"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:55:29 +00:00
parent d498781956
commit 7b2e5ff99c
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 2827 additions and 2827 deletions

View File

@ -52,11 +52,36 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "drupal-core-unspecified-xss(31311)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31311"
},
{
"name": "32140",
"refsource": "OSVDB",
"url": "http://osvdb.org/32140"
},
{ {
"name": "20070105 [DRUPAL-SA-2007-001] Drupal 4.6.11 / 4.7.5 fixes XSS issue", "name": "20070105 [DRUPAL-SA-2007-001] Drupal 4.6.11 / 4.7.5 fixes XSS issue",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456054/100/100/threaded" "url": "http://www.securityfocus.com/archive/1/456054/100/100/threaded"
}, },
{
"name": "32139",
"refsource": "OSVDB",
"url": "http://osvdb.org/32139"
},
{
"name": "ADV-2007-0050",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0050"
},
{
"name": "http://drupal.org/files/sa-2007-001/advisory.txt",
"refsource": "CONFIRM",
"url": "http://drupal.org/files/sa-2007-001/advisory.txt"
},
{ {
"name": "20070105 [DRUPAL-SA-2007-001] Drupal 4.6.11 / 4.7.5 fixes", "name": "20070105 [DRUPAL-SA-2007-001] Drupal 4.6.11 / 4.7.5 fixes",
"refsource": "FULLDISC", "refsource": "FULLDISC",
@ -66,31 +91,6 @@
"name": "http://drupal.org/node/104233", "name": "http://drupal.org/node/104233",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://drupal.org/node/104233" "url": "http://drupal.org/node/104233"
},
{
"name" : "http://drupal.org/files/sa-2007-001/advisory.txt",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/files/sa-2007-001/advisory.txt"
},
{
"name" : "ADV-2007-0050",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0050"
},
{
"name" : "32139",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32139"
},
{
"name" : "32140",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32140"
},
{
"name" : "drupal-core-unspecified-xss(31311)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31311"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070107 AJLogin v3.5 Remote Password Disclosure Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/456226/100/0/threaded"
},
{
"name" : "33404",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33404"
},
{ {
"name": "2127", "name": "2127",
"refsource": "SREASON", "refsource": "SREASON",
@ -71,6 +61,16 @@
"name": "ajlogin-ajlogin-info-disclosure(31331)", "name": "ajlogin-ajlogin-info-disclosure(31331)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31331" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31331"
},
{
"name": "20070107 AJLogin v3.5 Remote Password Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456226/100/0/threaded"
},
{
"name": "33404",
"refsource": "OSVDB",
"url": "http://osvdb.org/33404"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.alientrap.org/devwiki/index.php?n=Nexuiz.Patch", "name": "33018",
"refsource" : "CONFIRM", "refsource": "OSVDB",
"url" : "http://www.alientrap.org/devwiki/index.php?n=Nexuiz.Patch" "url": "http://osvdb.org/33018"
}, },
{ {
"name": "22332", "name": "22332",
@ -68,9 +68,9 @@
"url": "http://www.vupen.com/english/advisories/2007/0427" "url": "http://www.vupen.com/english/advisories/2007/0427"
}, },
{ {
"name" : "33018", "name": "http://www.alientrap.org/devwiki/index.php?n=Nexuiz.Patch",
"refsource" : "OSVDB", "refsource": "CONFIRM",
"url" : "http://osvdb.org/33018" "url": "http://www.alientrap.org/devwiki/index.php?n=Nexuiz.Patch"
}, },
{ {
"name": "23963", "name": "23963",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://docs.info.apple.com/article.html?artnum=305214", "name": "VU#873868",
"refsource" : "CONFIRM", "refsource": "CERT-VN",
"url" : "http://docs.info.apple.com/article.html?artnum=305214" "url": "http://www.kb.cert.org/vuls/id/873868"
},
{
"name" : "APPLE-SA-2007-03-13",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
}, },
{ {
"name": "TA07-072A", "name": "TA07-072A",
@ -68,9 +63,9 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
}, },
{ {
"name" : "VU#873868", "name": "APPLE-SA-2007-03-13",
"refsource" : "CERT-VN", "refsource": "APPLE",
"url" : "http://www.kb.cert.org/vuls/id/873868" "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
}, },
{ {
"name": "22948", "name": "22948",
@ -78,15 +73,25 @@
"url": "http://www.securityfocus.com/bid/22948" "url": "http://www.securityfocus.com/bid/22948"
}, },
{ {
"name" : "ADV-2007-0930", "name": "http://docs.info.apple.com/article.html?artnum=305214",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2007/0930" "url": "http://docs.info.apple.com/article.html?artnum=305214"
},
{
"name": "macos-imageio-code-execution(32974)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32974"
}, },
{ {
"name": "34853", "name": "34853",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/34853" "url": "http://www.osvdb.org/34853"
}, },
{
"name": "ADV-2007-0930",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0930"
},
{ {
"name": "1017758", "name": "1017758",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -96,11 +101,6 @@
"name": "24479", "name": "24479",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24479" "url": "http://secunia.com/advisories/24479"
},
{
"name" : "macos-imageio-code-execution(32974)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32974"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070205 Mina Ajans Script Remote File Inclusion Vuln.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/459191/100/0/threaded"
