"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:38:20 +00:00
parent b3f6e8330f
commit 744e539b5e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 3758 additions and 3758 deletions

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070111 Ezboxx multiple vulnerabilities.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/456699/100/0/threaded"
"name": "ADV-2007-0208",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0208"
},
{
"name": "http://www.bugsec.com/articles.php?Security=20",
@ -63,19 +63,19 @@
"url": "http://www.bugsec.com/articles.php?Security=20"
},
{
"name" : "ADV-2007-0208",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0208"
"name": "33470",
"refsource": "OSVDB",
"url": "http://osvdb.org/33470"
},
{
"name": "20070111 Ezboxx multiple vulnerabilities.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456699/100/0/threaded"
},
{
"name": "32829",
"refsource": "OSVDB",
"url": "http://osvdb.org/32829"
},
{
"name" : "33470",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33470"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20070125 Aztek Forum 4.1 Multiple Vulnerabilities Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/458076/100/0/threaded"
},
{
"name" : "20070125 Re: Aztek Forum 4.1 Multiple Vulnerabilities Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/458123/100/0/threaded"
},
{
"name": "http://acid-root.new.fr/poc/21070125.txt",
"refsource": "MISC",
@ -71,6 +61,16 @@
"name": "33594",
"refsource": "OSVDB",
"url": "http://osvdb.org/33594"
},
{
"name": "20070125 Aztek Forum 4.1 Multiple Vulnerabilities Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/458076/100/0/threaded"
},
{
"name": "20070125 Re: Aztek Forum 4.1 Multiple Vulnerabilities Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/458123/100/0/threaded"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "24449",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24449"
},
{
"name": "ADV-2007-0884",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0884"
},
{
"name": "3435",
"refsource": "EXPLOIT-DB",
@ -62,16 +72,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22875"
},
{
"name" : "ADV-2007-0884",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0884"
},
{
"name" : "24449",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24449"
},
{
"name": "netforo-down-directory-traversal(32878)",
"refsource": "XF",

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070404 ESRI ArcSDE Buffer Overflow Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=507"
},
{
"name" : "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1260",
"refsource" : "CONFIRM",
"url" : "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1260"
},
{
"name" : "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1261",
"refsource" : "CONFIRM",
"url" : "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1261"
},
{
"name" : "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1262",
"refsource" : "CONFIRM",
"url" : "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1262"
"name": "1017874",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017874"
},
{
"name": "23175",
@ -78,29 +63,44 @@
"url": "http://www.securityfocus.com/bid/23175"
},
{
"name" : "ADV-2007-1140",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1140"
},
{
"name" : "1017874",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017874"
"name": "arcsde-tcpport-bo(33457)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33457"
},
{
"name": "24639",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24639"
},
{
"name": "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1261",
"refsource": "CONFIRM",
"url": "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1261"
},
{
"name": "arcsde-three-tiered-dos(33282)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33282"
},
{
"name" : "arcsde-tcpport-bo(33457)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33457"
"name": "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1262",
"refsource": "CONFIRM",
"url": "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1262"
},
{
"name": "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1260",
"refsource": "CONFIRM",
"url": "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1260"
},
{
"name": "20070404 ESRI ArcSDE Buffer Overflow Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=507"
},
{
"name": "ADV-2007-1140",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1140"
}
]
}

View File

@ -52,26 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20070416 Akamai Technologies Security Advisory 2007-0001",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/465908/100/0/threaded"
},
{
"name" : "23522",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23522"
},
{
"name" : "ADV-2007-1415",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1415"
},
{
"name": "34324",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/34324"
},
{
"name": "20070416 Akamai Technologies Security Advisory 2007-0001",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/465908/100/0/threaded"
},
{
"name": "24900",
"refsource": "SECUNIA",
@ -81,6 +71,16 @@
"name": "akamai-download-manager-bo(33697)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33697"
},
{
"name": "ADV-2007-1415",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1415"
},
{
"name": "23522",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23522"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070917 Alcatel-Lucent OmniPCX Remote Command Execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/479699/100/0/threaded"
},
{
"name" : "20070917 Alcatel-Lucent OmniPCX Remote Command Execution",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=119002152126755&w=2"
"name": "ADV-2007-3185",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3185"
},
{
"name": "http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php",
@ -73,14 +68,14 @@
"url": "http://www1.alcatel-lucent.com/psirt/statements/2007002/OXEUMT.htm"
},
{
"name" : "25694",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25694"
"name": "26853",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26853"
},
{
"name" : "ADV-2007-3185",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3185"
"name": "20070917 Alcatel-Lucent OmniPCX Remote Command Execution",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=119002152126755&w=2"
},
{
"name": "40521",
@ -88,14 +83,19 @@
"url": "http://osvdb.org/40521"
},
{
"name" : "26853",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26853"
"name": "20070917 Alcatel-Lucent OmniPCX Remote Command Execution",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/479699/100/0/threaded"
},
{
"name": "alcatel-unified-mastercgi-command-execution(36632)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36632"
},
{
"name": "25694",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25694"
}
]
}

