"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:52:07 +00:00
parent 276e4aa4f2
commit 7ee4d0117a
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 3650 additions and 3650 deletions

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "3062",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3062"
"name": "32539",
"refsource": "OSVDB",
"url": "http://osvdb.org/32539"
},
{
"name": "21833",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21833"
},
{
"name" : "ADV-2007-0016",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0016"
},
{
"name" : "32539",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32539"
},
{
"name": "23572",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23572"
},
{
"name": "3062",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3062"
},
{
"name": "autodealer-detail-sql-injection(31219)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31219"
},
{
"name": "ADV-2007-0016",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0016"
}
]
}

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "20081111 Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3)",
"refsource" : "ISS",
"url" : "http://www.iss.net/threats/309.html"
},
{
"name" : "http://blogs.iss.net/archive/trend.html",
"refsource" : "MISC",
"url" : "http://blogs.iss.net/archive/trend.html"
},
{
"name" : "VU#768681",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/768681"
"name": "32618",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32618"
},
{
"name": "32261",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32261"
},
{
"name": "application-rpc-read-bo(38760)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38760"
},
{
"name": "VU#768681",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/768681"
},
{
"name": "http://blogs.iss.net/archive/trend.html",
"refsource": "MISC",
"url": "http://blogs.iss.net/archive/trend.html"
},
{
"name": "ADV-2008-3127",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3127"
},
{
"name" : "32618",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32618"
},
{
"name" : "application-rpc-read-bo(38760)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38760"
"name": "20081111 Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3)",
"refsource": "ISS",
"url": "http://www.iss.net/threats/309.html"
}
]
}

View File

@ -52,55 +52,55 @@
},
"references": {
"reference_data": [
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=197306",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=197306"
},
{
"name" : "DSA-1269",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1269"
},
{
"name": "GLSA-200712-07",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200712-07.xml"
},
{
"name" : "23026",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23026"
},
{
"name" : "34263",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34263"
},
{
"name" : "1017792",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017792"
},
{
"name" : "24377",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24377"
},
{
"name" : "24590",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24590"
},
{
"name": "28023",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28023"
},
{
"name": "1017792",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017792"
},
{
"name": "DSA-1269",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1269"
},
{
"name": "34263",
"refsource": "OSVDB",
"url": "http://osvdb.org/34263"
},
{
"name": "24590",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24590"
},
{
"name": "24377",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24377"
},
{
"name": "23026",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23026"
},
{
"name": "lookup-ndebbinary-symlink(33052)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33052"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=197306",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=197306"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "3262",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3262"
"name": "24027",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24027"
},
{
"name": "wbblite-pms-sql-injection(32172)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32172"
},
{
"name": "22415",
@ -67,20 +72,15 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0491"
},
{
"name": "3262",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3262"
},
{
"name": "32034",
"refsource": "OSVDB",
"url": "http://osvdb.org/32034"
},
{
"name" : "24027",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24027"
},
{
"name" : "wbblite-pms-sql-injection(32172)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32172"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "3288",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3288"
"name": "lushiwarplaner-register-sql-injection(32365)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32365"
},
{
"name": "22470",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/24079"
},
{
"name" : "lushiwarplaner-register-sql-injection(32365)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32365"
"name": "3288",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3288"
}
]
}

