"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:57:36 +00:00
parent 733be11297
commit 7982e4cd17
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
62 changed files with 3875 additions and 3875 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2007-0034",
"STATE": "PUBLIC"
},
@ -53,44 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070111 Computer Terrorism (UK) :: Incident Response Centre - Microsoft Outlook Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/456589/100/0/threaded"
},
{
"name" : "http://www.computerterrorism.com/research/ct09-01-2007.htm",
"refsource" : "MISC",
"url" : "http://www.computerterrorism.com/research/ct09-01-2007.htm"
},
{
"name" : "HPSBST02184",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/457274/100/0/threaded"
},
{
"name" : "SSRT071296",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/457274/100/0/threaded"
},
{
"name" : "MS07-003",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003"
},
{
"name" : "TA07-009A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-009A.html"
},
{
"name" : "VU#271860",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/271860"
},
{
"name" : "21936",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21936"
"name": "31254",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/31254"
},
{
"name": "ADV-2007-0104",
@ -98,14 +63,19 @@
"url": "http://www.vupen.com/english/advisories/2007/0104"
},
{
"name" : "31254",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/31254"
"name": "TA07-009A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-009A.html"
},
{
"name" : "oval:org.mitre.oval:def:153",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A153"
"name": "23674",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23674"
},
{
"name": "HPSBST02184",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/457274/100/0/threaded"
},
{
"name": "1017488",
@ -113,9 +83,39 @@
"url": "http://securitytracker.com/id?1017488"
},
{
"name" : "23674",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23674"
"name": "21936",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21936"
},
{
"name": "VU#271860",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/271860"
},
{
"name": "MS07-003",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003"
},
{
"name": "20070111 Computer Terrorism (UK) :: Incident Response Centre - Microsoft Outlook Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456589/100/0/threaded"
},
{
"name": "SSRT071296",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/457274/100/0/threaded"
},
{
"name": "http://www.computerterrorism.com/research/ct09-01-2007.htm",
"refsource": "MISC",
"url": "http://www.computerterrorism.com/research/ct09-01-2007.htm"
},
{
"name": "oval:org.mitre.oval:def:153",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A153"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "24966",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24966"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305391",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305391"
},
{
"name" : "APPLE-SA-2007-04-19",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
},
{
"name" : "TA07-109A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
},
{
"name": "23569",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23569"
},
{
"name" : "ADV-2007-1470",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1470"
"name": "1017942",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017942"
},
{
"name": "TA07-109A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
},
{
"name": "34867",
@ -83,14 +83,14 @@
"url": "http://www.osvdb.org/34867"
},
{
"name" : "1017942",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017942"
"name": "APPLE-SA-2007-04-19",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
},
{
"name" : "24966",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24966"
"name": "ADV-2007-1470",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1470"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "mani-stats-index-file-include(32782)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32782"
},
{
"name": "3398",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3398"
},
{
"name" : "22794",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22794"
},
{
"name" : "33870",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33870"
},
{
"name": "24394",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24394"
},
{
"name" : "mani-stats-index-file-include(32782)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32782"
"name": "33870",
"refsource": "OSVDB",
"url": "http://osvdb.org/33870"
},
{
"name": "22794",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22794"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "34087",
"refsource": "OSVDB",
"url": "http://osvdb.org/34087"
},
{
"name": "20070310 Fıstıq Duyuru Scripti Remote Sql İnjection Exploit",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "22910",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22910"
},
{
"name" : "34087",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34087"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-1856",
"STATE": "PUBLIC"
},
@ -57,6 +57,31 @@
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
},
{
"name": "27886",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27886"
},
{
"name": "ADV-2007-3229",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3229"
},
{
"name": "SUSE-SR:2007:007",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_007_suse.html"
},
{
"name": "1018081",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018081"
},
{
"name": "24995",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24995"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-261.htm",
"refsource": "CONFIRM",
@ -68,74 +93,49 @@