View File

@ -53,299 +53,69 @@
"references": {
"reference_data": [
{
"name" : "20070529 Apache httpd vulenrabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/469899/100/0/threaded"
},
{
"name" : "20070619 Apache Prefork MPM vulnerabilities - Report",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/471832/100/0/threaded"
},
{
"name" : "20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/505990/100/0/threaded"
},
{
"name" : "[apache-httpd-dev] 20070622 Re: PID table changes (was Re: svn commit: r547987 - in /httpd/httpd/trunk)",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=apache-httpd-dev&m=118252946632447&w=2"
},
{
"name" : "[apache-httpd-dev] 20070629 Re: [PATCH] pid safety checks for 2.2.x",
"refsource" : "MLIST",
"url" : "http://mail-archives.apache.org/mod_mbox/httpd-dev/200706.mbox/%3c20070629141032.GA15192@redhat.com%3e"
},
{
"name" : "[security-announce] 20090820 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server",
"refsource" : "MLIST",
"url" : "http://lists.vmware.com/pipermail/security-announce/2009/000062.html"
},
{
"name" : "http://security.psnc.pl/files/apache_report.pdf",
"refsource" : "MISC",
"url" : "http://security.psnc.pl/files/apache_report.pdf"
"name": "28606",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28606"
},
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245111",
"refsource": "MISC",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245111"
},
{
"name" : "http://svn.apache.org/viewvc?view=rev&revision=547987",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=rev&revision=547987"
},
{
"name" : "http://httpd.apache.org/security/vulnerabilities_13.html",
"refsource" : "CONFIRM",
"url" : "http://httpd.apache.org/security/vulnerabilities_13.html"
},
{
"name" : "http://httpd.apache.org/security/vulnerabilities_20.html",
"refsource" : "CONFIRM",
"url" : "http://httpd.apache.org/security/vulnerabilities_20.html"
},
{
"name" : "http://httpd.apache.org/security/vulnerabilities_22.html",
"refsource" : "CONFIRM",
"url" : "http://httpd.apache.org/security/vulnerabilities_22.html"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-363.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-363.htm"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1710",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1710"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=186219",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=186219"
},
{
"name" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html",
"refsource" : "CONFIRM",
"url" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html"
},
{
"name" : "PK50467",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=PK50467&apar=only"
},
{
"name" : "PK52702",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702"
},
{
"name" : "PK53984",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1PK53984"
},
{
"name" : "FEDORA-2007-2214",
"refsource" : "FEDORA",
"url" : "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html"
},
{
"name" : "GLSA-200711-06",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200711-06.xml"
},
{
"name" : "HPSBUX02273",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588"
},
{
"name" : "SSRT071476",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588"
},
{
"name" : "MDKSA-2007:140",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:140"
},
{
"name": "MDKSA-2007:142",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:142"
},
{
"name" : "RHSA-2007:0532",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/errata/RHSA-2007-0532.html"
},
{
"name" : "RHSA-2007:0556",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0556.html"
},
{
"name" : "RHSA-2007:0557",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0557.html"
},
{
"name" : "RHSA-2007:0662",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0662.html"
},
{
"name" : "RHSA-2008:0261",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
},
{
"name" : "20070701-01-P",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc"
},
{
"name" : "103179",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1"
},
{
"name" : "200032",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1"
},
{
"name" : "SUSE-SA:2007:061",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_61_apache2.html"
},
{
"name" : "2007-0026",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2007/0026/"
},
{
"name" : "USN-499-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-499-1"
},
{
"name" : "24215",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24215"
},
{
"name" : "38939",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38939"
},
{
"name" : "oval:org.mitre.oval:def:11589",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11589"
},
{
"name" : "ADV-2007-2727",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2727"
},
{
"name" : "ADV-2007-3100",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3100"
},
{
"name" : "ADV-2007-3283",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3283"
},
{
"name" : "ADV-2007-3420",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3420"
},
{
"name" : "ADV-2007-3494",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3494"
},
{
"name" : "ADV-2007-4305",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/4305"
},
{
"name" : "1018304",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018304"
},
{
"name" : "25827",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25827"
},
{
"name" : "25830",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25830"
},
{
"name" : "25920",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25920"
},
{
"name" : "26211",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26211"
},
{
"name" : "26273",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26273"
},
{
"name" : "26443",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26443"
},
{
"name" : "26508",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26508"
},
{
"name" : "26611",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26611"
},
{
"name" : "26759",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26759"
},
{
"name" : "26790",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26790"
},
{
"name": "26822",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26822"
},
{
"name" : "26842",
"name": "ADV-2007-4305",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4305"
},
{
"name": "ADV-2007-3420",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3420"
},
{
"name": "RHSA-2007:0557",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0557.html"
},
{
"name": "38939",
"refsource": "OSVDB",
"url": "http://osvdb.org/38939"
