mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
733be11297
commit
7982e4cd17
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2007-0034",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,44 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070111 Computer Terrorism (UK) :: Incident Response Centre - Microsoft Outlook Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/456589/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.computerterrorism.com/research/ct09-01-2007.htm",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.computerterrorism.com/research/ct09-01-2007.htm"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBST02184",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/457274/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT071296",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/457274/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MS07-003",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003"
|
||||
},
|
||||
{
|
||||
"name" : "TA07-009A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-009A.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#271860",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/271860"
|
||||
},
|
||||
{
|
||||
"name" : "21936",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21936"
|
||||
"name": "31254",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/31254"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0104",
|
||||
@ -98,14 +63,19 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0104"
|
||||
},
|
||||
{
|
||||
"name" : "31254",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/31254"
|
||||
"name": "TA07-009A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-009A.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:153",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A153"
|
||||
"name": "23674",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23674"
|
||||
},
|
||||
{
|
||||
"name": "HPSBST02184",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/457274/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1017488",
|
||||
@ -113,9 +83,39 @@
|
||||
"url": "http://securitytracker.com/id?1017488"
|
||||
},
|
||||
{
|
||||
"name" : "23674",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23674"
|
||||
"name": "21936",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21936"
|
||||
},
|
||||
{
|
||||
"name": "VU#271860",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/271860"
|
||||
},
|
||||
{
|
||||
"name": "MS07-003",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003"
|
||||
},
|
||||
{
|
||||
"name": "20070111 Computer Terrorism (UK) :: Incident Response Centre - Microsoft Outlook Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/456589/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "SSRT071296",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/457274/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.computerterrorism.com/research/ct09-01-2007.htm",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.computerterrorism.com/research/ct09-01-2007.htm"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:153",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A153"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "24966",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24966"
|
||||
},
|
||||
{
|
||||
"name": "http://docs.info.apple.com/article.html?artnum=305391",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://docs.info.apple.com/article.html?artnum=305391"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2007-04-19",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA07-109A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
|
||||
},
|
||||
{
|
||||
"name": "23569",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23569"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1470",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1470"
|
||||
"name": "1017942",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1017942"
|
||||
},
|
||||
{
|
||||
"name": "TA07-109A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
|
||||
},
|
||||
{
|
||||
"name": "34867",
|
||||
@ -83,14 +83,14 @@
|
||||
"url": "http://www.osvdb.org/34867"
|
||||
},
|
||||
{
|
||||
"name" : "1017942",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1017942"
|
||||
"name": "APPLE-SA-2007-04-19",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "24966",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24966"
|
||||
"name": "ADV-2007-1470",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1470"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "mani-stats-index-file-include(32782)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32782"
|
||||
},
|
||||
{
|
||||
"name": "3398",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3398"
|
||||
},
|
||||
{
|
||||
"name" : "22794",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22794"
|
||||
},
|
||||
{
|
||||
"name" : "33870",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/33870"
|
||||
},
|
||||
{
|
||||
"name": "24394",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24394"
|
||||
},
|
||||
{
|
||||
"name" : "mani-stats-index-file-include(32782)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32782"
|
||||
"name": "33870",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33870"
|
||||
},
|
||||
{
|
||||
"name": "22794",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22794"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "34087",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34087"
|
||||
},
|
||||
{
|
||||
"name": "20070310 Fıstıq Duyuru Scripti Remote Sql İnjection Exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "22910",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22910"
|
||||
},
|
||||
{
|
||||
"name" : "34087",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/34087"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2007-1856",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,31 @@
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
|
||||
},
|
||||
{
|
||||
"name": "27886",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27886"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3229",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3229"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2007:007",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_007_suse.html"
|
||||
},
|
||||
{
|
||||
"name": "1018081",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018081"
|
||||
},
|
||||
{
|
||||
"name": "24995",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24995"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-261.htm",
|
||||
"refsource": "CONFIRM",
|
||||
@ -68,74 +93,49 @@
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200704-11.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:234",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:234"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0345",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0345.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2007:007",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_007_suse.html"
|
||||
},
|
||||
{
|
||||
"name" : "23520",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23520"
|
||||
"name": "25321",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25321"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11463",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11463"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3229",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3229"
|
||||
},
