kb.cert.org/vuls/id/315856" "url": "http://secunia.com/advisories/24198"
}, },
{ {
"name" : "22188", "name": "http://docs.info.apple.com/article.html?artnum=305102",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/22188" "url": "http://docs.info.apple.com/article.html?artnum=305102"
}, },
{ {
"name" : "ADV-2007-0074", "name": "macos-inputmanager-privilege-escalation(31676)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2007/0074" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31676"
},
{
"name" : "32695",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/32695"
}, },
{ {
"name": "1017542", "name": "1017542",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017542" "url": "http://securitytracker.com/id?1017542"
}, },
{
"name": "VU#315856",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/315856"
},
{
"name": "http://projects.info-pull.com/moab/MOAB-22-01-2007.html",
"refsource": "MISC",
"url": "http://projects.info-pull.com/moab/MOAB-22-01-2007.html"
},
{ {
"name": "23846", "name": "23846",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23846" "url": "http://secunia.com/advisories/23846"
}, },
{ {
"name" : "24198", "name": "ADV-2007-0074",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/24198" "url": "http://www.vupen.com/english/advisories/2007/0074"
}, },
{ {
"name" : "macos-inputmanager-privilege-escalation(31676)", "name": "22188",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31676" "url": "http://www.securityfocus.com/bid/22188"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-0212", "ID": "CVE-2007-0212",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "23794",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23794"
},
{
"name": "22083",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22083"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -63,9 +73,14 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA07-017A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA07-017A.html"
}, },
{ {
"name" : "22083", "name": "oracle-cpu-jan2007(31541)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/22083" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31541"
},
{
"name": "1017522",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017522"
}, },
{ {
"name": "32883", "name": "32883",
@ -76,21 +91,6 @@
"name": "32884", "name": "32884",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/32884" "url": "http://osvdb.org/32884"
},
{
"name" : "1017522",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017522"
},
{
"name" : "23794",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23794"
},
{
"name" : "oracle-cpu-jan2007(31541)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31541"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460913/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/460913/100/0/threaded"
}, },
{
"name": "2332",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2332"
},
{ {
"name": "22669", "name": "22669",
"refsource": "BID", "refsource": "BID",
@ -66,11 +71,6 @@
"name": "33139", "name": "33139",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/33139" "url": "http://osvdb.org/33139"
},
{
"name" : "2332",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2332"
} }
] ]
} }