},
{
"name": "PK52702",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702"
},
{
"name": "MDKSA-2007:140",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:140"
},
{
"name": "HPSBUX02273",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588"
},
{
"name": "25827",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/26842"
"url": "http://secunia.com/advisories/25827"
},
{
"name": "25920",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25920"
},
{
"name": "26993",
@ -353,14 +123,19 @@
"url": "http://secunia.com/advisories/26993"
},
{
"name" : "27121",
"name": "28212",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/27121"
"url": "http://secunia.com/advisories/28212"
},
{
"name" : "27209",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27209"
"name": "http://security.psnc.pl/files/apache_report.pdf",
"refsource": "MISC",
"url": "http://security.psnc.pl/files/apache_report.pdf"
},
{
"name": "1018304",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018304"
},
{
"name": "27563",
@ -373,34 +148,259 @@
"url": "http://secunia.com/advisories/27732"
},
{
"name" : "28212",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28212"
"name": "http://svn.apache.org/viewvc?view=rev&revision=547987",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=rev&revision=547987"
},
{
"name" : "28224",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28224"
"name": "103179",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1"
},
{
"name" : "28606",
"name": "27209",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/28606"
"url": "http://secunia.com/advisories/27209"
},
{
"name": "RHSA-2007:0662",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0662.html"
},
{
"name": "26790",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26790"
},
{
"name": "RHSA-2007:0556",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0556.html"
},
{
"name": "http://httpd.apache.org/security/vulnerabilities_20.html",
"refsource": "CONFIRM",
"url": "http://httpd.apache.org/security/vulnerabilities_20.html"
},
{
"name": "SUSE-SA:2007:061",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_61_apache2.html"
},
{
"name": "20070529 Apache httpd vulenrabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/469899/100/0/threaded"
},
{
"name": "FEDORA-2007-2214",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html"
},
{
"name": "[apache-httpd-dev] 20070622 Re: PID table changes (was Re: svn commit: r547987 - in /httpd/httpd/trunk)",
"refsource": "MLIST",
"url": "http://marc.info/?l=apache-httpd-dev&m=118252946632447&w=2"
},
{
"name": "26759",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26759"
},
{
"name": "ADV-2007-3494",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3494"
},
{
"name": "PK50467",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=PK50467&apar=only"
},
{
"name": "2007-0026",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0026/"
},
{
"name": "RHSA-2007:0532",
"refsource": "REDHAT",
"url": "http://www.redhat.com/errata/RHSA-2007-0532.html"
},
{
"name": "http://httpd.apache.org/security/vulnerabilities_22.html",
"refsource": "CONFIRM",
"url": "http://httpd.apache.org/security/vulnerabilities_22.html"
},
{
"name": "https://issues.rpath.com/browse/RPL-1710",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1710"
},
{
"name": "[apache-httpd-dev] 20070629 Re: [PATCH] pid safety checks for 2.2.x",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/httpd-dev/200706.mbox/%3c20070629141032.GA15192@redhat.com%3e"
},
{
"name": "20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/505990/100/0/threaded"
},
{
"name": "2814",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2814"
},
{
"name": "oval:org.mitre.oval:def:11589",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11589"
},
{
"name": "27121",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27121"
},
{
"name": "20070619 Apache Prefork MPM vulnerabilities - Report",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471832/100/0/threaded"
},
{
"name": "ADV-2008-0233",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0233"
},
{
"name": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html",
"refsource": "CONFIRM",
"url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html"
},
{
"name": "26211",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26211"
},
{
"name": "apache-child-process-dos(35095)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35095"
},
{
"name": "26443",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26443"
},
{
"name": "[security-announce] 20090820 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server",
"refsource": "MLIST",
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html"
},
{
"name": "http://httpd.apache.org/security/vulnerabilities_13.html",
"refsource": "CONFIRM",
"url": "http://httpd.apache.org/security/vulnerabilities_13.html"
},
{
"name": "GLSA-200711-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200711-06.xml"
},
{
"name": "28224",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28224"
},
{
"name": "200032",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1"
},
{
"name": "25830",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25830"
},
{
"name": "24215",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24215"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-363.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-363.htm"
},
{
"name": "USN-499-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-499-1"
},
{
"name": "RHSA-2008:0261",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
},
{
"name": "26508",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26508"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm"
},
{
"name": "26842",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26842"
},
{
"name": "ADV-2007-3283",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3283"
},
{
"name": "20070701-01-P",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc"
},
{
"name": "PK53984",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK53984"
},
{
"name": "ADV-2007-2727",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2727"
},
{
"name": "26611",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26611"
},
{
"name": "26273",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26273"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=186219",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=186219"
},
{
"name": "ADV-2007-3100",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3100"
},
{
"name": "SSRT071476",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588"
}
]
}

