"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:52:07 +00:00
parent 276e4aa4f2
commit 7ee4d0117a
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 3650 additions and 3650 deletions

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "3062", "name": "32539",
"refsource" : "EXPLOIT-DB", "refsource": "OSVDB",
"url" : "https://www.exploit-db.com/exploits/3062" "url": "http://osvdb.org/32539"
}, },
{ {
"name": "21833", "name": "21833",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/21833" "url": "http://www.securityfocus.com/bid/21833"
}, },
{
"name" : "ADV-2007-0016",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0016"
},
{
"name" : "32539",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32539"
},
{ {
"name": "23572", "name": "23572",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23572" "url": "http://secunia.com/advisories/23572"
}, },
{
"name": "3062",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3062"
},
{ {
"name": "autodealer-detail-sql-injection(31219)", "name": "autodealer-detail-sql-injection(31219)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31219" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31219"
},
{
"name": "ADV-2007-0016",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0016"
} }
] ]
} }

View File

@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20081111 Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3)", "name": "32618",
"refsource" : "ISS", "refsource": "SECUNIA",
"url" : "http://www.iss.net/threats/309.html" "url": "http://secunia.com/advisories/32618"
},
{
"name" : "http://blogs.iss.net/archive/trend.html",
"refsource" : "MISC",
"url" : "http://blogs.iss.net/archive/trend.html"
},
{
"name" : "VU#768681",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/768681"
}, },
{ {
"name": "32261", "name": "32261",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32261" "url": "http://www.securityfocus.com/bid/32261"
}, },
{
"name": "application-rpc-read-bo(38760)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38760"
},
{
"name": "VU#768681",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/768681"
},
{
"name": "http://blogs.iss.net/archive/trend.html",
"refsource": "MISC",
"url": "http://blogs.iss.net/archive/trend.html"
},
{ {
"name": "ADV-2008-3127", "name": "ADV-2008-3127",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3127" "url": "http://www.vupen.com/english/advisories/2008/3127"
}, },
{ {
"name" : "32618", "name": "20081111 Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3)",
"refsource" : "SECUNIA", "refsource": "ISS",
"url" : "http://secunia.com/advisories/32618" "url": "http://www.iss.net/threats/309.html"
},
{
"name" : "application-rpc-read-bo(38760)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38760"
} }
] ]
} }

View File

@ -52,55 +52,55 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=197306",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=197306"
},
{
"name" : "DSA-1269",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1269"
},
{ {
"name": "GLSA-200712-07", "name": "GLSA-200712-07",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200712-07.xml" "url": "http://security.gentoo.org/glsa/glsa-200712-07.xml"
}, },
{
"name" : "23026",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23026"
},
{
"name" : "34263",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34263"
},
{
"name" : "1017792",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017792"
},
{
"name" : "24377",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24377"
},
{
"name" : "24590",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24590"
},
{ {
"name": "28023", "name": "28023",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28023" "url": "http://secunia.com/advisories/28023"
}, },
{
"name": "1017792",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017792"
},
{
"name": "DSA-1269",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1269"
},
{
"name": "34263",
"refsource": "OSVDB",
"url": "http://osvdb.org/34263"
},
{
"name": "24590",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24590"
},
{
"name": "24377",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24377"
},
{
"name": "23026",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23026"
},
{ {
"name": "lookup-ndebbinary-symlink(33052)", "name": "lookup-ndebbinary-symlink(33052)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33052" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33052"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=197306",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=197306"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "3262", "name": "24027",
"refsource" : "EXPLOIT-DB", "refsource": "SECUNIA",
"url" : "https://www.exploit-db.com/exploits/3262" "url": "http://secunia.com/advisories/24027"
},
{
"name": "wbblite-pms-sql-injection(32172)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32172"
}, },
{ {
"name": "22415", "name": "22415",
@ -67,20 +72,15 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0491" "url": "http://www.vupen.com/english/advisories/2007/0491"
}, },
{
"name": "3262",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3262"
},
{ {
"name": "32034", "name": "32034",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/32034" "url": "http://osvdb.org/32034"
},
{
"name" : "24027",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24027"
},
{
"name" : "wbblite-pms-sql-injection(32172)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32172"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "3288", "name": "lushiwarplaner-register-sql-injection(32365)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/3288" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32365"
}, },
{ {
"name": "22470", "name": "22470",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/24079" "url": "http://secunia.com/advisories/24079"
}, },
{ {
"name" : "lushiwarplaner-register-sql-injection(32365)", "name": "3288",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32365" "url": "https://www.exploit-db.com/exploits/3288"
} }
] ]
} }