View File

@ -53,49 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070416 Clam AntiVirus ClamAV CAB File Unstore Buffer Overflow Vulnerability", "name": "25022",
"refsource" : "IDEFENSE", "refsource": "SECUNIA",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=513" "url": "http://secunia.com/advisories/25022"
},
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=500765",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=500765"
},
{
"name" : "http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=307562",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name" : "APPLE-SA-2008-03-18",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name" : "DSA-1281",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1281"
},
{
"name" : "GLSA-200704-21",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200704-21.xml"
},
{
"name" : "MDKSA-2007:098",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:098"
},
{
"name" : "SUSE-SA:2007:026",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_26_clamav.html"
}, },
{ {
"name": "2007-0013", "name": "2007-0013",
@ -103,19 +63,9 @@
"url": "http://www.trustix.org/errata/2007/0013/" "url": "http://www.trustix.org/errata/2007/0013/"
}, },
{ {
"name" : "23473", "name": "clamav-cabunstore-cabextract-bo(33637)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/23473" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33637"
},
{
"name" : "ADV-2007-1378",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1378"
},
{
"name" : "ADV-2008-0924",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0924/references"
}, },
{ {
"name": "1017921", "name": "1017921",
@ -123,19 +73,14 @@
"url": "http://www.securitytracker.com/id?1017921" "url": "http://www.securitytracker.com/id?1017921"
}, },
{ {
"name" : "24891", "name": "20070416 Clam AntiVirus ClamAV CAB File Unstore Buffer Overflow Vulnerability",
"refsource" : "SECUNIA", "refsource": "IDEFENSE",
"url" : "http://secunia.com/advisories/24891" "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=513"
}, },
{ {
"name" : "24920", "name": "23473",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/24920" "url": "http://www.securityfocus.com/bid/23473"
},
{
"name" : "24946",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24946"
}, },
{ {
"name": "24996", "name": "24996",
@ -143,19 +88,19 @@
"url": "http://secunia.com/advisories/24996" "url": "http://secunia.com/advisories/24996"
}, },
{ {
"name" : "25022", "name": "MDKSA-2007:098",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/25022" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:098"
}, },
{ {
"name" : "25028", "name": "ADV-2008-0924",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/25028" "url": "http://www.vupen.com/english/advisories/2008/0924/references"
}, },
{ {
"name" : "25189", "name": "SUSE-SA:2007:026",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/25189" "url": "http://www.novell.com/linux/security/advisories/2007_26_clamav.html"
}, },
{ {
"name": "29420", "name": "29420",
@ -163,9 +108,64 @@
"url": "http://secunia.com/advisories/29420" "url": "http://secunia.com/advisories/29420"
}, },
{ {
"name" : "clamav-cabunstore-cabextract-bo(33637)", "name": "APPLE-SA-2008-03-18",
"refsource" : "XF", "refsource": "APPLE",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33637" "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name": "25189",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25189"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307562",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name": "http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=500765",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=500765"
},
{
"name": "ADV-2007-1378",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1378"
},
{
"name": "25028",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25028"
},
{
"name": "GLSA-200704-21",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200704-21.xml"
},
{
"name": "24946",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24946"
},
{
"name": "DSA-1281",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1281"
},
{
"name": "24920",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24920"
},
{
"name": "24891",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24891"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "35183",
"refsource": "OSVDB",
"url": "http://osvdb.org/35183"
},
{ {
"name": "20070326 Satel Lite for PhpNuke (Satellite.php) <= Local File Inclusion", "name": "20070326 Satel Lite for PhpNuke (Satellite.php) <= Local File Inclusion",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/463828/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/463828/100/0/threaded"
}, },
{
"name": "satellite-satellite-file-include(33214)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33214"
},
{ {
"name": "23143", "name": "23143",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/23143" "url": "http://www.securityfocus.com/bid/23143"
}, },
{
"name" : "35183",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35183"
},
{ {
"name": "2830", "name": "2830",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2830" "url": "http://securityreason.com/securityalert/2830"
},
{
"name" : "satellite-satellite-file-include(33214)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33214"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "26000",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26000"
},
{
"name": "38083",
"refsource": "OSVDB",
"url": "http://osvdb.org/38083"
},
{ {
"name": "20071224 Double directory traversal in ImgSvr 0.6.21", "name": "20071224 Double directory traversal in ImgSvr 0.6.21",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,16 +71,6 @@
"name": "24853", "name": "24853",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/24853" "url": "http://www.securityfocus.com/bid/24853"
},
{
"name" : "38083",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38083"
},
{
"name" : "26000",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26000"
} }
] ]
} }

View File

@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070710 Portcullis Computer Security Ltd - Advisories", "name": "26061",
"refsource" : "FULLDISC", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=full-disclosure&m=118409539009277&w=2" "url": "http://secunia.com/advisories/26061"
},
{
"name" : "http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20070710/98374694/attachment-0030.txt",
"refsource" : "MISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20070710/98374694/attachment-0030.txt"
},
{
"name" : "ADV-2007-2528",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2528"
}, },
{ {
"name": "37909", "name": "37909",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37909" "url": "http://osvdb.org/37909"
}, },
{
"name" : "26061",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26061"
},
{ {
"name": "2883", "name": "2883",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2883" "url": "http://securityreason.com/securityalert/2883"
}, },
{
"name": "ADV-2007-2528",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2528"
},
{ {
"name": "surgeftp-pasv-dos(35376)", "name": "surgeftp-pasv-dos(35376)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35376" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35376"
},
{
"name": "http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20070710/98374694/attachment-0030.txt",
"refsource": "MISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20070710/98374694/attachment-0030.txt"
},
{
"name": "20070710 Portcullis Computer Security Ltd - Advisories",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=118409539009277&w=2"
} }
] ]
} }