"url": "http://security.gentoo.org/glsa/glsa-200704-11.xml"
},
{
"name" : "MDKSA-2007:234",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:234"
},
{
"name" : "RHSA-2007:0345",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0345.html"
},
{
"name" : "SUSE-SR:2007:007",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_007_suse.html"
},
{
"name" : "23520",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23520"
"name": "25321",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25321"
},
{
"name": "oval:org.mitre.oval:def:11463",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11463"
},
{
"name" : "ADV-2007-3229",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3229"
},
{
"name" : "1018081",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018081"
},
{
"name" : "24905",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24905"
},
{
"name" : "24995",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24995"
},
{
"name" : "25321",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25321"
},
{
"name": "25723",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25723"
},
{
"name": "MDKSA-2007:234",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:234"
},
{
"name": "26909",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26909"
},
{
"name": "23520",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23520"
},
{
"name": "27706",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27706"
},
{
"name" : "27886",
"name": "RHSA-2007:0345",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0345.html"
},
{
"name": "24905",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/27886"
"url": "http://secunia.com/advisories/24905"
}
]
}

View File

@ -53,19 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://www.php-security.org/MOPB/MOPB-38-2007.html",
"refsource" : "MISC",
"url" : "http://www.php-security.org/MOPB/MOPB-38-2007.html"
"name": "php-printf-format-string(33755)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33755"
},
{
"name" : "http://www.php.net/releases/5_2_1.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/releases/5_2_1.php"
},
{
"name" : "HPSBMA02215",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
"name": "ADV-2007-1991",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1991"
},
{
"name": "SSRT071423",
@ -78,9 +73,14 @@
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
},
{
"name" : "SSRT071429",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
"name": "33955",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/33955"
},
{
"name": "http://www.php.net/releases/5_2_1.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/releases/5_2_1.php"
},
{
"name": "23219",
@ -88,39 +88,39 @@
"url": "http://www.securityfocus.com/bid/23219"
},
{
"name" : "ADV-2007-1991",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1991"
"name": "34767",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/34767"
},
{
"name": "SSRT071429",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
},
{
"name": "ADV-2007-2374",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2374"
},
{
"name" : "33955",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/33955"
},
{
"name" : "34767",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/34767"
},
{
"name": "25423",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25423"
},
{
"name": "http://www.php-security.org/MOPB/MOPB-38-2007.html",
"refsource": "MISC",
"url": "http://www.php-security.org/MOPB/MOPB-38-2007.html"
},
{
"name": "HPSBMA02215",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
},
{
"name": "25850",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25850"
},
{
"name" : "php-printf-format-string(33755)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33755"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2007-4345",
"STATE": "PUBLIC"
},
@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://secunia.com/secunia_research/2007-81/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2007-81/advisory/"
},
{
"name" : "26252",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26252"
"name": "ipswitch-imail-client-bo(38151)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38151"
},
{
"name": "ADV-2007-3659",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3659"
},
{
"name": "26252",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26252"
},
{
"name": "http://secunia.com/secunia_research/2007-81/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2007-81/advisory/"
},
{
"name": "26905",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26905"
},
{
"name" : "ipswitch-imail-client-bo(38151)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38151"
}
]
}

View File

@ -52,16 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "26648",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26648"
},
{
"name": "20070830 PR07-23: Non-persistent Cross-site Scripting (XSS) on Absolute Poll Manager XE admin page",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478152/100/0/threaded"
},
{
"name": "absolutepollmanager-msg-xss(36362)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36362"
},
{
"name": "25492",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25492"
},
{
"name": "3080",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3080"
},
{
"name": "36709",
"refsource": "OSVDB",
@ -71,21 +86,6 @@
"name": "1018634",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018634"
},
{
"name" : "26648",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26648"
},
{
"name" : "3080",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3080"
},
{
"name" : "absolutepollmanager-msg-xss(36362)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36362"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://xs-sniper.com/blog/2007/09/01/firefox-file-handling-woes/",
"refsource" : "MISC",