View File

@ -52,56 +52,61 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070220 TSRT-07-01: Trend Micro ServerProtect StCommon.dll Stack Overflow Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/460686/100/0/threaded"
},
{
"name" : "20070220 TSRT-07-02: Trend Micro ServerProtect eng50.dll Stack Overflow Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/460690/100/0/threaded"
},
{ {
"name": "http://www.tippingpoint.com/security/advisories/TSRT-07-01.html", "name": "http://www.tippingpoint.com/security/advisories/TSRT-07-01.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.tippingpoint.com/security/advisories/TSRT-07-01.html" "url": "http://www.tippingpoint.com/security/advisories/TSRT-07-01.html"
}, },
{
"name" : "http://www.tippingpoint.com/security/advisories/TSRT-07-02.html",
"refsource" : "MISC",
"url" : "http://www.tippingpoint.com/security/advisories/TSRT-07-02.html"
},
{
"name" : "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290",
"refsource" : "CONFIRM",
"url" : "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290"
},
{
"name" : "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt",
"refsource" : "CONFIRM",
"url" : "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt"
},
{
"name" : "VU#349393",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/349393"
},
{ {
"name": "VU#466609", "name": "VU#466609",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/466609" "url": "http://www.kb.cert.org/vuls/id/466609"
}, },
{
"name": "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt",
"refsource": "CONFIRM",
"url": "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt"
},
{
"name": "24243",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24243"
},
{
"name": "33042",
"refsource": "OSVDB",
"url": "http://osvdb.org/33042"
},
{ {
"name": "VU#630025", "name": "VU#630025",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/630025" "url": "http://www.kb.cert.org/vuls/id/630025"
}, },
{
"name": "20070220 TSRT-07-02: Trend Micro ServerProtect eng50.dll Stack Overflow Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460690/100/0/threaded"
},
{
"name": "20070220 TSRT-07-01: Trend Micro ServerProtect StCommon.dll Stack Overflow Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460686/100/0/threaded"
},
{ {
"name": "VU#730433", "name": "VU#730433",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/730433" "url": "http://www.kb.cert.org/vuls/id/730433"
}, },
{
"name": "serverprotect-eng50-bo(32594)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32594"
},
{
"name": "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290",
"refsource": "CONFIRM",
"url": "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290"
},
{ {
"name": "22639", "name": "22639",
"refsource": "BID", "refsource": "BID",
@ -113,29 +118,24 @@
"url": "http://www.vupen.com/english/advisories/2007/0670" "url": "http://www.vupen.com/english/advisories/2007/0670"
}, },
{ {
"name" : "33042", "name": "http://www.tippingpoint.com/security/advisories/TSRT-07-02.html",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://osvdb.org/33042" "url": "http://www.tippingpoint.com/security/advisories/TSRT-07-02.html"
}, },
{ {
"name" : "1017676", "name": "VU#349393",
"refsource" : "SECTRACK", "refsource": "CERT-VN",
"url" : "http://www.securitytracker.com/id?1017676" "url": "http://www.kb.cert.org/vuls/id/349393"
},
{
"name" : "24243",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24243"
},
{
"name" : "serverprotect-eng50-bo(32594)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32594"
}, },
{ {
"name": "serverprotect-stcommon-bo(32601)", "name": "serverprotect-stcommon-bo(32601)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32601" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32601"
},
{
"name": "1017676",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017676"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070222 JBoss jmx-console CSRF",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/460934/100/0/threaded"
},
{
"name" : "20070223 Re: JBoss jmx-console CSRF",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/461004/100/0/threaded"
},
{ {
"name": "33142", "name": "33142",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -71,6 +61,16 @@
"name": "jboss-jmxconsole-csrf(32673)", "name": "jboss-jmxconsole-csrf(32673)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32673" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32673"
},
{
"name": "20070222 JBoss jmx-console CSRF",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460934/100/0/threaded"
},
{
"name": "20070223 Re: JBoss jmx-console CSRF",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/461004/100/0/threaded"
} }
] ]
} }