},
{ {
"name": "33687", "name": "33687",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/33687" "url": "http://osvdb.org/33687"
}, },
{
"name": "20070205 Mina Ajans Script Remote File Inclusion Vuln.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459191/100/0/threaded"
},
{ {
"name": "mina-multiple-file-include(32243)", "name": "mina-multiple-file-include(32243)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,31 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070405 ZDI-07-014: Kaspersky Anti-Virus ActiveX Control Unsafe Method Exposure Vulnerablity",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/464882/100/0/threaded"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-07-014.html",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-07-014.html"
},
{
"name" : "http://www.kaspersky.com/technews?id=203038694",
"refsource" : "CONFIRM",
"url" : "http://www.kaspersky.com/technews?id=203038694"
},
{
"name" : "23345",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23345"
},
{
"name" : "ADV-2007-1268",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1268"
},
{ {
"name": "1017884", "name": "1017884",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -92,10 +67,35 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24778" "url": "http://secunia.com/advisories/24778"
}, },
{
"name": "http://www.kaspersky.com/technews?id=203038694",
"refsource": "CONFIRM",
"url": "http://www.kaspersky.com/technews?id=203038694"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-014.html",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-014.html"
},
{
"name": "ADV-2007-1268",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1268"
},
{
"name": "23345",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23345"
},
{ {
"name": "kaspersky-startuploading-info-disclosure(33464)", "name": "kaspersky-startuploading-info-disclosure(33464)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33464" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33464"
},
{
"name": "20070405 ZDI-07-014: Kaspersky Anti-Virus ActiveX Control Unsafe Method Exposure Vulnerablity",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464882/100/0/threaded"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://sourceforge.net/project/shownotes.php?group_id=85523&release_id=492572", "name": "ADV-2007-0901",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://sourceforge.net/project/shownotes.php?group_id=85523&release_id=492572" "url": "http://www.vupen.com/english/advisories/2007/0901"
}, },
{ {
"name": "http://astrocam.svn.sourceforge.net/viewvc/astrocam/BUGS?view=markup", "name": "http://astrocam.svn.sourceforge.net/viewvc/astrocam/BUGS?view=markup",
@ -68,19 +68,19 @@
"url": "http://www.securityfocus.com/bid/22924" "url": "http://www.securityfocus.com/bid/22924"
}, },
{ {
"name" : "ADV-2007-0901", "name": "http://sourceforge.net/project/shownotes.php?group_id=85523&release_id=492572",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2007/0901" "url": "http://sourceforge.net/project/shownotes.php?group_id=85523&release_id=492572"
},
{
"name" : "32868",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/32868"
}, },
{ {
"name": "24480", "name": "24480",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24480" "url": "http://secunia.com/advisories/24480"
},
{
"name": "32868",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/32868"
} }
] ]
} }

View File

@ -57,41 +57,11 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/462915/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/462915/100/0/threaded"
}, },
{
"name" : "[announce] 20070314 Horde 3.1.4 (final)",
"refsource" : "MLIST",
"url" : "http://lists.horde.org/archives/announce/2007/000315.html"
},
{
"name" : "DSA-1406",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1406"
},
{ {
"name": "SUSE-SR:2007:007", "name": "SUSE-SR:2007:007",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_007_suse.html" "url": "http://www.novell.com/linux/security/advisories/2007_007_suse.html"
}, },
{
"name" : "22984",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22984"
},
{
"name" : "ADV-2007-0965",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0965"
},
{
"name" : "33084",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/33084"
},
{
"name" : "1017775",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017775"
},
{ {
"name": "24528", "name": "24528",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -107,15 +77,45 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27565" "url": "http://secunia.com/advisories/27565"
}, },
{
"name": "horde-login-xss(33013)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33013"
},
{ {
"name": "2427", "name": "2427",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2427" "url": "http://securityreason.com/securityalert/2427"
}, },
{ {
"name" : "horde-login-xss(33013)", "name": "1017775",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33013" "url": "http://securitytracker.com/id?1017775"
},
{
"name": "22984",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22984"
},
{
"name": "33084",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/33084"
},
{
"name": "DSA-1406",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1406"
},
{
"name": "ADV-2007-0965",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0965"
},
{
"name": "[announce] 20070314 Horde 3.1.4 (final)",
"refsource": "MLIST",