View File

@ -52,15 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "38994",
"refsource": "OSVDB",
"url": "http://osvdb.org/38994"
},
{ {
"name": "20070724 PR07-21: Webbler CMS forms are susceptible to spamming and phishing abuses", "name": "20070724 PR07-21: Webbler CMS forms are susceptible to spamming and phishing abuses",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474521/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/474521/100/0/threaded"
}, },
{ {
"name" : "http://tincan.co.uk/?lid=1975", "name": "2955",
"refsource" : "MISC", "refsource": "SREASON",
"url" : "http://tincan.co.uk/?lid=1975" "url": "http://securityreason.com/securityalert/2955"
}, },
{ {
"name": "http://www.procheckup.com/Vulner_2007.php", "name": "http://www.procheckup.com/Vulner_2007.php",
@ -68,14 +73,9 @@
"url": "http://www.procheckup.com/Vulner_2007.php" "url": "http://www.procheckup.com/Vulner_2007.php"
}, },
{ {
"name" : "38994", "name": "http://tincan.co.uk/?lid=1975",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://osvdb.org/38994" "url": "http://tincan.co.uk/?lid=1975"
},
{
"name" : "2955",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2955"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://drupal.org/node/168760",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/node/168760"
},
{ {
"name": "25364", "name": "25364",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25364" "url": "http://www.securityfocus.com/bid/25364"
}, },
{
"name": "26510",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26510"
},
{ {
"name": "39632", "name": "39632",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/39632" "url": "http://osvdb.org/39632"
}, },
{ {
"name" : "26510", "name": "http://drupal.org/node/168760",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/26510" "url": "http://drupal.org/node/168760"
}, },
{ {
"name": "project-title-information-disclosure(36105)", "name": "project-title-information-disclosure(36105)",