View File

@ -57,16 +57,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.php-security.org/MOPB/BONUS-06-2007.html" "url": "http://www.php-security.org/MOPB/BONUS-06-2007.html"
}, },
{
"name" : "http://www.zend.com/products/zend_platform/security_vulnerabilities",
"refsource" : "CONFIRM",
"url" : "http://www.zend.com/products/zend_platform/security_vulnerabilities"
},
{
"name" : "22801",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22801"
},
{ {
"name": "ADV-2007-0829", "name": "ADV-2007-0829",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -77,6 +67,11 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/32772" "url": "http://www.osvdb.org/32772"
}, },
{
"name": "22801",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22801"
},
{ {
"name": "24501", "name": "24501",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -86,6 +81,11 @@
"name": "zend-scd-privilege-escalation(32825)", "name": "zend-scd-privilege-escalation(32825)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32825" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32825"
},
{
"name": "http://www.zend.com/products/zend_platform/security_vulnerabilities",
"refsource": "CONFIRM",
"url": "http://www.zend.com/products/zend_platform/security_vulnerabilities"
} }
] ]
} }

View File

@ -52,6 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2007-0720",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0720"
},
{
"name": "20070322 WebAPP Audit",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-March/001455.html"
},
{
"name": "35214",
"refsource": "OSVDB",
"url": "http://osvdb.org/35214"
},
{
"name": "24227",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24227"
},
{
"name": "35215",
"refsource": "OSVDB",
"url": "http://osvdb.org/35215"
},
{ {
"name": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=252", "name": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=252",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,31 +86,6 @@
"name": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=254", "name": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=254",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=254" "url": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=254"
},
{
"name" : "20070322 WebAPP Audit",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2007-March/001455.html"
},
{
"name" : "ADV-2007-0720",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0720"
},
{
"name" : "35214",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35214"
},
{
"name" : "35215",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35215"
},
{
"name" : "24227",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24227"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "23374",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23374"
},
{ {
"name": "34322", "name": "34322",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/34322" "url": "http://osvdb.org/34322"
}, },
{
"name": "23374",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23374"
},
{ {
"name": "24820", "name": "24820",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -52,26 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4504",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4504"
},
{ {
"name": "25980", "name": "25980",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25980" "url": "http://www.securityfocus.com/bid/25980"
}, },
{
"name" : "ADV-2007-3447",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3447"
},
{ {
"name": "37619", "name": "37619",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37619" "url": "http://osvdb.org/37619"
}, },
{
"name": "ADV-2007-3447",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3447"
},
{ {
"name": "27138", "name": "27138",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +76,11 @@
"name": "softbiz-browsecats-sql-injection(37027)", "name": "softbiz-browsecats-sql-injection(37027)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37027" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37027"
},
{
"name": "4504",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4504"
} }
] ]
} }