View File

@ -57,31 +57,16 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4109"
},
{
"name" : "http://www.shinnai.altervista.org/exploits/ntcwavchunkstxt.html",
"refsource" : "MISC",
"url" : "http://www.shinnai.altervista.org/exploits/ntcwavchunkstxt.html"
},
{
"name" : "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Exploits&argument=Remote&topic=1182845325.ff.php&page=last",
"refsource" : "MISC",
"url" : "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Exploits&argument=Remote&topic=1182845325.ff.php&page=last"
},
{
"name" : "24656",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24656"
},
{
"name" : "ADV-2007-2351",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2351"
},
{
"name": "37673",
"refsource": "OSVDB",
"url": "http://osvdb.org/37673"
},
{
"name": "http://www.shinnai.altervista.org/exploits/ntcwavchunkstxt.html",
"refsource": "MISC",
"url": "http://www.shinnai.altervista.org/exploits/ntcwavchunkstxt.html"
},
{
"name": "25851",
"refsource": "SECUNIA",
@ -91,6 +76,21 @@
"name": "nctaudiostudio2-createfile-file-overwrite(35081)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35081"
},
{
"name": "24656",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24656"
},
{
"name": "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Exploits&argument=Remote&topic=1182845325.ff.php&page=last",
"refsource": "MISC",
"url": "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Exploits&argument=Remote&topic=1182845325.ff.php&page=last"
},
{
"name": "ADV-2007-2351",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2351"
}
]
}

View File

@ -53,30 +53,25 @@
"references": {
"reference_data": [
{
"name" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",
"refsource" : "MISC",
"url" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf"
"name": "SSRT061201",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143"
},
{
"name": "26114",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26114"
},
{
"name": "26166",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26166"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html"
},
{
"name" : "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html",
"refsource" : "MISC",
"url" : "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html"
},
{
"name" : "HPSBMA02133",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143"
},
{
"name" : "SSRT061201",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143"
},
{
"name": "TA07-200A",
"refsource": "CERT",
@ -93,24 +88,29 @@
"url": "http://www.vupen.com/english/advisories/2007/2635"
},
{
"name" : "1018415",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018415"
},
{
"name" : "26114",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26114"
},
{
"name" : "26166",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26166"
"name": "HPSBMA02133",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143"
},
{
"name": "oracle-cpu-july2007(35490)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490"
},
{
"name": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",
"refsource": "MISC",
"url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf"
},
{
"name": "1018415",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018415"
},
{
"name": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html",
"refsource": "MISC",
"url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html"
}
]
}