"url" : "http://xs-sniper.com/blog/2007/09/01/firefox-file-handling-woes/"
},
{
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-36.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2007/mfsa2007-36.html"
},
{
"name" : "HPSBUX02153",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
"name": "27414",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27414"
},
{
"name": "HPSBUX02156",
@ -73,24 +63,24 @@
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name" : "SSRT061181",
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-36.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-36.html"
},
{
"name": "27360",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27360"
},
{
"name": "HPSBUX02153",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name" : "SSRT061236",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name" : "MDKSA-2007:202",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202"
},
{
"name" : "SSA:2007-324-01",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.471007"
"name": "27315",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27315"
},
{
"name": "25543",
@ -103,9 +93,9 @@
"url": "http://www.vupen.com/english/advisories/2007/3544"
},
{
"name" : "ADV-2008-0082",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0082"
"name": "SSA:2007-324-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.471007"
},
{
"name": "ADV-2008-0083",
@ -113,29 +103,24 @@
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name" : "27311",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27311"
"name": "SSRT061236",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name" : "27315",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27315"
"name": "http://xs-sniper.com/blog/2007/09/01/firefox-file-handling-woes/",
"refsource": "MISC",
"url": "http://xs-sniper.com/blog/2007/09/01/firefox-file-handling-woes/"
},
{
"name" : "27414",
"name": "27744",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/27414"
"url": "http://secunia.com/advisories/27744"
},
{
"name" : "27360",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27360"
},
{
"name" : "28363",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28363"
"name": "ADV-2008-0082",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0082"
},
{
"name": "28398",
@ -143,9 +128,24 @@
"url": "http://secunia.com/advisories/28398"
},
{
"name" : "27744",
"name": "27311",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/27744"
"url": "http://secunia.com/advisories/27311"
},
{
"name": "SSRT061181",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "MDKSA-2007:202",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202"
},
{
"name": "28363",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28363"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-5343",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-5349",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,29 +53,34 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150317 Re: Mono TLS vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/03/17/9"
"name": "USN-2547-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2547-1"
},
{
"name": "https://mitls.org/pages/attacks/SMACK#skip",
"refsource": "MISC",
"url": "https://mitls.org/pages/attacks/SMACK#skip"
},
{
"name" : "http://www.mono-project.com/news/2015/03/07/mono-tls-vulnerability/",
"refsource" : "CONFIRM",
"url" : "http://www.mono-project.com/news/2015/03/07/mono-tls-vulnerability/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1202869",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202869"
},
{
"name" : "https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4",
"name": "73253",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/73253"
},
{
"name": "[oss-security] 20150317 Re: Mono TLS vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/03/17/9"
},
{
"name": "http://www.mono-project.com/news/2015/03/07/mono-tls-vulnerability/",
"refsource": "CONFIRM",
"url" : "https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4"
"url": "http://www.mono-project.com/news/2015/03/07/mono-tls-vulnerability/"
},
{
"name": "DSA-3202",
@ -83,14 +88,9 @@
"url": "https://www.debian.org/security/2015/dsa-3202"
},
{
"name" : "USN-2547-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2547-1"
},
{
"name" : "73253",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/73253"
"name": "https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4",
"refsource": "CONFIRM",
"url": "https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150401 CVE request: Buffer overflow in das_watchdog",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/04/01/8"
},
{
"name": "[oss-security] 20150402 Re: CVE request: Buffer overflow in das_watchdog",
"refsource": "MLIST",
@ -67,15 +62,20 @@
"refsource": "CONFIRM",
"url": "https://github.com/kmatheussen/das_watchdog/commit/bd20bb02e75e2c0483832b52f2577253febfb690"
},
{
"name" : "DSA-3221",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3221"
},
{
"name": "73706",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/73706"
},
{
"name": "[oss-security] 20150401 CVE request: Buffer overflow in das_watchdog",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/01/8"
},
{
"name": "DSA-3221",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3221"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "CONFIRM",
"url": "https://owncloud.org/security/advisory/?id=oc-sa-2015-003"
},
{
"name": "74451",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74451"
},
{
"name": "https://owncloud.org/security/advisory/?id=oc-sa-2015-004",
"refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "DSA-3244",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3244"
},
{