View File

@ -57,21 +57,6 @@
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066581.html" "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066581.html"
}, },
{
"name" : "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066691.html"
},
{
"name" : "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066694.html"
},
{
"name" : "26057",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26057"
},
{ {
"name": "ADV-2007-3534", "name": "ADV-2007-3534",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -82,10 +67,25 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27231" "url": "http://secunia.com/advisories/27231"
}, },
{
"name": "26057",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26057"
},
{
"name": "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066694.html"
},
{ {
"name": "callmanager-openser-sip-call-hijacking(37197)", "name": "callmanager-openser-sip-call-hijacking(37197)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37197" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37197"
},
{
"name": "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066691.html"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20071017 Microsoft Windows XP/2003 Macrovision SecDrv.sys privilege escalation (0day)", "name": "http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=43&Itemid=15",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://www.securityfocus.com/archive/1/482474/100/0/threaded" "url": "http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=43&Itemid=15"
},
{
"name" : "20071018 [CORRECTED] Microsoft Windows XP SP2/2003 - Macrovision SecDrv.sys privilege escalation (0day)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482482/100/0/threaded"
}, },
{ {
"name": "http://blog.48bits.com/?p=172", "name": "http://blog.48bits.com/?p=172",
@ -68,29 +63,9 @@
"url": "http://blog.48bits.com/?p=172" "url": "http://blog.48bits.com/?p=172"
}, },
{ {
"name" : "http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=43&Itemid=15", "name": "27285",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=43&Itemid=15" "url": "http://secunia.com/advisories/27285"
},
{
"name" : "http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html",
"refsource" : "MISC",
"url" : "http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html"
},
{
"name" : "HPSBST02299",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/485268/100/0/threaded"
},
{
"name" : "SSRT071506",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/485268/100/0/threaded"
},
{
"name" : "MS07-067",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-067"
}, },
{ {
"name": "944653", "name": "944653",
@ -98,39 +73,54 @@
"url": "http://www.microsoft.com/technet/security/advisory/944653.mspx" "url": "http://www.microsoft.com/technet/security/advisory/944653.mspx"
}, },
{ {
"name" : "TA07-345A", "name": "oval:org.mitre.oval:def:4584",
"refsource" : "CERT", "refsource": "OVAL",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-345A.html" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4584"
},
{
"name" : "26121",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26121"
}, },
{ {
"name": "ADV-2007-3537", "name": "ADV-2007-3537",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3537" "url": "http://www.vupen.com/english/advisories/2007/3537"
}, },
{
"name": "SSRT071506",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/485268/100/0/threaded"
},
{
"name": "http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html",
"refsource": "MISC",
"url": "http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html"
},
{ {
"name": "41429", "name": "41429",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/41429" "url": "http://osvdb.org/41429"
}, },
{ {
"name" : "oval:org.mitre.oval:def:4584", "name": "HPSBST02299",
"refsource" : "OVAL", "refsource": "HP",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4584" "url": "http://www.securityfocus.com/archive/1/485268/100/0/threaded"
}, },
{ {
"name" : "1018833", "name": "TA07-345A",
"refsource" : "SECTRACK", "refsource": "CERT",
"url" : "http://www.securitytracker.com/id?1018833" "url": "http://www.us-cert.gov/cas/techalerts/TA07-345A.html"
}, },
{ {
"name" : "27285", "name": "20071018 [CORRECTED] Microsoft Windows XP SP2/2003 - Macrovision SecDrv.sys privilege escalation (0day)",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/27285" "url": "http://www.securityfocus.com/archive/1/482482/100/0/threaded"
},
{
"name": "windows-secdrv-bo(37284)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37284"
},
{
"name": "20071017 Microsoft Windows XP/2003 Macrovision SecDrv.sys privilege escalation (0day)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482474/100/0/threaded"
}, },
{ {
"name": "3266", "name": "3266",
@ -138,9 +128,19 @@
"url": "http://securityreason.com/securityalert/3266" "url": "http://securityreason.com/securityalert/3266"
}, },
{ {
"name" : "windows-secdrv-bo(37284)", "name": "1018833",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37284" "url": "http://www.securitytracker.com/id?1018833"
},
{
"name": "26121",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26121"
},
{
"name": "MS07-067",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-067"
} }
] ]
} }