View File

@ -57,16 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477424/100/0/threaded"
},
{
"name" : "20070511 Teamspeak Server 2.0.20.1 Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2007-05/0165.html"
},
{
"name" : "http://securityvulns.com/Rdocument6.html",
"refsource" : "MISC",
"url" : "http://securityvulns.com/Rdocument6.html"
},
{
"name": "23933",
"refsource": "BID",
@ -77,15 +67,25 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/36048"
},
{
"name": "25242",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25242"
},
{
"name": "http://securityvulns.com/Rdocument6.html",
"refsource": "MISC",
"url": "http://securityvulns.com/Rdocument6.html"
},
{
"name": "36049",
"refsource": "OSVDB",
"url": "http://osvdb.org/36049"
},
{
"name" : "25242",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25242"
"name": "20070511 Teamspeak Server 2.0.20.1 Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-05/0165.html"
},
{
"name": "teamspeak-errorbox-okbox-xss(34252)",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "25689",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25689"
},
{
"name": "ADV-2007-3186",
"refsource": "VUPEN",
@ -67,6 +62,11 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26841"
},
{
"name": "25689",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25689"
},
{
"name": "tinywebgallery-multiple-scripts-xss(36644)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5854",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#525825",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "36086",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/36086"
},
{
"name": "http://security.szurek.pl/wonderplugin-audio-player-20-blind-sql-injection-and-xss.html",
"refsource": "MISC",
"url": "http://security.szurek.pl/wonderplugin-audio-player-20-blind-sql-injection-and-xss.html"
},
{
"name" : "http://www.wonderplugin.com/wordpress-audio-player/",
"refsource" : "MISC",
"url" : "http://www.wonderplugin.com/wordpress-audio-player/"
"name": "118511",
"refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/118511"
},
{
"name": "74851",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74851"
},
{
"name": "36086",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/36086"
},
{
"name": "118510",
"refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/118510"
},
{
"name" : "118511",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/show/osvdb/118511"
"name": "http://www.wonderplugin.com/wordpress-audio-player/",
"refsource": "MISC",
"url": "http://www.wonderplugin.com/wordpress-audio-player/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2015-2311",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150317 Re: CVE Request: Cap'n Proto: Several issues",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/03/17/3"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780566",
"refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780566"
},
{
"name": "[oss-security] 20150317 Re: CVE Request: Cap'n Proto: Several issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/03/17/3"
},
{
"name": "https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-1-c%2B%2B-integer-underflow.md",
"refsource": "CONFIRM",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-2733",
"STATE": "PUBLIC"
},
@ -53,34 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-65.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-65.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1169867",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1169867"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name" : "GLSA-201512-10",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201512-10"
},
{
"name" : "RHSA-2015:1207",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1207.html"
"name": "openSUSE-SU-2015:1229",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html"
},
{
"name": "SUSE-SU-2015:1268",
@ -88,34 +63,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html"
},
{
"name" : "SUSE-SU-2015:1269",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html"
"name": "GLSA-201512-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201512-10"
},
{
"name" : "SUSE-SU-2015:1449",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html"
},
{
"name" : "openSUSE-SU-2015:1266",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
},
{
"name" : "openSUSE-SU-2015:1229",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html"
},
{
"name" : "USN-2656-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2656-1"
},
{
"name" : "USN-2656-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2656-2"
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1169867",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1169867"
},
{
"name": "75541",
@ -123,14 +78,59 @@
"url": "http://www.securityfocus.com/bid/75541"
},
{
"name" : "1032783",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032783"
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "1032784",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032784"
},
{
"name": "RHSA-2015:1207",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1207.html"
},
{
"name": "SUSE-SU-2015:1269",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html"
},
{
"name": "openSUSE-SU-2015:1266",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
},
{
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-65.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-65.html"
},
{
"name": "USN-2656-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2656-1"
},
{
"name": "SUSE-SU-2015:1449",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html"
},
{
"name": "1032783",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032783"
},
{
"name": "USN-2656-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2656-2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-2944",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://issues.apache.org/jira/browse/SLING-2082",
"refsource" : "CONFIRM",
"url" : "https://issues.apache.org/jira/browse/SLING-2082"
},
{
"name": "JVN#61328139",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN61328139/index.html"
},
{
"name" : "JVNDB-2015-000069",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000069"
},
{
"name": "74839",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74839"
},
{
"name": "https://issues.apache.org/jira/browse/SLING-2082",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/SLING-2082"
},
{
"name": "JVNDB-2015-000069",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000069"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6213",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6256",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6865",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6888",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7044",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205637"
},
{
"name" : "APPLE-SA-2015-12-08-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{
"name": "1034344",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034344"
},
{
"name": "APPLE-SA-2015-12-08-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10712",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10712"
},
{
"name": "79627",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1034490",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034490"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10712",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10712"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-7921",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0032",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0128",
"STATE": "PUBLIC"
},
@ -52,21 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.samba.org/samba/security/CVE-2016-2118.html",
"refsource" : "MISC",
"url" : "https://www.samba.org/samba/security/CVE-2016-2118.html"
},
{
"name": "http://badlock.org/",
"refsource": "MISC",
"url": "http://badlock.org/"
},
{
"name" : "https://bto.bluecoat.com/security-advisory/sa122",
"refsource" : "CONFIRM",
"url" : "https://bto.bluecoat.com/security-advisory/sa122"
},
{
"name": "MS16-047",
"refsource": "MS",
@ -77,6 +67,16 @@
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/813296"
},
{
"name": "https://www.samba.org/samba/security/CVE-2016-2118.html",
"refsource": "MISC",
"url": "https://www.samba.org/samba/security/CVE-2016-2118.html"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa122",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa122"
},
{
"name": "1035534",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-04-03T00:00:00",
"ID": "CVE-2016-10236",
"STATE": "PUBLIC"

