"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:56:11 +00:00
parent b45dfea59f
commit 751cb51d70
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 4177 additions and 4177 deletions

View File

@ -52,21 +52,31 @@
},
"references": {
"reference_data": [
{
"name" : "http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt",
"refsource" : "MISC",
"url" : "http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt"
},
{
"name": "17044",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17044"
},
{
"name": "sblog-username-xss(25111)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25111"
},
{
"name": "http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt",
"refsource": "MISC",
"url": "http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt"
},
{
"name": "ADV-2006-0883",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0883"
},
{
"name": "19151",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19151"
},
{
"name": "23759",
"refsource": "OSVDB",
@ -76,16 +86,6 @@
"name": "23760",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23760"
},
{
"name" : "19151",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19151"
},
{
"name" : "sblog-username-xss(25111)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25111"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2006-1186",
"STATE": "PUBLIC"
},
@ -53,9 +53,34 @@
"references": {
"reference_data": [
{
"name" : "MS06-013",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013"
"name": "VU#959049",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/959049"
},
{
"name": "18957",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18957"
},
{
"name": "oval:org.mitre.oval:def:1589",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1589"
},
{
"name": "oval:org.mitre.oval:def:1446",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1446"
},
{
"name": "1015900",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015900"
},
{
"name": "oval:org.mitre.oval:def:1651",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1651"
},
{
"name": "TA06-101A",
@ -63,9 +88,9 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA06-101A.html"
},
{
"name" : "VU#959049",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/959049"
"name": "MS06-013",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013"
},
{
"name": "17453",
@ -78,19 +103,9 @@
"url": "http://www.vupen.com/english/advisories/2006/1318"
},
{
"name" : "oval:org.mitre.oval:def:1446",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1446"
},
{
"name" : "oval:org.mitre.oval:def:1589",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1589"
},
{
"name" : "oval:org.mitre.oval:def:1651",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1651"
"name": "ie-com-activex-execute-code(25545)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25545"
},
{
"name": "oval:org.mitre.oval:def:1704",
@ -101,21 +116,6 @@
"name": "oval:org.mitre.oval:def:791",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A791"
},
{
"name" : "1015900",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015900"
},
{
"name" : "18957",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18957"
},
{
"name" : "ie-com-activex-execute-code(25545)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25545"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "1015733",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015733"
},
{
"name": "19171",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19171"
},
{
"name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.03.07.html",
"refsource": "CONFIRM",
@ -66,16 +76,6 @@
"name": "ADV-2006-0870",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0870"
},
{
"name" : "1015733",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015733"
},
{
"name" : "19171",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19171"
}
]
}

View File

@ -52,21 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm"
},
{
"name": "20428",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20428"
},
{
"name" : "ADV-2006-3998",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3998"
},
{
"name": "1017025",
"refsource": "SECTRACK",
@ -81,6 +71,16 @@
"name": "novell-bordermanager-unspecified-dos(29447)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29447"
},
{
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm",
"refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm"
},
{
"name": "ADV-2006-3998",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3998"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20061012 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/448422/100/100/threaded"
},
{
"name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
"refsource": "VIM",
"url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
},
{
"name": "20061012 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/448422/100/100/threaded"
},
{
"name": "http://www.secureworks.com/press/20061011-dell.html",
"refsource": "MISC",
@ -87,15 +87,15 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22402"
},
{
"name" : "1744",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1744"
},
{
"name": "toshiba-bluetooth-stack-code-execute(29503)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29503"
},
{
"name": "1744",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1744"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20061018 {x0n3-h4ck} DEV Web Manager System <= 1.5 XSS Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/449121/100/0/threaded"
},
{
"name": "http://www.x0n3-h4ck.org/index.php?name=news&article=139",
"refsource": "MISC",
@ -72,6 +67,11 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1758"
},
{
"name": "20061018 {x0n3-h4ck} DEV Web Manager System <= 1.5 XSS Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/449121/100/0/threaded"
},
{
"name": "dev-index-xss(29659)",
"refsource": "XF",