View File

@ -53,49 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://taviso.decsystem.org/virtsec.pdf", "name": "23731",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://taviso.decsystem.org/virtsec.pdf" "url": "http://www.securityfocus.com/bid/23731"
},
{
"name" : "DSA-1284",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1284"
}, },
{ {
"name": "MDKSA-2007:203", "name": "MDKSA-2007:203",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:203" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:203"
}, },
{
"name" : "MDVSA-2008:162",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:162"
},
{ {
"name": "RHSA-2008:0194", "name": "RHSA-2008:0194",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0194.html" "url": "http://www.redhat.com/support/errata/RHSA-2008-0194.html"
}, },
{ {
"name" : "20071030 Clarification on old QEMU/NE2000/Xen issues", "name": "qemu-net-socket-bo(38239)",
"refsource" : "VIM", "refsource": "XF",
"url" : "http://www.attrition.org/pipermail/vim/2007-October/001842.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38239"
},
{
"name" : "23731",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23731"
},
{
"name" : "oval:org.mitre.oval:def:10000",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000"
},
{
"name" : "ADV-2007-1597",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1597"
}, },
{ {
"name": "42985", "name": "42985",
@ -103,9 +78,9 @@
"url": "http://osvdb.org/42985" "url": "http://osvdb.org/42985"
}, },
{ {
"name" : "27486", "name": "DSA-1284",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/27486" "url": "http://www.debian.org/security/2007/dsa-1284"
}, },
{ {
"name": "25073", "name": "25073",
@ -113,24 +88,49 @@
"url": "http://secunia.com/advisories/25073" "url": "http://secunia.com/advisories/25073"
}, },
{ {
"name" : "25095", "name": "http://taviso.decsystem.org/virtsec.pdf",
"refsource": "MISC",
"url": "http://taviso.decsystem.org/virtsec.pdf"
},
{
"name": "27486",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/25095" "url": "http://secunia.com/advisories/27486"
},
{
"name": "MDVSA-2008:162",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:162"
},
{
"name": "oval:org.mitre.oval:def:10000",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000"
}, },
{ {
"name": "29963", "name": "29963",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29963" "url": "http://secunia.com/advisories/29963"
}, },
{
"name": "ADV-2007-1597",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1597"
},
{ {
"name": "29129", "name": "29129",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29129" "url": "http://secunia.com/advisories/29129"
}, },
{ {
"name" : "qemu-net-socket-bo(38239)", "name": "25095",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38239" "url": "http://secunia.com/advisories/25095"
},
{
"name": "20071030 Clarification on old QEMU/NE2000/Xen issues",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-October/001842.html"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071025 Flatnuke3 Remote Cookie Manipoulation / Privilege Escalation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482774/100/0/threaded"
},
{ {
"name": "4562", "name": "4562",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4562" "url": "https://www.exploit-db.com/exploits/4562"
}, },
{
"name": "20071025 Flatnuke3 Remote Cookie Manipoulation / Privilege Escalation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482774/100/0/threaded"
},
{ {
"name": "43636", "name": "43636",
"refsource": "OSVDB", "refsource": "OSVDB",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-3825", "ID": "CVE-2015-3825",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-3962", "ID": "CVE-2015-3962",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01"
},
{ {
"name": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-254-01", "name": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-254-01",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-254-01" "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-254-01"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6435", "ID": "CVE-2015-6435",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160120 Cisco Unified Computing System Manager and Cisco Firepower 9000 Remote Command Execution Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-ucsm"
},
{ {
"name": "1034743", "name": "1034743",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034743" "url": "http://www.securitytracker.com/id/1034743"
},
{
"name": "20160120 Cisco Unified Computing System Manager and Cisco Firepower 9000 Remote Command Execution Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-ucsm"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@suse.com",
"ID": "CVE-2015-6833", "ID": "CVE-2015-6833",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "DSA-3344",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3344"
},
{
"name": "https://bugs.php.net/bug.php?id=70019",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=70019"
},
{ {
"name": "[oss-security] 20150819 CVE Request: more php unserializing issues", "name": "[oss-security] 20150819 CVE Request: more php unserializing issues",
"refsource": "MLIST", "refsource": "MLIST",
@ -62,16 +72,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php" "url": "http://www.php.net/ChangeLog-5.php"
}, },
{
"name" : "https://bugs.php.net/bug.php?id=70019",
"refsource" : "CONFIRM",
"url" : "https://bugs.php.net/bug.php?id=70019"
},
{
"name" : "DSA-3344",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3344"
},
{ {
"name": "GLSA-201606-10", "name": "GLSA-201606-10",
"refsource": "GENTOO", "refsource": "GENTOO",