View File

@ -52,26 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070908 Netjuke 1.0-rc2 - sql injection & XSS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/478871/100/0/threaded"
},
{ {
"name": "25600", "name": "25600",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25600" "url": "http://www.securityfocus.com/bid/25600"
}, },
{
"name" : "38833",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38833"
},
{ {
"name": "38834", "name": "38834",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/38834" "url": "http://osvdb.org/38834"
}, },
{
"name": "20070908 Netjuke 1.0-rc2 - sql injection & XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478871/100/0/threaded"
},
{ {
"name": "3110", "name": "3110",
"refsource": "SREASON", "refsource": "SREASON",
@ -81,6 +76,11 @@
"name": "netjuke-explore-xml-sql-injection(36516)", "name": "netjuke-explore-xml-sql-injection(36516)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36516" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36516"
},
{
"name": "38833",
"refsource": "OSVDB",
"url": "http://osvdb.org/38833"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070918 Plague in (security) software drivers & BSDOhook utility", "name": "25712",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/479830/100/0/threaded" "url": "http://www.securityfocus.com/bid/25712"
}, },
{ {
"name": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php", "name": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php",
@ -67,15 +67,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php"
}, },
{
"name" : "25712",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25712"
},
{ {
"name": "45952", "name": "45952",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/45952" "url": "http://osvdb.org/45952"
},
{
"name": "20070918 Plague in (security) software drivers & BSDOhook utility",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5917", "ID": "CVE-2014-5917",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#133081", "name": "VU#133081",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5977", "ID": "CVE-2014-5977",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#335041", "name": "VU#335041",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-2003", "ID": "CVE-2015-2003",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://alephsecurity.com/vulns/aleph-2015004",
"refsource" : "MISC",
"url" : "https://alephsecurity.com/vulns/aleph-2015004"
},
{ {
"name": "https://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdf", "name": "https://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdf" "url": "https://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdf"
},
{
"name": "https://alephsecurity.com/vulns/aleph-2015004",
"refsource": "MISC",
"url": "https://alephsecurity.com/vulns/aleph-2015004"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2015-2125", "ID": "CVE-2015-2125",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -62,11 +62,6 @@
"refsource": "HP", "refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04695307" "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04695307"
}, },
{
"name" : "SSRT102038",
"refsource" : "HP",
"url" : "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04695307"
},
{ {
"name": "75036", "name": "75036",
"refsource": "BID", "refsource": "BID",
@ -76,6 +71,11 @@
"name": "1032478", "name": "1032478",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032478" "url": "http://www.securitytracker.com/id/1032478"
},
{
"name": "SSRT102038",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04695307"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150227 Re: CVE-Request -- phpBugTracker v. 1.6.0 -- Multiple SQLi, stored/reflecting XSS- and CSRF-vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/02/28/1"
},
{ {
"name": "http://cve.killedkenny.io/cve/CVE-2015-2147", "name": "http://cve.killedkenny.io/cve/CVE-2015-2147",
"refsource": "MISC", "refsource": "MISC",
"url": "http://cve.killedkenny.io/cve/CVE-2015-2147" "url": "http://cve.killedkenny.io/cve/CVE-2015-2147"
},
{
"name": "[oss-security] 20150227 Re: CVE-Request -- phpBugTracker v. 1.6.0 -- Multiple SQLi, stored/reflecting XSS- and CSRF-vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/02/28/1"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-2407", "ID": "CVE-2015-2407",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-2991", "ID": "CVE-2015-2991",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.nscripter.com/",
"refsource" : "CONFIRM",
"url" : "http://www.nscripter.com/"
},
{ {
"name": "JVN#08494613", "name": "JVN#08494613",
"refsource": "JVN", "refsource": "JVN",
@ -66,6 +61,11 @@
"name": "JVNDB-2015-000123", "name": "JVNDB-2015-000123",
"refsource": "JVNDB", "refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000123" "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000123"
},
{
"name": "http://www.nscripter.com/",
"refsource": "CONFIRM",
"url": "http://www.nscripter.com/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6106", "ID": "CVE-2015-6106",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS15-128", "name": "1034333",
"refsource" : "MS", "refsource": "SECTRACK",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-128" "url": "http://www.securitytracker.com/id/1034333"
}, },
{ {
"name": "1034331", "name": "1034331",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034331" "url": "http://www.securitytracker.com/id/1034331"
}, },
{
"name": "MS15-128",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-128"
},
{ {
"name": "1034332", "name": "1034332",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034332" "url": "http://www.securitytracker.com/id/1034332"
}, },
{
"name" : "1034333",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034333"
},
{ {
"name": "1034336", "name": "1034336",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6450", "ID": "CVE-2015-6450",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@suse.com",
"ID": "CVE-2015-6836", "ID": "CVE-2015-6836",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1033548",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033548"
},
{ {
"name": "http://www.php.net/ChangeLog-5.php", "name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,6 +67,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=70388" "url": "https://bugs.php.net/bug.php?id=70388"
}, },
{
"name": "76644",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76644"
},
{ {
"name": "DSA-3358", "name": "DSA-3358",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -71,16 +81,6 @@
"name": "GLSA-201606-10", "name": "GLSA-201606-10",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201606-10" "url": "https://security.gentoo.org/glsa/201606-10"
},
{
"name" : "76644",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/76644"
},
{
"name" : "1033548",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033548"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2015-6851", "ID": "CVE-2015-6851",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,6 +57,11 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2015/Dec/115" "url": "http://seclists.org/bugtraq/2015/Dec/115"
}, },
{
"name": "1034510",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034510"
},