View File

@ -52,60 +52,60 @@
},
"references": {
"reference_data": [
{
"name" : "20061101 Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/450270/100/0/threaded"
},
{
"name" : "20061111 Re: Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/451350/100/100/threaded"
},
{
"name" : "20061031 Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050462.html"
},
{
"name" : "http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt",
"refsource" : "MISC",
"url" : "http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt"
},
{
"name" : "http://virtech.org/tools/",
"refsource" : "CONFIRM",
"url" : "http://virtech.org/tools/"
},
{
"name": "20837",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20837"
},
{
"name" : "ADV-2006-4512",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4512"
},
{
"name" : "1017147",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017147"
},
{
"name": "22864",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22864"
},
{
"name": "ADV-2006-4512",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4512"
},
{
"name": "http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt",
"refsource": "MISC",
"url": "http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt"
},
{
"name": "20061111 Re: Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/451350/100/100/threaded"
},
{
"name": "1017147",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017147"
},
{
"name": "1807",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1807"
},
{
"name": "20061031 Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050462.html"
},
{
"name": "netquery-nquser-xss(29927)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29927"
},
{
"name": "http://virtech.org/tools/",
"refsource": "CONFIRM",
"url": "http://virtech.org/tools/"
},
{
"name": "20061101 Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/450270/100/0/threaded"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2006-5692",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "3761",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3761"
"name": "mozzers-subsystem-index-code-execution(33739)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33739"
},
{
"name": "23548",
@ -68,9 +68,9 @@
"url": "http://www.vupen.com/english/advisories/2007/1446"
},
{
"name" : "mozzers-subsystem-index-code-execution(33739)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33739"
"name": "3761",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3761"
}
]
}

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "http://moaxb.blogspot.com/2007/05/moaxb-09-barcodewiz-activex-control-20.html",
"refsource" : "MISC",
"url" : "http://moaxb.blogspot.com/2007/05/moaxb-09-barcodewiz-activex-control-20.html"
},
{
"name": "http://www.shinnai.altervista.org/moaxb/20070509/barcodewiz.txt",
"refsource": "MISC",
"url": "http://www.shinnai.altervista.org/moaxb/20070509/barcodewiz.txt"
},
{
"name" : "23891",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23891"
"name": "barcodewiz-barcodewiz-bo(34180)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34180"
},
{
"name": "25209",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25209"
},
{
"name": "ADV-2007-1728",
@ -78,14 +78,14 @@
"url": "http://osvdb.org/35869"
},
{
"name" : "25209",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25209"
"name": "http://moaxb.blogspot.com/2007/05/moaxb-09-barcodewiz-activex-control-20.html",
"refsource": "MISC",
"url": "http://moaxb.blogspot.com/2007/05/moaxb-09-barcodewiz-activex-control-20.html"
},
{
"name" : "barcodewiz-barcodewiz-bo(34180)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34180"
"name": "23891",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23891"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "4637",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4637"
},
{
"name" : "http://www.securityfocus.com/bid/31941/exploit",
"refsource" : "MISC",
"url" : "http://www.securityfocus.com/bid/31941/exploit"
},
{
"name": "26505",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26505"
},
{
"name" : "31941",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31941"
},
{
"name" : "ADV-2007-3962",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3962"
},
{
"name": "bcoos-click-sql-injection(38594)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38594"
},
{
"name": "4637",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4637"
},
{
"name": "ADV-2007-3962",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3962"
},
{
"name": "bcoos-bid-sql-injection(46156)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46156"
},
{
"name": "http://www.securityfocus.com/bid/31941/exploit",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/31941/exploit"
},
{
"name": "31941",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31941"
}
]
}