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20150902 NibbleBlog 4.0.3 - Code Execution - Not fixed",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Sep/5"
},
{ {
"name": "http://blog.curesec.com/article/blog/NibbleBlog-403-Code-Execution-47.html", "name": "http://blog.curesec.com/article/blog/NibbleBlog-403-Code-Execution-47.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://blog.curesec.com/article/blog/NibbleBlog-403-Code-Execution-47.html" "url": "http://blog.curesec.com/article/blog/NibbleBlog-403-Code-Execution-47.html"
}, },
{
"name" : "http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html"
},
{ {
"name": "http://blog.nibbleblog.com/post/nibbleblog-v4-0-5/", "name": "http://blog.nibbleblog.com/post/nibbleblog-v4-0-5/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://blog.nibbleblog.com/post/nibbleblog-v4-0-5/" "url": "http://blog.nibbleblog.com/post/nibbleblog-v4-0-5/"
},
{
"name": "20150902 NibbleBlog 4.0.3 - Code Execution - Not fixed",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Sep/5"
},
{
"name": "http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-7293", "ID": "CVE-2015-7293",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "38411",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/38411/"
},
{ {
"name": "http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html", "name": "http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html" "url": "http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html"
}, },
{
"name": "38411",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38411/"
},
{ {
"name": "https://plone.org/security/hotfix/20151006", "name": "https://plone.org/security/hotfix/20151006",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-7633", "ID": "CVE-2015-7633",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,55 +52,55 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html"
},
{
"name" : "GLSA-201511-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201511-02"
},
{ {
"name": "RHSA-2015:2024", "name": "RHSA-2015:2024",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html"
}, },
{
"name" : "RHSA-2015:1893",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1893.html"
},
{
"name" : "SUSE-SU-2015:1740",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html"
},
{
"name" : "SUSE-SU-2015:1742",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html"
},
{ {
"name": "openSUSE-SU-2015:1744", "name": "openSUSE-SU-2015:1744",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html"
}, },
{
"name" : "openSUSE-SU-2015:1781",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
},
{ {
"name": "77065", "name": "77065",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/77065" "url": "http://www.securityfocus.com/bid/77065"
}, },
{
"name": "SUSE-SU-2015:1742",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html"
},
{
"name": "RHSA-2015:1893",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1893.html"
},
{
"name": "GLSA-201511-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201511-02"
},
{ {
"name": "1033797", "name": "1033797",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033797" "url": "http://www.securitytracker.com/id/1033797"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html"
},
{
"name": "SUSE-SU-2015:1740",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html"
},
{
"name": "openSUSE-SU-2015:1781",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-8078", "ID": "CVE-2015-8078",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,31 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20151104 Re: CVE request: urlfetch range handling flaw in Cyrus IMAP",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/11/04/3"
},
{
"name" : "https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2",
"refsource" : "CONFIRM",
"url" : "https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2"
},
{ {
"name": "https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html", "name": "https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html" "url": "https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html"
}, },
{
"name": "[oss-security] 20151104 Re: CVE request: urlfetch range handling flaw in Cyrus IMAP",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/11/04/3"
},
{ {
"name": "openSUSE-SU-2015:2130", "name": "openSUSE-SU-2015:2130",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html"
}, },
{
"name" : "SUSE-SU-2016:1457",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html"
},
{ {
"name": "SUSE-SU-2016:1459", "name": "SUSE-SU-2016:1459",
"refsource": "SUSE", "refsource": "SUSE",
@ -86,6 +76,16 @@
"name": "1034282", "name": "1034282",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034282" "url": "http://www.securitytracker.com/id/1034282"
},
{
"name": "SUSE-SU-2016:1457",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html"
},
{
"name": "https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2",
"refsource": "CONFIRM",
"url": "https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2"
} }
] ]
} }