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20160119 [CORE-2016-0001] - Intel Driver Update Utility MiTM",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/537327/100/0/threaded"
},
{
"name" : "20160119 [CORE-2016-0001] - Intel Driver Update Utility MiTM",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Jan/56"
},
{
"name": "http://packetstormsecurity.com/files/135314/Intel-Driver-Update-Utility-2.2.0.5-Man-In-The-Middle.html",
"refsource": "MISC",
@ -76,6 +66,16 @@
"name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00048&languageid=en-fr",
"refsource": "CONFIRM",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00048&languageid=en-fr"
},
{
"name": "20160119 [CORE-2016-0001] - Intel Driver Update Utility MiTM",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537327/100/0/threaded"
},
{
"name": "20160119 [CORE-2016-0001] - Intel Driver Update Utility MiTM",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Jan/56"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2016-1695",
"STATE": "PUBLIC"
},
@ -52,85 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
},
{
"name" : "https://crbug.com/582698",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/582698"
},
{
"name": "https://crbug.com/582714",
"refsource": "CONFIRM",
"url": "https://crbug.com/582714"
},
{
"name" : "https://crbug.com/585658",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/585658"
},
{
"name" : "https://crbug.com/587897",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/587897"
},
{
"name" : "https://crbug.com/588178",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/588178"
},
{
"name" : "https://crbug.com/588548",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/588548"
},
{
"name" : "https://crbug.com/595262",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/595262"
},
{
"name" : "https://crbug.com/599081",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/599081"
},
{
"name" : "https://crbug.com/599627",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/599627"
},
{
"name" : "https://crbug.com/602046",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/602046"
},
{
"name": "https://crbug.com/602185",
"refsource": "CONFIRM",
"url": "https://crbug.com/602185"
},
{
"name" : "https://crbug.com/605474",
"name": "https://crbug.com/614767",
"refsource": "CONFIRM",
"url" : "https://crbug.com/605474"
"url": "https://crbug.com/614767"
},
{
"name" : "https://crbug.com/607483",
"name": "https://crbug.com/599081",
"refsource": "CONFIRM",
"url" : "https://crbug.com/607483"
"url": "https://crbug.com/599081"
},
{
"name" : "https://crbug.com/609134",
"name": "https://crbug.com/588178",
"refsource": "CONFIRM",
"url" : "https://crbug.com/609134"
"url": "https://crbug.com/588178"
},
{
"name" : "https://crbug.com/610646",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/610646"
"name": "90876",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90876"
},
{
"name": "https://crbug.com/611887",
@ -143,69 +93,119 @@
"url": "https://crbug.com/612132"
},
{
"name" : "https://crbug.com/612364",
"name": "https://crbug.com/610646",
"refsource": "CONFIRM",
"url" : "https://crbug.com/612364"
"url": "https://crbug.com/610646"
},
{
"name" : "https://crbug.com/612613",
"name": "https://crbug.com/605474",
"refsource": "CONFIRM",
"url" : "https://crbug.com/612613"
},
{
"name" : "https://crbug.com/614767",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/614767"
},
{
"name" : "https://www.tenable.com/security/tns-2016-18",
"refsource" : "CONFIRM",
"url" : "https://www.tenable.com/security/tns-2016-18"
},
{
"name" : "DSA-3590",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3590"
},
{
"name" : "GLSA-201607-07",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201607-07"
},
{
"name" : "RHSA-2016:1190",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1190"
},
{
"name" : "openSUSE-SU-2016:1430",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
},
{
"name" : "openSUSE-SU-2016:1433",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
"url": "https://crbug.com/605474"
},