View File

@ -52,90 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://crypto.stanford.edu/advisories/CVE-2007-6244/",
"refsource" : "MISC",
"url" : "http://crypto.stanford.edu/advisories/CVE-2007-6244/"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb07-20.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb07-20.html"
},
{
"name" : "GLSA-200801-07",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml"
},
{
"name" : "RHSA-2007:1126",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1126.html"
},
{
"name" : "238305",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1"
},
{
"name": "SUSE-SA:2007:069",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html"
},
{
"name" : "TA07-355A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-355A.html"
},
{
"name" : "VU#758769",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/758769"
},
{
"name" : "26929",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26929"
},
{
"name" : "26949",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26949"
},
{
"name" : "26960",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26960"
},
{
"name" : "oval:org.mitre.oval:def:10210",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10210"
},
{
"name" : "ADV-2007-4258",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/4258"
},
{
"name" : "ADV-2008-1724",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1724/references"
},
{
"name" : "1019116",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019116"
},
{
"name": "28157",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28157"
},
{
"name" : "28161",
"name": "30507",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/28161"
"url": "http://secunia.com/advisories/30507"
},
{
"name": "adobe-navigatetourl-xss(39131)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39131"
},
{
"name": "28570",
@ -143,14 +78,49 @@
"url": "http://secunia.com/advisories/28570"
},
{
"name" : "28213",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28213"
"name": "26960",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26960"
},
{
"name" : "30507",
"name": "ADV-2008-1724",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1724/references"
},
{
"name": "TA07-355A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html"
},
{
"name": "GLSA-200801-07",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml"
},
{
"name": "http://crypto.stanford.edu/advisories/CVE-2007-6244/",
"refsource": "MISC",
"url": "http://crypto.stanford.edu/advisories/CVE-2007-6244/"
},
{
"name": "oval:org.mitre.oval:def:10210",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10210"
},
{
"name": "26929",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26929"
},
{
"name": "28161",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/30507"
"url": "http://secunia.com/advisories/28161"
},
{
"name": "RHSA-2007:1126",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html"
},
{
"name": "adobe-asfunction-protocol-xss(39130)",
@ -158,9 +128,39 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39130"
},
{
"name" : "adobe-navigatetourl-xss(39131)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39131"
"name": "238305",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1"
},
{
"name": "ADV-2007-4258",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4258"
},
{
"name": "1019116",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019116"
},
{
"name": "26949",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26949"
},
{
"name": "VU#758769",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/758769"
},
{
"name": "28213",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28213"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb07-20.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20071204 PR07-39: Multiple vulnerabilities on Absolute News Manager.NET 5.1 including file retrieval and SQL injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/484560/100/0/threaded"
},
{
"name": "http://www.procheckup.com/Vulnerability_PR07-39.php",
"refsource": "MISC",
@ -72,6 +67,11 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3421"
},
{
"name": "20071204 PR07-39: Multiple vulnerabilities on Absolute News Manager.NET 5.1 including file retrieval and SQL injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/484560/100/0/threaded"
},
{
"name": "absolutenewsmanager-getpath-info-disclosure(38874)",
"refsource": "XF",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225",
"refsource" : "MISC",
"url" : "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
},
{
"name" : "JVN#44736880",
"refsource" : "JVN",
"url" : "http://jvn.jp/jp/JVN%2344736880/index.html"
"name": "ADV-2007-4312",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4312"
},
{
"name": "JVNDB-2007-000822",
@ -73,9 +68,19 @@
"url": "http://www.securityfocus.com/bid/27017"
},
{
"name" : "ADV-2007-4312",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/4312"
"name": "winace-uue-bo(39268)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
},
{
"name": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225",
"refsource": "MISC",
"url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
},
{
"name": "JVN#44736880",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2344736880/index.html"
},
{
"name": "40267",
@ -86,11 +91,6 @@
"name": "28215",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28215"
},
{
"name" : "winace-uue-bo(39268)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2010-0117",
"STATE": "PUBLIC"
},
@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://secunia.com/secunia_research/2010-5/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2010-5/"
},
{
"name" : "http://service.real.com/realplayer/security/08262010_player/en/",
"refsource" : "CONFIRM",
"url" : "http://service.real.com/realplayer/security/08262010_player/en/"
},
{
"name" : "oval:org.mitre.oval:def:7169",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7169"
},
{
"name" : "1024370",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024370"
"name": "ADV-2010-2216",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2216"
},
{
"name": "41096",
@ -78,19 +63,34 @@
"url": "http://secunia.com/advisories/41096"
},
{
"name" : "41154",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41154"
},
{
"name" : "ADV-2010-2216",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2216"
"name": "http://service.real.com/realplayer/security/08262010_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/08262010_player/en/"
},
{
"name": "realplayer-yuv420-code-execution(61421)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61421"
},
{
"name": "http://secunia.com/secunia_research/2010-5/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2010-5/"
},
{
"name": "1024370",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024370"
},
{
"name": "oval:org.mitre.oval:def:7169",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7169"