View File

@ -53,39 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20160113 Remote Code Execution in Roundcube", "name": "GLSA-201603-03",
"refsource" : "BUGTRAQ", "refsource": "GENTOO",
"url" : "http://www.securityfocus.com/archive/1/537304/100/0/threaded" "url": "https://security.gentoo.org/glsa/201603-03"
},
{
"name" : "39245",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39245/"
},
{
"name" : "http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html"
},
{
"name" : "https://www.htbridge.com/advisory/HTB23283",
"refsource" : "MISC",
"url" : "https://www.htbridge.com/advisory/HTB23283"
},
{
"name" : "http://trac.roundcube.net/changeset/10e5192a2b/github",
"refsource" : "CONFIRM",
"url" : "http://trac.roundcube.net/changeset/10e5192a2b/github"
},
{
"name" : "http://trac.roundcube.net/ticket/1490620",
"refsource" : "CONFIRM",
"url" : "http://trac.roundcube.net/ticket/1490620"
},
{
"name" : "https://roundcube.net/news/2015/12/26/updates-1.1.4-and-1.0.8-released/",
"refsource" : "CONFIRM",
"url" : "https://roundcube.net/news/2015/12/26/updates-1.1.4-and-1.0.8-released/"
}, },
{ {
"name": "DSA-3541", "name": "DSA-3541",
@ -93,24 +63,54 @@
"url": "http://www.debian.org/security/2016/dsa-3541" "url": "http://www.debian.org/security/2016/dsa-3541"
}, },
{ {
"name" : "GLSA-201603-03", "name": "http://trac.roundcube.net/changeset/10e5192a2b/github",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201603-03" "url": "http://trac.roundcube.net/changeset/10e5192a2b/github"
},
{
"name": "20160113 Remote Code Execution in Roundcube",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537304/100/0/threaded"
},
{
"name": "openSUSE-SU-2016:0214",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00030.html"
},
{
"name": "https://roundcube.net/news/2015/12/26/updates-1.1.4-and-1.0.8-released/",
"refsource": "CONFIRM",
"url": "https://roundcube.net/news/2015/12/26/updates-1.1.4-and-1.0.8-released/"
}, },
{ {
"name": "openSUSE-SU-2016:0210", "name": "openSUSE-SU-2016:0210",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00028.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00028.html"
}, },
{
"name": "http://trac.roundcube.net/ticket/1490620",
"refsource": "CONFIRM",
"url": "http://trac.roundcube.net/ticket/1490620"
},
{
"name": "http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html"
},
{
"name": "39245",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39245/"
},
{
"name": "https://www.htbridge.com/advisory/HTB23283",
"refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23283"
},
{ {
"name": "openSUSE-SU-2016:0213", "name": "openSUSE-SU-2016:0213",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00029.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00029.html"
},
{
"name" : "openSUSE-SU-2016:0214",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00030.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0042", "ID": "CVE-2016-0042",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS16-014",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-014"
},
{ {
"name": "1034985", "name": "1034985",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034985" "url": "http://www.securitytracker.com/id/1034985"
},
{
"name": "MS16-014",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-014"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0611", "ID": "CVE-2016-0611",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name" : "RHSA-2016:0705",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
},
{ {
"name": "openSUSE-SU-2016:0367", "name": "openSUSE-SU-2016:0367",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"
}, },
{ {
"name" : "openSUSE-SU-2016:0377", "name": "1034708",
"refsource" : "SUSE", "refsource": "SECTRACK",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" "url": "http://www.securitytracker.com/id/1034708"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
}, },
{ {
"name": "USN-2881-1", "name": "USN-2881-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2881-1" "url": "http://www.ubuntu.com/usn/USN-2881-1"
}, },
{
"name": "openSUSE-SU-2016:0377",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"
},
{
"name": "RHSA-2016:0705",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
},
{ {
"name": "81164", "name": "81164",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/81164" "url": "http://www.securityfocus.com/bid/81164"
},
{
"name" : "1034708",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034708"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "openSUSE-SU-2016:0813",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html"
},
{
"name": "https://www.samba.org/samba/security/CVE-2016-0771.html",
"refsource": "CONFIRM",
"url": "https://www.samba.org/samba/security/CVE-2016-0771.html"
},
{ {
"name": "https://bugzilla.samba.org/show_bug.cgi?id=11128", "name": "https://bugzilla.samba.org/show_bug.cgi?id=11128",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -63,19 +73,9 @@
"url": "https://bugzilla.samba.org/show_bug.cgi?id=11686" "url": "https://bugzilla.samba.org/show_bug.cgi?id=11686"
}, },
{ {
"name" : "https://www.samba.org/samba/security/CVE-2016-0771.html", "name": "84273",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://www.samba.org/samba/security/CVE-2016-0771.html" "url": "http://www.securityfocus.com/bid/84273"
},
{
"name" : "DSA-3514",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3514"
},
{