{
"name": "openSUSE-SU-2016:1496",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
},
{
"name": "1035981",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035981"
},
{
"name": "DSA-3590",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3590"
},
{
"name": "https://crbug.com/602046",
"refsource": "CONFIRM",
"url": "https://crbug.com/602046"
},
{
"name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
},
{
"name": "https://crbug.com/607483",
"refsource": "CONFIRM",
"url": "https://crbug.com/607483"
},
{
"name": "https://crbug.com/585658",
"refsource": "CONFIRM",
"url": "https://crbug.com/585658"
},
{
"name": "USN-2992-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2992-1"
},
{
"name" : "90876",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90876"
"name": "openSUSE-SU-2016:1430",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
},
{
"name" : "1035981",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035981"
"name": "https://www.tenable.com/security/tns-2016-18",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-18"
},
{
"name": "https://crbug.com/582698",
"refsource": "CONFIRM",
"url": "https://crbug.com/582698"
},
{
"name": "RHSA-2016:1190",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1190"
},
{
"name": "https://crbug.com/612364",
"refsource": "CONFIRM",
"url": "https://crbug.com/612364"
},
{
"name": "https://crbug.com/599627",
"refsource": "CONFIRM",
"url": "https://crbug.com/599627"
},
{
"name": "https://crbug.com/587897",
"refsource": "CONFIRM",
"url": "https://crbug.com/587897"
},
{
"name": "https://crbug.com/609134",
"refsource": "CONFIRM",
"url": "https://crbug.com/609134"
},
{
"name": "https://crbug.com/595262",
"refsource": "CONFIRM",
"url": "https://crbug.com/595262"
},
{
"name": "https://crbug.com/588548",
"refsource": "CONFIRM",
"url": "https://crbug.com/588548"
},
{
"name": "GLSA-201607-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-07"
},
{
"name": "https://crbug.com/612613",
"refsource": "CONFIRM",
"url": "https://crbug.com/612613"
},
{
"name": "openSUSE-SU-2016:1433",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1774",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "1035342",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035342"
},
{
"name": "85054",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85054"
},
{
"name": "https://support.apple.com/HT206173",
"refsource": "CONFIRM",
@ -61,16 +71,6 @@
"name": "APPLE-SA-2016-03-21-7",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00006.html"
},
{
"name" : "85054",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/85054"
},
{
"name" : "1035342",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035342"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4212",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"name": "91716",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1036281",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036281"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"DATE_ASSIGNED": "2019-03-06T22:44:37.386888",
"ID": "CVE-2019-1003036",
"REQUESTER": "ml@beckweb.net",

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-036-03",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-036-03"
},
{
"name": "106861",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106861"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-036-03",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-036-03"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html"
},
{
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html"
},
{
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html"
},
{
"name": "https://bugzilla.libsdl.org/show_bug.cgi?id=4499",
"refsource": "MISC",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugs.php.net/bug.php?id=77540",
"refsource" : "MISC",
"url" : "https://bugs.php.net/bug.php?id=77540"
},
{
"name": "DSA-4403",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4403"
},
{
"name": "https://bugs.php.net/bug.php?id=77540",
"refsource": "MISC",
"url": "https://bugs.php.net/bug.php?id=77540"
}
]
}