"name" : "74451",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/74451"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150213 CVE requests for Drupal contributed modules",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/02/13/12"
},
{
"name": "https://www.drupal.org/node/2424403",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2424403"
},
{
"name" : "https://www.drupal.org/node/2424097",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/node/2424097"
},
{
"name" : "https://www.drupal.org/node/2424101",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/node/2424101"
},
{
"name": "https://www.drupal.org/node/2424103",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2424103"
},
{
"name": "[oss-security] 20150213 CVE requests for Drupal contributed modules",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/02/13/12"
},
{
"name": "72590",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72590"
},
{
"name": "https://www.drupal.org/node/2424101",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2424101"
},
{
"name": "https://www.drupal.org/node/2424097",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2424097"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3730",
"STATE": "PUBLIC"
},
@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/kb/HT205030",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT205030"
},
{
"name" : "https://support.apple.com/kb/HT205033",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT205033"
},
{
"name": "https://support.apple.com/HT205221",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205221"
},
{
"name" : "APPLE-SA-2015-08-13-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
"name": "1033274",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033274"
},
{
"name" : "APPLE-SA-2015-08-13-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
},
{
"name" : "APPLE-SA-2015-09-16-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
"name": "https://support.apple.com/kb/HT205030",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT205030"
},
{
"name": "openSUSE-SU-2016:0761",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html"
},
{
"name": "APPLE-SA-2015-09-16-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
},
{
"name": "APPLE-SA-2015-08-13-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
},
{
"name": "76338",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76338"
},
{
"name" : "1033274",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033274"
"name": "APPLE-SA-2015-08-13-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
},
{
"name": "https://support.apple.com/kb/HT205033",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT205033"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6287",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1033529",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033529"
},
{
"name": "20150909 Cisco Web Security Appliance DNS Resolution Vulnerability",
"refsource": "CISCO",
@ -61,11 +66,6 @@
"name": "76677",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76677"
},
{
"name" : "1033529",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033529"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6362",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6432",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20160104 Cisco IOS XR Software OSPF Link State Advertisement PCE Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160104-iosxr"
},
{
"name": "1034570",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034570"
},
{
"name": "20160104 Cisco IOS XR Software OSPF Link State Advertisement PCE Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160104-iosxr"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20150902 Serendipity 2.0.1 - Persistent XSS",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Sep/9"
},
{
"name": "http://blog.curesec.com/article/blog/Serendipity-201-Persistent-XSS-51.html",
"refsource": "MISC",
"url": "http://blog.curesec.com/article/blog/Serendipity-201-Persistent-XSS-51.html"
},
{
"name": "20150902 Serendipity 2.0.1 - Persistent XSS",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Sep/9"
},
{
"name": "http://packetstormsecurity.com/files/133427/Serendipity-2.0.1-Cross-Site-Scripting.html",
"refsource": "MISC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-7193",
"STATE": "PUBLIC"
},
@ -53,14 +53,54 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-127.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-127.html"
"name": "1034069",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034069"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1210302",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1210302"
"name": "DSA-3410",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3410"
},
{
"name": "SUSE-SU-2015:2081",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html"
},
{
"name": "GLSA-201512-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201512-10"
},
{
"name": "77411",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77411"
},
{
"name": "SUSE-SU-2015:1981",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html"
},
{
"name": "openSUSE-SU-2015:2229",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html"
},
{
"name": "RHSA-2015:2519",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html"
},
{
"name": "USN-2785-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2785-1"
},
{
"name": "SUSE-SU-2015:1926",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
@ -72,85 +112,45 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "DSA-3410",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3410"
},
{
"name" : "DSA-3393",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3393"
},
{
"name" : "GLSA-201512-10",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201512-10"
},
{
"name" : "RHSA-2015:2519",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2519.html"
},
{