|
||||
{
|
||||
"name" : "1018081",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018081"
|
||||
},
|
||||
{
|
||||
"name" : "24905",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24905"
|
||||
},
|
||||
{
|
||||
"name" : "24995",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24995"
|
||||
},
|
||||
{
|
||||
"name" : "25321",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25321"
|
||||
},
|
||||
{
|
||||
"name": "25723",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25723"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:234",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:234"
|
||||
},
|
||||
{
|
||||
"name": "26909",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26909"
|
||||
},
|
||||
{
|
||||
"name": "23520",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23520"
|
||||
},
|
||||
{
|
||||
"name": "27706",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27706"
|
||||
},
|
||||
{
|
||||
"name" : "27886",
|
||||
"name": "RHSA-2007:0345",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2007-0345.html"
|
||||
},
|
||||
{
|
||||
"name": "24905",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27886"
|
||||
"url": "http://secunia.com/advisories/24905"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.php-security.org/MOPB/MOPB-38-2007.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.php-security.org/MOPB/MOPB-38-2007.html"
|
||||
"name": "php-printf-format-string(33755)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33755"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.php.net/releases/5_2_1.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.php.net/releases/5_2_1.php"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMA02215",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
|
||||
"name": "ADV-2007-1991",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1991"
|
||||
},
|
||||
{
|
||||
"name": "SSRT071423",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT071429",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
|
||||
"name": "33955",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/33955"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php.net/releases/5_2_1.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.php.net/releases/5_2_1.php"
|
||||
},
|
||||
{
|
||||
"name": "23219",
|
||||
@ -88,39 +88,39 @@
|
||||
"url": "http://www.securityfocus.com/bid/23219"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1991",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1991"
|
||||
"name": "34767",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/34767"
|
||||
},
|
||||
{
|
||||
"name": "SSRT071429",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2374",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2374"
|
||||
},
|
||||
{
|
||||
"name" : "33955",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/33955"
|
||||
},
|
||||
{
|
||||
"name" : "34767",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/34767"
|
||||
},
|
||||
{
|
||||
"name": "25423",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25423"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php-security.org/MOPB/MOPB-38-2007.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.php-security.org/MOPB/MOPB-38-2007.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMA02215",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
|
||||
},
|
||||
{
|
||||
"name": "25850",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25850"
|
||||
},
|
||||
{
|
||||
"name" : "php-printf-format-string(33755)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33755"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2007-4345",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2007-81/advisory/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secunia.com/secunia_research/2007-81/advisory/"
|
||||
},
|
||||
{
|
||||
"name" : "26252",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26252"
|
||||
"name": "ipswitch-imail-client-bo(38151)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38151"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3659",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3659"
|
||||
},
|
||||
{
|
||||
"name": "26252",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26252"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2007-81/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2007-81/advisory/"
|
||||
},
|
||||
{
|
||||
"name": "26905",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26905"
|
||||
},
|
||||
{
|
||||
"name" : "ipswitch-imail-client-bo(38151)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38151"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "26648",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26648"
|
||||
},
|
||||
{
|
||||
"name": "20070830 PR07-23: Non-persistent Cross-site Scripting (XSS) on Absolute Poll Manager XE admin page",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/478152/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "absolutepollmanager-msg-xss(36362)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36362"
|
||||
},
|
||||
{
|
||||
"name": "25492",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25492"
|
||||
},
|
||||
{
|
||||
"name": "3080",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3080"
|
||||
},
|
||||
{
|
||||
"name": "36709",
|
||||
"refsource": "OSVDB",
|
||||
@ -71,21 +86,6 @@
|
||||
"name": "1018634",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018634"
|
||||
},
|
||||
{
|
||||
"name" : "26648",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26648"
|
||||
},
|
||||
{
|
||||
"name" : "3080",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3080"
|
||||
},
|
||||
{
|
||||
"name" : "absolutepollmanager-msg-xss(36362)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36362"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://xs-sniper.com/blog/2007/09/01/firefox-file-handling-woes/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://xs-sniper.com/blog/2007/09/01/firefox-file-handling-woes/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-36.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2007/mfsa2007-36.html"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02153",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
"name": "27414",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27414"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02156",
|
||||
@ -73,24 +63,24 @@
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061181",
|
||||
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-36.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-36.html"
|
||||
},
|
||||
{
|
||||
"name": "27360",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27360"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02153",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061236",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:202",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202"
|
||||
},
|
||||
{
|
||||
"name" : "SSA:2007-324-01",
|
||||
"refsource" : "SLACKWARE",
|
||||
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.471007"
|
||||
"name": "27315",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27315"
|
||||
},
|
||||
{
|
||||
"name": "25543",
|
||||
@ -103,9 +93,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3544"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0082",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0082"
|
||||
"name": "SSA:2007-324-01",
|
||||
"refsource": "SLACKWARE",
|
||||