"name" : "openSUSE-SU-2016:0813",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html"
}, },
{ {
"name": "USN-2922-1", "name": "USN-2922-1",
@ -83,9 +83,9 @@
"url": "http://www.ubuntu.com/usn/USN-2922-1" "url": "http://www.ubuntu.com/usn/USN-2922-1"
}, },
{ {
"name" : "84273", "name": "DSA-3514",
"refsource" : "BID", "refsource": "DEBIAN",
"url" : "http://www.securityfocus.com/bid/84273" "url": "http://www.debian.org/security/2016/dsa-3514"
}, },
{ {
"name": "1035219", "name": "1035219",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1150", "ID": "CVE-2016-1150",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "JVNDB-2016-000026",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000026"
},
{ {
"name": "https://cs.cybozu.co.jp/2015/006072.html", "name": "https://cs.cybozu.co.jp/2015/006072.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,20 +72,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://cs.cybozu.co.jp/2016/006107.html" "url": "https://cs.cybozu.co.jp/2016/006107.html"
}, },
{
"name" : "https://cs.cybozu.co.jp/2016/006109.html",
"refsource" : "CONFIRM",
"url" : "https://cs.cybozu.co.jp/2016/006109.html"
},
{ {
"name": "JVN#69278491", "name": "JVN#69278491",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN69278491/index.html" "url": "http://jvn.jp/en/jp/JVN69278491/index.html"
}, },
{ {
"name" : "JVNDB-2016-000026", "name": "https://cs.cybozu.co.jp/2016/006109.html",
"refsource" : "JVNDB", "refsource": "CONFIRM",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000026" "url": "https://cs.cybozu.co.jp/2016/006109.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1212", "ID": "CVE-2016-1212",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.futomi.com/library/info/2016/201605.html", "name": "JVNDB-2016-000069",
"refsource" : "CONFIRM", "refsource": "JVNDB",
"url" : "http://www.futomi.com/library/info/2016/201605.html" "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000069"
}, },
{ {
"name": "JVN#42545812", "name": "JVN#42545812",
@ -63,9 +63,9 @@
"url": "http://jvn.jp/en/jp/JVN42545812/index.html" "url": "http://jvn.jp/en/jp/JVN42545812/index.html"
}, },
{ {
"name" : "JVNDB-2016-000069", "name": "http://www.futomi.com/library/info/2016/201605.html",
"refsource" : "JVNDB", "refsource": "CONFIRM",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000069" "url": "http://www.futomi.com/library/info/2016/201605.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2016-1237", "ID": "CVE-2016-1237",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20160625 Linux CVE-2016-1237: nfsd: any user can set a file's ACL over NFS and grant access to it", "name": "USN-3070-1",
"refsource" : "MLIST", "refsource": "UBUNTU",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/25/2" "url": "http://www.ubuntu.com/usn/USN-3070-1"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1350845", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1350845",
@ -68,9 +63,19 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1350845" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1350845"
}, },
{ {
"name" : "https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4", "name": "USN-3053-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4" "url": "http://www.ubuntu.com/usn/USN-3053-1"
},
{
"name": "[oss-security] 20160625 Linux CVE-2016-1237: nfsd: any user can set a file's ACL over NFS and grant access to it",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/25/2"
},
{
"name": "USN-3070-3",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3070-3"
}, },
{ {
"name": "DSA-3607", "name": "DSA-3607",
@ -83,9 +88,14 @@
"url": "http://www.ubuntu.com/usn/USN-3070-2" "url": "http://www.ubuntu.com/usn/USN-3070-2"
}, },
{ {
"name" : "USN-3070-3", "name": "https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-3070-3" "url": "https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4"
},
{
"name": "91456",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91456"
}, },
{ {
"name": "USN-3070-4", "name": "USN-3070-4",
@ -93,19 +103,9 @@
"url": "http://www.ubuntu.com/usn/USN-3070-4" "url": "http://www.ubuntu.com/usn/USN-3070-4"
}, },
{ {
"name" : "USN-3053-1", "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-3053-1" "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4"
},
{
"name" : "USN-3070-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3070-1"
},
{
"name" : "91456",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91456"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1444", "ID": "CVE-2016-1444",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.drupal.org/node/2645350",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2645350"
},
{ {
"name": "https://www.drupal.org/node/2644832", "name": "https://www.drupal.org/node/2644832",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2644832" "url": "https://www.drupal.org/node/2644832"
},
{
"name": "https://www.drupal.org/node/2645350",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2645350"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5462", "ID": "CVE-2016-5462",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1036400",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036400"
},
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "91968", "name": "91968",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91968" "url": "http://www.securityfocus.com/bid/91968"
},
{
"name" : "1036400",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036400"
} }
] ]
} }