"name": "RHSA-2015:1982",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html"
},
{
"name" : "openSUSE-SU-2015:2229",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html"
},
{
"name" : "openSUSE-SU-2015:2245",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html"
},
{
"name" : "SUSE-SU-2015:1926",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html"
},
{
"name" : "openSUSE-SU-2015:1942",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html"
},
{
"name" : "SUSE-SU-2015:1978",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html"
},
{
"name" : "SUSE-SU-2015:1981",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html"
},
{
"name" : "SUSE-SU-2015:2081",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html"
},
{
"name": "USN-2819-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2819-1"
},
{
"name" : "USN-2785-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2785-1"
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1210302",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1210302"
},
{
"name" : "77411",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/77411"
"name": "openSUSE-SU-2015:1942",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html"
},
{
"name" : "1034069",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034069"
"name": "DSA-3393",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3393"
},
{
"name": "openSUSE-SU-2015:2245",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html"
},
{
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-127.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-127.html"
},
{
"name": "SUSE-SU-2015:1978",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html"
}
]
}

View File

@ -52,36 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "38797",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/38797/"
},
{
"name": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/",
"refsource": "MISC",
"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/"
},
{
"name" : "http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html"
},
{
"name" : "http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html"
},
{
"name" : "http://www.rapid7.com/db/modules/exploit/unix/webapp/joomla_contenthistory_sqli_rce",
"refsource" : "MISC",
"url" : "http://www.rapid7.com/db/modules/exploit/unix/webapp/joomla_contenthistory_sqli_rce"
},
{
"name" : "http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html",
"refsource" : "CONFIRM",
"url" : "http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html"
},
{
"name": "77295",
"refsource": "BID",
@ -91,6 +66,31 @@
"name": "1033950",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033950"
},
{
"name": "http://www.rapid7.com/db/modules/exploit/unix/webapp/joomla_contenthistory_sqli_rce",
"refsource": "MISC",
"url": "http://www.rapid7.com/db/modules/exploit/unix/webapp/joomla_contenthistory_sqli_rce"
},
{
"name": "38797",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38797/"
},
{
"name": "http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html"
},
{
"name": "http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html"
},
{
"name": "http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html",
"refsource": "CONFIRM",
"url": "http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0435",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0694",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1044",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "1035828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-291",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-291"
},
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{
"name": "90517",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90517"
},
{
"name" : "1035828",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035828"
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1190",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03",
"refsource" : "CONFIRM",
"url" : "https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03"
},
{
"name": "https://support.cybozu.com/ja-jp/article/8877",
"refsource": "CONFIRM",
@ -67,6 +62,11 @@
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN18975349/index.html"
},
{
"name": "https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03",
"refsource": "CONFIRM",
"url": "https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03"
},
{
"name": "JVNDB-2016-000094",
"refsource": "JVNDB",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1220",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "JVNDB-2016-000149",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000149.html"
},
{
"name": "https://support.cybozu.com/ja-jp/article/9407",
"refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN93411577/index.html"
},
{
"name" : "JVNDB-2016-000149",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000149.html"
},
{
"name": "92599",
"refsource": "BID",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1424",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2016-1694",
"STATE": "PUBLIC"
},
@ -53,59 +53,59 @@
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
},
{
"name" : "https://codereview.chromium.org/1941073002",
"refsource" : "CONFIRM",
"url" : "https://codereview.chromium.org/1941073002"
},
{
"name" : "https://crbug.com/603682",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/603682"
},
{
"name" : "DSA-3590",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3590"
},
{
"name" : "GLSA-201607-07",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201607-07"
},
{
"name" : "RHSA-2016:1190",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1190"
},
{
"name" : "openSUSE-SU-2016:1430",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
},
{
"name" : "openSUSE-SU-2016:1433",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