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.471007"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0083",
|
||||
@ -113,29 +103,24 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0083"
|
||||
},
|
||||
{
|
||||
"name" : "27311",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27311"
|
||||
"name": "SSRT061236",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
|
||||
},
|
||||
{
|
||||
"name" : "27315",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27315"
|
||||
"name": "http://xs-sniper.com/blog/2007/09/01/firefox-file-handling-woes/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://xs-sniper.com/blog/2007/09/01/firefox-file-handling-woes/"
|
||||
},
|
||||
{
|
||||
"name" : "27414",
|
||||
"name": "27744",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27414"
|
||||
"url": "http://secunia.com/advisories/27744"
|
||||
},
|
||||
{
|
||||
"name" : "27360",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27360"
|
||||
},
|
||||
{
|
||||
"name" : "28363",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28363"
|
||||
"name": "ADV-2008-0082",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0082"
|
||||
},
|
||||
{
|
||||
"name": "28398",
|
||||
@ -143,9 +128,24 @@
|
||||
"url": "http://secunia.com/advisories/28398"
|
||||
},
|
||||
{
|
||||
"name" : "27744",
|
||||
"name": "27311",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27744"
|
||||
"url": "http://secunia.com/advisories/27311"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061181",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:202",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202"
|
||||
},
|
||||
{
|
||||
"name": "28363",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28363"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2007-5343",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2007-5349",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,29 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150317 Re: Mono TLS vulnerabilities",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/03/17/9"
|
||||
"name": "USN-2547-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2547-1"
|
||||
},
|
||||
{
|
||||
"name": "https://mitls.org/pages/attacks/SMACK#skip",
|
||||
"refsource": "MISC",
|
||||
"url": "https://mitls.org/pages/attacks/SMACK#skip"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mono-project.com/news/2015/03/07/mono-tls-vulnerability/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mono-project.com/news/2015/03/07/mono-tls-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1202869",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202869"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4",
|
||||
"name": "73253",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/73253"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150317 Re: Mono TLS vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/03/17/9"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mono-project.com/news/2015/03/07/mono-tls-vulnerability/",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4"
|
||||
"url": "http://www.mono-project.com/news/2015/03/07/mono-tls-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3202",
|
||||
@ -83,14 +88,9 @@
|
||||
"url": "https://www.debian.org/security/2015/dsa-3202"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2547-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2547-1"
|
||||
},
|
||||
{
|
||||
"name" : "73253",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/73253"
|
||||
"name": "https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150401 CVE request: Buffer overflow in das_watchdog",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/04/01/8"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150402 Re: CVE request: Buffer overflow in das_watchdog",
|
||||
"refsource": "MLIST",
|
||||
@ -67,15 +62,20 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/kmatheussen/das_watchdog/commit/bd20bb02e75e2c0483832b52f2577253febfb690"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3221",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3221"
|
||||
},
|
||||
{
|
||||
"name": "73706",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/73706"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150401 CVE request: Buffer overflow in das_watchdog",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/04/01/8"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3221",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3221"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://owncloud.org/security/advisory/?id=oc-sa-2015-003"
|
||||
},
|
||||
{
|
||||
"name": "74451",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/74451"
|
||||
},
|
||||
{
|
||||
"name": "https://owncloud.org/security/advisory/?id=oc-sa-2015-004",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "DSA-3244",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3244"
|
||||
},
|
||||
{
|
||||
"name" : "74451",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/74451"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150213 CVE requests for Drupal contributed modules",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/02/13/12"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/node/2424403",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.drupal.org/node/2424403"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.drupal.org/node/2424097",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.drupal.org/node/2424097"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.drupal.org/node/2424101",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.drupal.org/node/2424101"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/node/2424103",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.drupal.org/node/2424103"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150213 CVE requests for Drupal contributed modules",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/02/13/12"
|
||||
},
|
||||
{
|
||||
"name": "72590",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72590"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/node/2424101",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.drupal.org/node/2424101"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/node/2424097",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.drupal.org/node/2424097"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-3730",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/kb/HT205030",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/kb/HT205030"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/kb/HT205033",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/kb/HT205033"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205221",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205221"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-08-13-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
|
||||
"name": "1033274",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033274"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-08-13-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-09-16-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
|
||||
"name": "https://support.apple.com/kb/HT205030",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT205030"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0761",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-09-16-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-08-13-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "76338",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/76338"