{ {
"name": "http://packetstormsecurity.com/files/135013/RSA-SecurID-Web-Agent-Authentication-Bypass.html", "name": "http://packetstormsecurity.com/files/135013/RSA-SecurID-Web-Agent-Authentication-Bypass.html",
"refsource": "MISC", "refsource": "MISC",
@ -66,11 +71,6 @@
"name": "79646", "name": "79646",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/79646" "url": "http://www.securityfocus.com/bid/79646"
},
{
"name" : "1034510",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034510"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-6991", "ID": "CVE-2015-6991",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT205370", "name": "APPLE-SA-2015-10-21-4",
"refsource" : "CONFIRM", "refsource": "APPLE",
"url" : "https://support.apple.com/HT205370" "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
},
{
"name" : "https://support.apple.com/HT205375",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205375"
}, },
{ {
"name": "APPLE-SA-2015-10-21-1", "name": "APPLE-SA-2015-10-21-1",
@ -68,9 +63,14 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
}, },
{ {
"name" : "APPLE-SA-2015-10-21-4", "name": "https://support.apple.com/HT205375",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html" "url": "https://support.apple.com/HT205375"
},
{
"name": "https://support.apple.com/HT205370",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205370"
}, },
{ {
"name": "77263", "name": "77263",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-7287", "ID": "CVE-2015-7287",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "VU#428280",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/428280"
},
{ {
"name": "http://cybergibbons.com/?p=2844", "name": "http://cybergibbons.com/?p=2844",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "http://www.kb.cert.org/vuls/id/BLUU-A3NQAL", "name": "http://www.kb.cert.org/vuls/id/BLUU-A3NQAL",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/BLUU-A3NQAL" "url": "http://www.kb.cert.org/vuls/id/BLUU-A3NQAL"
},
{
"name" : "VU#428280",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/428280"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0407", "ID": "CVE-2016-0407",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{ {
"name": "1035610", "name": "1035610",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035610" "url": "http://www.securitytracker.com/id/1035610"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0511", "ID": "CVE-2016-0511",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-0808", "ID": "CVE-2016-0808",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-02-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-02-01.html"
},
{ {
"name": "https://android.googlesource.com/platform/frameworks/minikin/+/ed4c8d79153baab7f26562afb8930652dfbf853b", "name": "https://android.googlesource.com/platform/frameworks/minikin/+/ed4c8d79153baab7f26562afb8930652dfbf853b",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/minikin/+/ed4c8d79153baab7f26562afb8930652dfbf853b" "url": "https://android.googlesource.com/platform/frameworks/minikin/+/ed4c8d79153baab7f26562afb8930652dfbf853b"
},
{
"name": "http://source.android.com/security/bulletin/2016-02-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-02-01.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2016-0867", "ID": "CVE-2016-0867",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -72,6 +72,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1040138",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040138"
},
{ {
"name": "https://www.symantec.com/security-center/network-protection-security-advisories/SA155", "name": "https://www.symantec.com/security-center/network-protection-security-advisories/SA155",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -81,11 +86,6 @@
"name": "102447", "name": "102447",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102447" "url": "http://www.securityfocus.com/bid/102447"
},
{
"name" : "1040138",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040138"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1112", "ID": "CVE-2016-1112",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html", "name": "1035828",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html" "url": "http://www.securitytracker.com/id/1035828"
}, },
{ {
"name": "90510", "name": "90510",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/90510" "url": "http://www.securityfocus.com/bid/90510"
}, },
{ {
"name" : "1035828", "name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1035828" "url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1157", "ID": "CVE-2016-1157",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://r.o0o0.jp/sc/log-chat/",
"refsource" : "CONFIRM",
"url" : "http://r.o0o0.jp/sc/log-chat/"
},
{ {
"name": "JVN#93535632", "name": "JVN#93535632",
"refsource": "JVN", "refsource": "JVN",
@ -66,6 +61,11 @@
"name": "JVNDB-2016-000031", "name": "JVNDB-2016-000031",
"refsource": "JVNDB", "refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000031" "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000031"
},
{
"name": "http://r.o0o0.jp/sc/log-chat/",
"refsource": "CONFIRM",
"url": "http://r.o0o0.jp/sc/log-chat/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1467", "ID": "CVE-2016-1467",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160727 Cisco Videoscape Session Resource Manager Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-vsrm"
},
{ {
"name": "92151", "name": "92151",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92151" "url": "http://www.securityfocus.com/bid/92151"
},
{
"name": "20160727 Cisco Videoscape Session Resource Manager Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-vsrm"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-1595", "ID": "CVE-2016-1595",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://www.novell.com/support/kb/doc.php?id=7017430",
"refsource": "CONFIRM",
"url": "https://www.novell.com/support/kb/doc.php?id=7017430"
},
{
"name": "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/novell-service-desk-7.1.0.txt",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/novell-service-desk-7.1.0.txt"
},
{
"name": "https://packetstormsecurity.com/files/136646",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/136646"
},
{ {
"name": "20160410 [Multiple CVE]: RCE, info disclosure, HQL injection and stored XSS in Novell Service Desk 7.1.0", "name": "20160410 [Multiple CVE]: RCE, info disclosure, HQL injection and stored XSS in Novell Service Desk 7.1.0",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,21 +76,6 @@
"name": "39687", "name": "39687",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39687/" "url": "https://www.exploit-db.com/exploits/39687/"
},
{
"name" : "https://packetstormsecurity.com/files/136646",
"refsource" : "MISC",
"url" : "https://packetstormsecurity.com/files/136646"
},
{
"name" : "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/novell-service-desk-7.1.0.txt",
"refsource" : "MISC",
"url" : "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/novell-service-desk-7.1.0.txt"
},
{
"name" : "https://www.novell.com/support/kb/doc.php?id=7017430",
"refsource" : "CONFIRM",
"url" : "https://www.novell.com/support/kb/doc.php?id=7017430"
} }
] ]
} }