},
{
"name": "41154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41154"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-0309",
"STATE": "PUBLIC"
},
@ -53,39 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[kvm] 20100129 KVM: PIT: control word is write-only",
"refsource" : "MLIST",
"url" : "http://www.mail-archive.com/kvm@vger.kernel.org/msg28002.html"
},
{
"name" : "[oss-security] 20100202 CVE request - kvm: cat /dev/port in the guest can cause host DoS",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/02/02/1"
},
{
"name" : "[oss-security] 20100202 Re: CVE request - kvm: cat /dev/port in the guest can cause host DoS",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/02/02/4"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=560887",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=560887"
},
{
"name" : "DSA-1996",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-1996"
},
{
"name" : "RHSA-2010:0088",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2010-0088.html"
},
{
"name" : "RHSA-2010:0095",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
"name": "38158",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38158"
},
{
"name": "USN-914-1",
@ -93,19 +63,14 @@
"url": "http://www.ubuntu.com/usn/USN-914-1"
},
{
"name" : "38158",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/38158"
"name": "ADV-2010-0638",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0638"
},
{
"name" : "oval:org.mitre.oval:def:11095",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11095"
},
{
"name" : "38492",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38492"
"name": "RHSA-2010:0088",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0088.html"
},
{
"name": "38922",
@ -113,9 +78,44 @@
"url": "http://secunia.com/advisories/38922"
},
{
"name" : "ADV-2010-0638",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/0638"
"name": "[oss-security] 20100202 Re: CVE request - kvm: cat /dev/port in the guest can cause host DoS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/02/02/4"
},
{
"name": "DSA-1996",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-1996"
},
{
"name": "oval:org.mitre.oval:def:11095",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11095"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=560887",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=560887"
},
{
"name": "[oss-security] 20100202 CVE request - kvm: cat /dev/port in the guest can cause host DoS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/02/02/1"
},
{
"name": "[kvm] 20100129 KVM: PIT: control word is write-only",
"refsource": "MLIST",
"url": "http://www.mail-archive.com/kvm@vger.kernel.org/msg28002.html"
},
{
"name": "RHSA-2010:0095",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
},
{
"name": "38492",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38492"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-0745",
"STATE": "PUBLIC"
},
@ -52,55 +52,55 @@
},
"references": {
"reference_data": [
{
"name" : "[dovecot-news] 20100308 v1.2.11 released",
"refsource" : "MLIST",
"url" : "http://dovecot.org/list/dovecot-news/2010-March/000152.html"
},
{
"name" : "[dovecot] 20100227 Possible CPU Denial-Of-Service attack to dovecot IMAP.",
"refsource" : "MLIST",
"url" : "http://dovecot.org/pipermail/dovecot/2010-February/047190.html"
},
{
"name" : "[oss-security] 20100310 CVE Request -- Dovecot v1.2.11 -- DoS (excessive CPU use) by processing email with huge header",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/03/10/6"
},
{
"name" : "[oss-security] 20100401 Re: CVE Request -- Dovecot v1.2.11 -- DoS (excessive CPU use) by processing email with huge header",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=127013715227551&w=2"
},
{
"name": "http://security-tracker.debian.org/tracker/CVE-2010-0745",
"refsource": "CONFIRM",
"url": "http://security-tracker.debian.org/tracker/CVE-2010-0745"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=572268",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=572268"
},
{
"name" : "MDVSA-2010:104",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:104"
},
{
"name" : "SUSE-SR:2010:011",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
},
{
"name": "ADV-2010-1107",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1107"
},
{
"name": "[dovecot] 20100227 Possible CPU Denial-Of-Service attack to dovecot IMAP.",
"refsource": "MLIST",
"url": "http://dovecot.org/pipermail/dovecot/2010-February/047190.html"
},
{
"name": "SUSE-SR:2010:011",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
},
{
"name": "MDVSA-2010:104",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:104"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=572268",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=572268"
},
{
"name": "ADV-2010-1226",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1226"
},
{
"name": "[oss-security] 20100310 CVE Request -- Dovecot v1.2.11 -- DoS (excessive CPU use) by processing email with huge header",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/03/10/6"
},
{
"name": "[dovecot-news] 20100308 v1.2.11 released",
"refsource": "MLIST",
"url": "http://dovecot.org/list/dovecot-news/2010-March/000152.html"
},
{
"name": "[oss-security] 20100401 Re: CVE Request -- Dovecot v1.2.11 -- DoS (excessive CPU use) by processing email with huge header",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127013715227551&w=2"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-0862",
"STATE": "PUBLIC"
},
@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html"
},
{
"name": "TA10-103B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-103B.html"
},
{
"name" : "39444",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39444"
"name": "oipsr-rmo-unspecifed(57742)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57742"
},
{
"name": "1023872",
@ -73,9 +68,14 @@
"url": "http://www.securitytracker.com/id?1023872"
},
{
"name" : "oipsr-rmo-unspecifed(57742)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57742"
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html"
},
{
"name": "39444",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39444"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt",
"refsource" : "MISC",
"url" : "http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt"
"name": "38247",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38247"
},
{
"name": "61845",
"refsource": "OSVDB",
"url": "http://osvdb.org/61845"
},
{
"name" : "38247",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38247"
},
{
"name": "lookmermusicportal-mdb-info-disclosure(55751)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55751"
},
{
"name": "http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt",
"refsource": "MISC",
"url": "http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt"
}
]
}