"url": "http://lists.horde.org/archives/announce/2007/000315.html"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "3489",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3489"
},
{
"name" : "34233",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34233"
},
{ {
"name": "24536", "name": "24536",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -71,6 +61,16 @@
"name": "creative-schreiben-xss(33015)", "name": "creative-schreiben-xss(33015)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33015" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33015"
},
{
"name": "3489",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3489"
},
{
"name": "34233",
"refsource": "OSVDB",
"url": "http://osvdb.org/34233"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/472656/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/472656/100/0/threaded"
}, },
{
"name" : "24737",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24737"
},
{ {
"name": "45741", "name": "45741",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -72,6 +67,11 @@
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2862" "url": "http://securityreason.com/securityalert/2862"
}, },
{
"name": "24737",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24737"
},
{ {
"name": "freedomain-members-sql-injection(35366)", "name": "freedomain-members-sql-injection(35366)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5849", "ID": "CVE-2014-5849",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#632833", "name": "VU#632833",
"refsource": "CERT-VN", "refsource": "CERT-VN",

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150314 Re: CVE Request for information leak in Etherpad exports",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/03/15/3"
},
{ {
"name": "https://github.com/ether/etherpad-lite/commit/a0fb65205c7d7ff95f00eb9fd88e93b300f30c3d", "name": "https://github.com/ether/etherpad-lite/commit/a0fb65205c7d7ff95f00eb9fd88e93b300f30c3d",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "https://github.com/ether/etherpad-lite/releases/tag/1.5.2", "name": "https://github.com/ether/etherpad-lite/releases/tag/1.5.2",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/ether/etherpad-lite/releases/tag/1.5.2" "url": "https://github.com/ether/etherpad-lite/releases/tag/1.5.2"
},
{
"name": "[oss-security] 20150314 Re: CVE Request for information leak in Etherpad exports",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/03/15/3"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2475", "ID": "CVE-2015-2475",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1033246",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033246"
},
{ {
"name": "MS15-087", "name": "MS15-087",
"refsource": "MS", "refsource": "MS",
@ -61,11 +66,6 @@
"name": "76259", "name": "76259",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/76259" "url": "http://www.securityfocus.com/bid/76259"
},
{
"name" : "1033246",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033246"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2649", "ID": "CVE-2015-2649",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6039", "ID": "CVE-2015-6039",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6096", "ID": "CVE-2015-6096",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2015-6850", "ID": "CVE-2015-6850",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20151222 ESA-2015-174: EMC VPLEX Undocumented Account Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://seclists.org/bugtraq/2015/Dec/129"
},
{ {
"name": "http://packetstormsecurity.com/files/135041/EMC-VPLEX-Undocumented-Account.html", "name": "http://packetstormsecurity.com/files/135041/EMC-VPLEX-Undocumented-Account.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135041/EMC-VPLEX-Undocumented-Account.html" "url": "http://packetstormsecurity.com/files/135041/EMC-VPLEX-Undocumented-Account.html"
}, },
{
"name": "20151222 ESA-2015-174: EMC VPLEX Undocumented Account Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2015/Dec/129"
},
{ {
"name": "79664", "name": "79664",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0153", "ID": "CVE-2016-0153",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS16-044",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-044"
},
{ {
"name": "1035536", "name": "1035536",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035536" "url": "http://www.securitytracker.com/id/1035536"
},
{
"name": "MS16-044",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-044"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0422", "ID": "CVE-2016-0422",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1034722",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034722"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "https://www.onapsis.com/research/security-advisories/jd-edwards-jdenet-password-disclosure",
"refsource": "MISC",
"url": "https://www.onapsis.com/research/security-advisories/jd-edwards-jdenet-password-disclosure"
},
{ {
"name": "20160825 Onapsis Security Advisory ONAPSIS-2016-009: JD Edwards JDENet Password Disclosure", "name": "20160825 Onapsis Security Advisory ONAPSIS-2016-009: JD Edwards JDENet Password Disclosure",
"refsource": "FULLDISC", "refsource": "FULLDISC",
@ -61,21 +76,6 @@