View File

@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{ {
"name": "https://security-tracker.debian.org/tracker/CVE-2016-4000", "name": "https://security-tracker.debian.org/tracker/CVE-2016-4000",
"refsource": "MISC", "refsource": "MISC",
"url": "https://security-tracker.debian.org/tracker/CVE-2016-4000" "url": "https://security-tracker.debian.org/tracker/CVE-2016-4000"
}, },
{
"name": "https://hg.python.org/jython/rev/d06e29d100c0",
"refsource": "CONFIRM",
"url": "https://hg.python.org/jython/rev/d06e29d100c0"
},
{ {
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451", "name": "https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451",
"refsource": "MISC", "refsource": "MISC",
@ -68,9 +78,9 @@
"url": "http://bugs.jython.org/issue2454" "url": "http://bugs.jython.org/issue2454"
}, },
{ {
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859", "name": "DSA-3893",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859" "url": "http://www.debian.org/security/2017/dsa-3893"
}, },
{ {
"name": "https://hg.python.org/jython/file/v2.7.1rc1/NEWS", "name": "https://hg.python.org/jython/file/v2.7.1rc1/NEWS",
@ -78,25 +88,15 @@
"url": "https://hg.python.org/jython/file/v2.7.1rc1/NEWS" "url": "https://hg.python.org/jython/file/v2.7.1rc1/NEWS"
}, },
{ {
"name" : "https://hg.python.org/jython/rev/d06e29d100c0", "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://hg.python.org/jython/rev/d06e29d100c0" "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859"
}, },
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
}, },
{
"name" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name" : "DSA-3893",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3893"
},
{ {
"name": "GLSA-201710-28", "name": "GLSA-201710-28",
"refsource": "GENTOO", "refsource": "GENTOO",

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160505 Re: CVE Request: No Demangling During Analysis of Untrusted Binaries",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/05/5"
},
{ {
"name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498", "name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498" "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498"
}, },
{
"name": "[oss-security] 20160505 Re: CVE Request: No Demangling During Analysis of Untrusted Binaries",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/05/5"
},
{ {
"name": "90019", "name": "90019",
"refsource": "BID", "refsource": "BID",

View File

@ -53,54 +53,54 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT206902", "name": "1036344",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT206902" "url": "http://www.securitytracker.com/id/1036344"
},
{
"name" : "https://support.apple.com/HT206903",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206903"
},
{
"name" : "https://support.apple.com/HT206904",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206904"
},
{
"name" : "https://support.apple.com/HT206905",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206905"
},
{
"name" : "APPLE-SA-2016-07-18-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name" : "APPLE-SA-2016-07-18-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
},
{
"name" : "APPLE-SA-2016-07-18-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
}, },
{ {
"name": "APPLE-SA-2016-07-18-4", "name": "APPLE-SA-2016-07-18-4",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
}, },
{
"name": "APPLE-SA-2016-07-18-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
},
{
"name": "APPLE-SA-2016-07-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
},
{ {
"name": "91834", "name": "91834",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91834" "url": "http://www.securityfocus.com/bid/91834"
}, },
{ {
"name" : "1036344", "name": "APPLE-SA-2016-07-18-1",
"refsource" : "SECTRACK", "refsource": "APPLE",
"url" : "http://www.securitytracker.com/id/1036344" "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name": "https://support.apple.com/HT206905",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206905"
},
{
"name": "https://support.apple.com/HT206903",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206903"
},
{
"name": "https://support.apple.com/HT206902",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206902"
},
{
"name": "https://support.apple.com/HT206904",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206904"
} }
] ]
} }

View File

@ -54,9 +54,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://launchpad.support.sap.com/#/notes/2706798", "name": "107004",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://launchpad.support.sap.com/#/notes/2706798" "url": "http://www.securityfocus.com/bid/107004"
}, },
{ {
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943", "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943",
@ -64,9 +64,9 @@
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943" "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
}, },
{ {
"name" : "107004", "name": "https://launchpad.support.sap.com/#/notes/2706798",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/107004" "url": "https://launchpad.support.sap.com/#/notes/2706798"
} }
] ]
} }