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ipa.go.jp/about/press/20100517_2.html",
"refsource" : "MISC",
"url" : "http://www.ipa.go.jp/about/press/20100517_2.html"
},
{
"name": "http://www.nec.co.jp/security-info/secinfo/nv10-005.html",
"refsource": "CONFIRM",
"url": "http://www.nec.co.jp/security-info/secinfo/nv10-005.html"
},
{
"name" : "JVN#82749282",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN82749282/index.html"
"name": "40190",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40190"
},
{
"name": "http://www.ipa.go.jp/about/press/20100517_2.html",
"refsource": "MISC",
"url": "http://www.ipa.go.jp/about/press/20100517_2.html"
},
{
"name": "JVNDB-2010-000020",
@ -73,9 +73,9 @@
"url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000020.html"
},
{
"name" : "40190",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/40190"
"name": "ADV-2010-1166",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1166"
},
{
"name": "64701",
@ -88,9 +88,9 @@
"url": "http://secunia.com/advisories/39800"
},
{
"name" : "ADV-2010-1166",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1166"
"name": "JVN#82749282",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN82749282/index.html"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-266",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-266"
},
{
"name" : "http://service.real.com/realplayer/security/12102010_player/en/",
"refsource" : "CONFIRM",
"url" : "http://service.real.com/realplayer/security/12102010_player/en/"
},
{
"name": "RHSA-2010:0981",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0981.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-266",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-266"
},
{
"name": "1024861",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024861"
},
{
"name": "http://service.real.com/realplayer/security/12102010_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/12102010_player/en/"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21454745",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21454745"
"name": "1024901",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024901"
},
{
"name": "IC66686",
@ -63,9 +63,9 @@
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC66686"
},
{
"name" : "1024901",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1024901"
"name": "ADV-2010-3251",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3251"
},
{
"name": "42639",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/42639"
},
{
"name" : "ADV-2010-3251",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/3251"
"name": "http://www.ibm.com/support/docview.wss?uid=swg21454745",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21454745"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "15220",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/15220"
},
{
"name" : "http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt"
},
{
"name" : "43886",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/43886"
},
{
"name" : "41763",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41763"
"name": "flex-timesheet-username-sql-injection(62374)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62374"
},
{
"name": "8222",
@ -78,9 +63,24 @@
"url": "http://securityreason.com/securityalert/8222"
},
{
"name" : "flex-timesheet-username-sql-injection(62374)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62374"
"name": "41763",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41763"
},
{
"name": "15220",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15220"
},
{
"name": "43886",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43886"
},
{
"name": "http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4",
"refsource": "CONFIRM",
"url": "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4"
},
{
"name": "http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://twitter.com/digitalbond/status/619250429751222277",
"refsource": "MISC",
"url": "https://twitter.com/digitalbond/status/619250429751222277"
},
{
"name" : "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4",
"refsource" : "CONFIRM",
"url" : "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-0422",
"STATE": "PUBLIC"
},
@ -53,14 +53,64 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
"name": "56432",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56432"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1051528",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1051528"
"name": "RHSA-2014:0414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name": "RHSA-2014:0136",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0136.html"
},
{
"name": "openSUSE-SU-2014:0174",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html"
},
{
"name": "SSRT101455",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name": "RHSA-2014:0135",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0135.html"
},
{
"name": "56535",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56535"
},
{
"name": "USN-2089-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name": "RHSA-2014:0030",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
},
{
"name": "RHSA-2014:0097",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0097.html"
},
{
"name": "56485",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56485"
},
{