|
||||
},
|
||||
{
|
||||
"name" : "1033274",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033274"
|
||||
"name": "APPLE-SA-2015-08-13-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/kb/HT205033",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT205033"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-6287",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1033529",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033529"
|
||||
},
|
||||
{
|
||||
"name": "20150909 Cisco Web Security Appliance DNS Resolution Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "76677",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/76677"
|
||||
},
|
||||
{
|
||||
"name" : "1033529",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033529"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-6362",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-6432",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160104 Cisco IOS XR Software OSPF Link State Advertisement PCE Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160104-iosxr"
|
||||
},
|
||||
{
|
||||
"name": "1034570",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034570"
|
||||
},
|
||||
{
|
||||
"name": "20160104 Cisco IOS XR Software OSPF Link State Advertisement PCE Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160104-iosxr"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150902 Serendipity 2.0.1 - Persistent XSS",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Sep/9"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.curesec.com/article/blog/Serendipity-201-Persistent-XSS-51.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.curesec.com/article/blog/Serendipity-201-Persistent-XSS-51.html"
|
||||
},
|
||||
{
|
||||
"name": "20150902 Serendipity 2.0.1 - Persistent XSS",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Sep/9"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/133427/Serendipity-2.0.1-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2015-7193",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,54 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-127.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-127.html"
|
||||
"name": "1034069",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034069"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1210302",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1210302"
|
||||
"name": "DSA-3410",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3410"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:2081",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201512-10",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201512-10"
|
||||
},
|
||||
{
|
||||
"name": "77411",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/77411"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:1981",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:2229",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:2519",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2785-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2785-1"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:1926",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
@ -72,85 +112,45 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3410",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3410"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3393",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3393"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201512-10",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201512-10"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:2519",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2519.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1982",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:2229",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:2245",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:1926",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1942",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:1978",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:1981",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:2081",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2819-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2819-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2785-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2785-1"
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1210302",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1210302"
|
||||
},
|
||||
{
|
||||
"name" : "77411",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/77411"
|
||||
"name": "openSUSE-SU-2015:1942",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name" : "1034069",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1034069"
|
||||
"name": "DSA-3393",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3393"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:2245",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-127.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-127.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:1978",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,36 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "38797",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/38797/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.rapid7.com/db/modules/exploit/unix/webapp/joomla_contenthistory_sqli_rce",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.rapid7.com/db/modules/exploit/unix/webapp/joomla_contenthistory_sqli_rce"
|
||||
},
|
||||
{
|
||||
"name" : "http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html"
|
||||
},
|
||||
{
|
||||
"name": "77295",
|
||||
"refsource": "BID",
|
||||
@ -91,6 +66,31 @@
|
||||
"name": "1033950",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033950"
|
||||
},
|
||||
{
|
||||
"name": "http://www.rapid7.com/db/modules/exploit/unix/webapp/joomla_contenthistory_sqli_rce",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.rapid7.com/db/modules/exploit/unix/webapp/joomla_contenthistory_sqli_rce"
|
||||
},
|
||||
{
|
||||
"name": "38797",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/38797/"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html"
|
||||
},
|
||||
{
|
||||
"name": "http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-0435",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-0694",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-1044",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1035828",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035828"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-291",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-291"
|
||||
},
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
|
||||
},
|
||||
{
|
||||
"name": "90517",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/90517"
|
||||
},
|
||||
{
|
||||
"name" : "1035828",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1035828"
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2016-1190",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03"
|
||||
},
|
||||
{
|
||||
"name": "https://support.cybozu.com/ja-jp/article/8877",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN18975349/index.html"
|
||||
},
|
||||
{
|
||||
"name": "https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2016-000094",
|
||||