"name": "http://packetstormsecurity.com/files/138507/JD-Edwards-9.1-EnterpriseOne-Server-JDENet-Password-Disclosure.html", "name": "http://packetstormsecurity.com/files/138507/JD-Edwards-9.1-EnterpriseOne-Server-JDENet-Password-Disclosure.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/138507/JD-Edwards-9.1-EnterpriseOne-Server-JDENet-Password-Disclosure.html" "url": "http://packetstormsecurity.com/files/138507/JD-Edwards-9.1-EnterpriseOne-Server-JDENet-Password-Disclosure.html"
},
{
"name" : "https://www.onapsis.com/research/security-advisories/jd-edwards-jdenet-password-disclosure",
"refsource" : "MISC",
"url" : "https://www.onapsis.com/research/security-advisories/jd-edwards-jdenet-password-disclosure"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name" : "1034722",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034722"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-0828", "ID": "CVE-2016-0828",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-03-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-03-01.html"
},
{ {
"name": "https://android.googlesource.com/platform/frameworks/native/+/dded8fdbb700d6cc498debc69a780915bc34d755", "name": "https://android.googlesource.com/platform/frameworks/native/+/dded8fdbb700d6cc498debc69a780915bc34d755",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "84261", "name": "84261",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/84261" "url": "http://www.securityfocus.com/bid/84261"
},
{
"name": "http://source.android.com/security/bulletin/2016-03-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-03-01.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-0953", "ID": "CVE-2016-0953",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8", "name": "GLSA-201706-14",
"refsource" : "MISC", "refsource": "GENTOO",
"url" : "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8" "url": "https://security.gentoo.org/glsa/201706-14"
}, },
{ {
"name": "http://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858", "name": "http://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858",
@ -68,9 +68,9 @@
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=289" "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=289"
}, },
{ {
"name" : "GLSA-201706-14", "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8",
"refsource" : "GENTOO", "refsource": "MISC",
"url" : "https://security.gentoo.org/glsa/201706-14" "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8"
}, },
{ {
"name": "97677", "name": "97677",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1016", "ID": "CVE-2016-1016",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-226/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-226/"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
},
{
"name" : "MS16-050",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-050"
},
{
"name" : "RHSA-2016:0610",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0610.html"
},
{ {
"name": "SUSE-SU-2016:1305", "name": "SUSE-SU-2016:1305",
"refsource": "SUSE", "refsource": "SUSE",
@ -87,10 +67,30 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/85926" "url": "http://www.securityfocus.com/bid/85926"
}, },
{
"name": "RHSA-2016:0610",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0610.html"
},
{ {
"name": "1035509", "name": "1035509",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035509" "url": "http://www.securitytracker.com/id/1035509"
},
{
"name": "MS16-050",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-050"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-226/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-226/"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1039", "ID": "CVE-2016-1039",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,9 +58,9 @@
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-290" "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-290"
}, },
{ {
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html", "name": "1035828",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html" "url": "http://www.securitytracker.com/id/1035828"
}, },
{ {
"name": "90517", "name": "90517",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/90517" "url": "http://www.securityfocus.com/bid/90517"
}, },
{ {
"name" : "1035828", "name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1035828" "url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1323", "ID": "CVE-2016-1323",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1395", "ID": "CVE-2016-1395",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160615 Cisco RV110W, RV130W, and RV215W Routers Arbitrary Code Execution Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv"
},
{ {
"name": "1036113", "name": "1036113",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036113" "url": "http://www.securitytracker.com/id/1036113"
},
{
"name": "20160615 Cisco RV110W, RV130W, and RV215W Routers Arbitrary Code Execution Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4096", "ID": "CVE-2016-4096",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{ {
"name": "1035828", "name": "1035828",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828" "url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-4934", "ID": "CVE-2016-4934",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugs.php.net/bug.php?id=77630",
"refsource" : "MISC",
"url" : "https://bugs.php.net/bug.php?id=77630"
},
{ {
"name": "DSA-4403", "name": "DSA-4403",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4403" "url": "https://www.debian.org/security/2019/dsa-4403"
},
{
"name": "https://bugs.php.net/bug.php?id=77630",
"refsource": "MISC",
"url": "https://bugs.php.net/bug.php?id=77630"
} }
] ]
} }