"name": "SSRT101454",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
@ -72,140 +122,90 @@
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
},
{
"name" : "HPSBUX02973",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name" : "SSRT101454",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
},
{
"name" : "SSRT101455",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name" : "RHSA-2014:0026",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0026.html"
},
{
"name": "RHSA-2014:0027",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0027.html"
},
{
"name" : "RHSA-2014:0097",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0097.html"
},
{
"name" : "RHSA-2014:0136",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0136.html"
},
{
"name" : "RHSA-2014:0030",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
},
{
"name" : "RHSA-2014:0134",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0134.html"
},
{
"name" : "RHSA-2014:0135",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0135.html"
},
{
"name" : "RHSA-2014:0414",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "openSUSE-SU-2014:0174",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html"
},
{
"name" : "SUSE-SU-2014:0246",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html"
},
{
"name" : "SUSE-SU-2014:0266",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html"
},
{
"name" : "openSUSE-SU-2014:0177",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html"
},
{
"name" : "openSUSE-SU-2014:0180",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html"
},
{
"name" : "SUSE-SU-2014:0451",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html"
},
{
"name" : "USN-2089-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name" : "USN-2124-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2124-1"
},
{
"name" : "64758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64758"
},
{
"name" : "64921",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64921"
},
{
"name" : "101997",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/101997"
},
{
"name" : "1029608",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029608"
},
{
"name" : "56432",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56432"
},
{
"name" : "56485",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56485"
},
{
"name": "56486",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56486"
},
{
"name" : "56535",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56535"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1051528",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051528"
},
{
"name": "SUSE-SU-2014:0451",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html"
},
{
"name": "HPSBUX02973",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name": "1029608",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029608"
},
{
"name": "64921",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64921"
},
{
"name": "USN-2124-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2124-1"
},
{
"name": "SUSE-SU-2014:0266",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html"
},
{
"name": "RHSA-2014:0026",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0026.html"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "101997",
"refsource": "OSVDB",
"url": "http://osvdb.org/101997"
},
{
"name": "SUSE-SU-2014:0246",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "RHSA-2014:0134",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0134.html"
},
{
"name": "openSUSE-SU-2014:0180",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html"
},
{
"name": "openSUSE-SU-2014:0177",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2014-0469",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "67090",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67090"
},
{
"name": "DSA-2921",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2921"
},
{
"name": "[oss-security] 20140428 CVE-2014-0469: xbuffy stack-based buffer overflow in subject processing",
"refsource": "MLIST",
@ -61,16 +71,6 @@
"name": "http://packages.qa.debian.org/x/xbuffy/news/20140427T181904Z.html",
"refsource": "CONFIRM",
"url": "http://packages.qa.debian.org/x/xbuffy/news/20140427T181904Z.html"
},
{
"name" : "DSA-2921",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2921"
},
{
"name" : "67090",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/67090"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1335",
"STATE": "PUBLIC"
},
@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT6254",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6254"
},
{
"name": "https://support.apple.com/kb/HT6537",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6537"
},
{
"name" : "APPLE-SA-2014-05-21-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html"
},
{
"name" : "APPLE-SA-2014-06-30-3",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
},
{
"name": "APPLE-SA-2014-06-30-4",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html"
},
{
"name": "http://support.apple.com/kb/HT6254",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6254"
},
{
"name": "APPLE-SA-2014-06-30-3",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
},
{
"name": "67553",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67553"
},
{
"name": "APPLE-SA-2014-05-21-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html"
}
]
}