"refsource": "JVNDB",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2016-1220",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "JVNDB-2016-000149",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000149.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.cybozu.com/ja-jp/article/9407",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN93411577/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2016-000149",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000149.html"
|
||||
},
|
||||
{
|
||||
"name": "92599",
|
||||
"refsource": "BID",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1424",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2016-1694",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,59 +53,59 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://codereview.chromium.org/1941073002",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://codereview.chromium.org/1941073002"
|
||||
},
|
||||
{
|
||||
"name" : "https://crbug.com/603682",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://crbug.com/603682"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3590",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3590"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201607-07",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201607-07"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:1190",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1190"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1430",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1433",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
|
||||
"name": "90876",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/90876"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1496",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name" : "90876",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/90876"
|
||||
},
|
||||
{
|
||||
"name": "1035981",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035981"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3590",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3590"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1430",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
|
||||
},
|
||||
{
|
||||
"name": "https://codereview.chromium.org/1941073002",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://codereview.chromium.org/1941073002"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:1190",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2016:1190"
|
||||
},
|
||||
{
|
||||
"name": "https://crbug.com/603682",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://crbug.com/603682"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201607-07",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201607-07"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1433",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2016-1768",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "39634",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/39634/"
|
||||
"name": "APPLE-SA-2016-03-21-5",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206167",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://support.apple.com/HT206167"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-03-21-5",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
|
||||
"name": "39634",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/39634/"
|
||||
},
|
||||
{
|
||||
"name": "1035363",
|
||||
|
@ -52,36 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "40759",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/40759/"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20160506 CVE Requests: Linux: BPF flaws (one use-after-free / local root privilege escalation)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/05/06/4"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=808",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=808"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/823603",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.debian.org/823603"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1641",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1334307",
|
||||
"refsource": "CONFIRM",
|
||||
@ -93,9 +73,29 @@
|
||||
"url": "https://github.com/torvalds/linux/commit/8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1641",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=808",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=808"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160506 CVE Requests: Linux: BPF flaws (one use-after-free / local root privilege escalation)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/05/06/4"
|
||||
},
|
||||
{
|
||||
"name": "40759",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/40759/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20160610 Simple Machines Forums - PHP Object Injection",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/06/10/7"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20160618 Re: Simple Machines Forums - PHP Object Injection",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/06/18/1"
|
||||
"name": "https://github.com/SimpleMachines/SMF2.1/issues/3522",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/SimpleMachines/SMF2.1/issues/3522"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/SimpleMachines/SMF2.1/commit/19e560b9f3e8fc6d7d9d60c1ff617b5ed5c08008#diff-513c4f9c501cbefcc14420c01848f23c",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "https://github.com/SimpleMachines/SMF2.1/commit/19e560b9f3e8fc6d7d9d60c1ff617b5ed5c08008#diff-513c4f9c501cbefcc14420c01848f23c"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/SimpleMachines/SMF2.1/issues/3522",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/SimpleMachines/SMF2.1/issues/3522"
|
||||
"name": "[oss-security] 20160618 Re: Simple Machines Forums - PHP Object Injection",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/18/1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160610 Simple Machines Forums - PHP Object Injection",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/10/7"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2016-5833",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://wordpress.org/news/2016/06/wordpress-4-5-3/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wordpress.org/news/2016/06/wordpress-4-5-3/"
|
||||
},
|
||||
{
|
||||
"name": "https://wpvulndb.com/vulnerabilities/8518",
|
||||
"refsource": "MISC",
|
||||
@ -62,25 +67,20 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://codex.wordpress.org/Version_4.5.3"
|
||||
},
|
||||
{
|
||||
"name": "1036163",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036163"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648"
|
||||
},
|
||||
{
|
||||
"name" : "https://wordpress.org/news/2016/06/wordpress-4-5-3/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wordpress.org/news/2016/06/wordpress-4-5-3/"
|
||||
},
|
||||
{
|
||||
"name": "91368",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91368"
|
||||
},
|
||||
{
|
||||
"name" : "1036163",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036163"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2019-0624",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
|
||||
"DATE_ASSIGNED": "2019-02-06T02:59:03.176566",
|
||||
"ID": "CVE-2019-1003014",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "46380",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/46380"
|
||||
},
|
||||
{
|
||||
"name": "https://www.youtube.com/watch?v=9vD8GnKqDME",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.youtube.com/watch?v=9vD8GnKqDME"
|
||||
},
|
||||
{
|
||||
"name": "46380",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/46380"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user