"name": "90876",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90876"
},
{
"name": "openSUSE-SU-2016:1496",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
},
{
"name" : "90876",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90876"
},
{
"name": "1035981",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035981"
},
{
"name": "DSA-3590",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3590"
},
{
"name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
},
{
"name": "openSUSE-SU-2016:1430",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
},
{
"name": "https://codereview.chromium.org/1941073002",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1941073002"
},
{
"name": "RHSA-2016:1190",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1190"
},
{
"name": "https://crbug.com/603682",
"refsource": "CONFIRM",
"url": "https://crbug.com/603682"
},
{
"name": "GLSA-201607-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-07"
},
{
"name": "openSUSE-SU-2016:1433",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1768",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "39634",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39634/"
"name": "APPLE-SA-2016-03-21-5",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
},
{
"name": "https://support.apple.com/HT206167",
@ -63,9 +63,9 @@
"url": "https://support.apple.com/HT206167"
},
{
"name" : "APPLE-SA-2016-03-21-5",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
"name": "39634",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39634/"
},
{
"name": "1035363",

View File

@ -52,36 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "40759",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40759/"
},
{
"name" : "[oss-security] 20160506 CVE Requests: Linux: BPF flaws (one use-after-free / local root privilege escalation)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/06/4"
},
{
"name" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=808",
"refsource" : "MISC",
"url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=808"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5"
},
{
"name": "https://bugs.debian.org/823603",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/823603"
},
{
"name": "openSUSE-SU-2016:1641",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1334307",
"refsource": "CONFIRM",
@ -93,9 +73,29 @@
"url": "https://github.com/torvalds/linux/commit/8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7"
},
{
"name" : "openSUSE-SU-2016:1641",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5"
},
{
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=808",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=808"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7"
},
{
"name": "[oss-security] 20160506 CVE Requests: Linux: BPF flaws (one use-after-free / local root privilege escalation)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/06/4"
},
{
"name": "40759",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40759/"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160610 Simple Machines Forums - PHP Object Injection",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/10/7"
},
{
"name" : "[oss-security] 20160618 Re: Simple Machines Forums - PHP Object Injection",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/18/1"
"name": "https://github.com/SimpleMachines/SMF2.1/issues/3522",
"refsource": "CONFIRM",
"url": "https://github.com/SimpleMachines/SMF2.1/issues/3522"
},
{
"name": "https://github.com/SimpleMachines/SMF2.1/commit/19e560b9f3e8fc6d7d9d60c1ff617b5ed5c08008#diff-513c4f9c501cbefcc14420c01848f23c",
@ -68,9 +63,14 @@
"url": "https://github.com/SimpleMachines/SMF2.1/commit/19e560b9f3e8fc6d7d9d60c1ff617b5ed5c08008#diff-513c4f9c501cbefcc14420c01848f23c"
},
{
"name" : "https://github.com/SimpleMachines/SMF2.1/issues/3522",
"refsource" : "CONFIRM",
"url" : "https://github.com/SimpleMachines/SMF2.1/issues/3522"
"name": "[oss-security] 20160618 Re: Simple Machines Forums - PHP Object Injection",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/18/1"
},
{
"name": "[oss-security] 20160610 Simple Machines Forums - PHP Object Injection",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/10/7"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2016-5833",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "https://wordpress.org/news/2016/06/wordpress-4-5-3/",
"refsource": "CONFIRM",
"url": "https://wordpress.org/news/2016/06/wordpress-4-5-3/"
},
{
"name": "https://wpvulndb.com/vulnerabilities/8518",
"refsource": "MISC",
@ -62,25 +67,20 @@
"refsource": "CONFIRM",
"url": "https://codex.wordpress.org/Version_4.5.3"
},
{
"name": "1036163",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036163"
},
{
"name": "https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648",
"refsource": "CONFIRM",
"url": "https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648"
},
{
"name" : "https://wordpress.org/news/2016/06/wordpress-4-5-3/",
"refsource" : "CONFIRM",
"url" : "https://wordpress.org/news/2016/06/wordpress-4-5-3/"
},
{
"name": "91368",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91368"
},
{
"name" : "1036163",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036163"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2019-0624",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"DATE_ASSIGNED": "2019-02-06T02:59:03.176566",
"ID": "CVE-2019-1003014",
"REQUESTER": "ml@beckweb.net",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "46380",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/46380"
},
{
"name": "https://www.youtube.com/watch?v=9vD8GnKqDME",
"refsource": "MISC",
"url": "https://www.youtube.com/watch?v=9vD8GnKqDME"
},
{
"name": "46380",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/46380"
}
]
}