View File

@ -53,9 +53,19 @@
"references": {
"reference_data": [
{
"name" : "20140213 Wordpress plugin Buddypress <= 1.9.1 stored xss vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/531049/100/0/threaded"
"name": "65555",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65555"
},
{
"name": "buddypress-cve20141888-xss(91175)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91175"
},
{
"name": "56950",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56950"
},
{
"name": "http://packetstormsecurity.com/files/125212/WordPress-Buddypress-1.9.1-Cross-Site-Scripting.html",
@ -68,24 +78,14 @@
"url": "http://buddypress.org/2014/02/buddypress-1-9-2"
},
{
"name" : "65555",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/65555"
"name": "20140213 Wordpress plugin Buddypress <= 1.9.1 stored xss vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531049/100/0/threaded"
},
{
"name": "103307",
"refsource": "OSVDB",
"url": "http://osvdb.org/103307"
},
{
"name" : "56950",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56950"
},
{
"name" : "buddypress-cve20141888-xss(91175)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/91175"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://jvn.jp/vu/JVNVU97441356/index.html",
"refsource" : "MISC",
"url" : "http://jvn.jp/vu/JVNVU97441356/index.html"
"name": "VU#566894",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/566894"
},
{
"name": "102814",
"refsource": "OSVDB",
"url": "http://osvdb.org/102814"
},
{
"name": "http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details",
@ -63,20 +68,15 @@
"url": "http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details"
},
{
"name" : "VU#566894",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/566894"
"name": "http://jvn.jp/vu/JVNVU97441356/index.html",
"refsource": "MISC",
"url": "http://jvn.jp/vu/JVNVU97441356/index.html"
},
{
"name": "65305",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65305"
},
{
"name" : "102814",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/102814"
},
{
"name": "102815",
"refsource": "OSVDB",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-4235",
"STATE": "PUBLIC"
},
@ -53,14 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
@ -68,9 +68,9 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name": "68647",

View File

@ -57,16 +57,6 @@
"refsource": "MISC",
"url": "http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/"
},
{
"name" : "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html",
"refsource" : "CONFIRM",
"url" : "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html"
},
{
"name" : "GLSA-201407-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201407-02.xml"
},
{
"name": "RHSA-2014:0860",
"refsource": "REDHAT",
@ -77,6 +67,11 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68457"
},
{
"name": "59774",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59774"
},
{
"name": "1030533",
"refsource": "SECTRACK",
@ -88,9 +83,14 @@
"url": "http://secunia.com/advisories/59837"
},
{
"name" : "59774",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59774"
"name": "GLSA-201407-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201407-02.xml"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-3850",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-3890",
"STATE": "PUBLIC"
},
@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "92851",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92851"
},
{
"name": "http://source.android.com/security/bulletin/2016-09-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-09-01.html"
},
{
"name" : "https://android.googlesource.com/platform/system/core/+/014b01706cc64dc9c2ad94a96f62e07c058d0b5d",
"refsource" : "CONFIRM",
"url" : "https://android.googlesource.com/platform/system/core/+/014b01706cc64dc9c2ad94a96f62e07c058d0b5d"
},
{
"name": "https://android.googlesource.com/platform/system/core/+/268068f25673242d1d5130d96202d3288c91b700",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/system/core/+/268068f25673242d1d5130d96202d3288c91b700"
},
{
"name" : "92851",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92851"
},
{
"name": "1036763",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036763"
},
{
"name": "https://android.googlesource.com/platform/system/core/+/014b01706cc64dc9c2ad94a96f62e07c058d0b5d",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/system/core/+/014b01706cc64dc9c2ad94a96f62e07c058d0b5d"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1037252",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037252"
},
{
"name": "MS16-134",
"refsource": "MS",
@ -61,11 +66,6 @@
"name": "94015",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94015"
},
{
"name" : "1037252",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037252"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "GLSA-201702-23",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-23"
},
{
"name": "92974",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92974"
},
{
"name": "[oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74",
"refsource": "MLIST",
@ -66,16 +76,6 @@
"name": "https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb",
"refsource": "CONFIRM",
"url": "https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb"
},
{
"name" : "GLSA-201702-23",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201702-23"
},
{
"name" : "92974",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92974"
}
]
}

View File

@ -53,25 +53,25 @@
"references": {
"reference_data": [
{
"name" : "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913",
"refsource" : "CONFIRM",
"url" : "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913"
"name": "JVN#96681653",
"refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN96681653/index.html"
},
{
"name": "https://www.wireshark.org/news/20161214.html",
"refsource": "CONFIRM",
"url": "https://www.wireshark.org/news/20161214.html"
},
{
"name": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913",
"refsource": "CONFIRM",
"url": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913"
},
{
"name": "JVN#90813656",
"refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN90813656/index.html"
},
{
"name" : "JVN#96681653",
"refsource" : "JVN",
"url" : "https://jvn.jp/en/jp/JVN96681653/index.html"
},
{
"name": "95099",
"refsource": "BID",

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-624",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-624"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
},
{
"name" : "GLSA-201701-17",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-17"
"name": "SUSE-SU-2016:3148",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
},
{
"name": "MS16-154",
@ -73,29 +63,39 @@
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
},
{
"name" : "RHSA-2016:2947",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
},
{
"name" : "SUSE-SU-2016:3148",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
},
{
"name" : "openSUSE-SU-2016:3160",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-624",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-624"
},
{
"name": "94871",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94871"
},
{
"name": "GLSA-201701-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-17"
},
{
"name": "1037442",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037442"
},
{
"name": "RHSA-2016:2947",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
},
{
"name": "openSUSE-SU-2016:3160",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8267",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-8415",
"STATE": "PUBLIC"
},

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20161104 Re: CVE request: XXE in perl Image:nfo and XML:wig",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/11/04/2"
},
{
"name": "94219",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94219"
},
{
"name": "[oss-security] 20161104 Re: CVE request: XXE in perl Image:nfo and XML:wig",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/11/04/2"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM",
"url": "https://www.phpmyadmin.net/security/PMASA-2016-70"
},
{
"name" : "GLSA-201701-32",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-32"
},
{
"name": "94531",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94531"
},
{
"name": "GLSA-201701-32",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-32"
}
]
}

View File

@ -57,15 +57,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "106579",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106579"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
}
]
}