View File

@ -52,56 +52,61 @@
},
"references": {
"reference_data": [
{
"name" : "20070220 TSRT-07-01: Trend Micro ServerProtect StCommon.dll Stack Overflow Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/460686/100/0/threaded"
},
{
"name" : "20070220 TSRT-07-02: Trend Micro ServerProtect eng50.dll Stack Overflow Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/460690/100/0/threaded"
},
{
"name": "http://www.tippingpoint.com/security/advisories/TSRT-07-01.html",
"refsource": "MISC",
"url": "http://www.tippingpoint.com/security/advisories/TSRT-07-01.html"
},
{
"name" : "http://www.tippingpoint.com/security/advisories/TSRT-07-02.html",
"refsource" : "MISC",
"url" : "http://www.tippingpoint.com/security/advisories/TSRT-07-02.html"
},
{
"name" : "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290",
"refsource" : "CONFIRM",
"url" : "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290"
},
{
"name" : "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt",
"refsource" : "CONFIRM",
"url" : "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt"
},
{
"name" : "VU#349393",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/349393"
},
{
"name": "VU#466609",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/466609"
},
{
"name": "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt",
"refsource": "CONFIRM",
"url": "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt"
},
{
"name": "24243",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24243"
},
{
"name": "33042",
"refsource": "OSVDB",
"url": "http://osvdb.org/33042"
},
{
"name": "VU#630025",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/630025"
},
{
"name": "20070220 TSRT-07-02: Trend Micro ServerProtect eng50.dll Stack Overflow Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460690/100/0/threaded"
},
{
"name": "20070220 TSRT-07-01: Trend Micro ServerProtect StCommon.dll Stack Overflow Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460686/100/0/threaded"
},
{
"name": "VU#730433",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/730433"
},
{
"name": "serverprotect-eng50-bo(32594)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32594"
},
{
"name": "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290",
"refsource": "CONFIRM",
"url": "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290"
},
{
"name": "22639",
"refsource": "BID",
@ -113,29 +118,24 @@
"url": "http://www.vupen.com/english/advisories/2007/0670"
},
{
"name" : "33042",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33042"
"name": "http://www.tippingpoint.com/security/advisories/TSRT-07-02.html",
"refsource": "MISC",
"url": "http://www.tippingpoint.com/security/advisories/TSRT-07-02.html"
},
{
"name" : "1017676",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017676"
},
{
"name" : "24243",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24243"
},
{
"name" : "serverprotect-eng50-bo(32594)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32594"
"name": "VU#349393",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/349393"
},
{
"name": "serverprotect-stcommon-bo(32601)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32601"
},
{
"name": "1017676",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017676"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20070222 JBoss jmx-console CSRF",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/460934/100/0/threaded"
},
{
"name" : "20070223 Re: JBoss jmx-console CSRF",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/461004/100/0/threaded"
},
{
"name": "33142",
"refsource": "OSVDB",
@ -71,6 +61,16 @@
"name": "jboss-jmxconsole-csrf(32673)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32673"
},
{
"name": "20070222 JBoss jmx-console CSRF",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460934/100/0/threaded"
},
{
"name": "20070223 Re: JBoss jmx-console CSRF",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/461004/100/0/threaded"
}
]
}

View File

@ -57,16 +57,6 @@
"refsource": "MISC",
"url": "http://www.php-security.org/MOPB/BONUS-06-2007.html"
},
{
"name" : "http://www.zend.com/products/zend_platform/security_vulnerabilities",
"refsource" : "CONFIRM",
"url" : "http://www.zend.com/products/zend_platform/security_vulnerabilities"
},
{
"name" : "22801",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22801"
},
{
"name": "ADV-2007-0829",
"refsource": "VUPEN",
@ -77,6 +67,11 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/32772"
},
{
"name": "22801",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22801"
},
{
"name": "24501",
"refsource": "SECUNIA",
@ -86,6 +81,11 @@
"name": "zend-scd-privilege-escalation(32825)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32825"
},
{
"name": "http://www.zend.com/products/zend_platform/security_vulnerabilities",
"refsource": "CONFIRM",
"url": "http://www.zend.com/products/zend_platform/security_vulnerabilities"
}
]
}

View File

@ -52,6 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0720",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0720"
},
{
"name": "20070322 WebAPP Audit",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-March/001455.html"
},
{
"name": "35214",
"refsource": "OSVDB",
"url": "http://osvdb.org/35214"
},
{
"name": "24227",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24227"
},
{
"name": "35215",
"refsource": "OSVDB",
"url": "http://osvdb.org/35215"
},
{
"name": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=252",
"refsource": "CONFIRM",
@ -61,31 +86,6 @@
"name": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=254",
"refsource": "CONFIRM",
"url": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=254"
},
{
"name" : "20070322 WebAPP Audit",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2007-March/001455.html"
},
{
"name" : "ADV-2007-0720",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0720"
},
{
"name" : "35214",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35214"
},
{
"name" : "35215",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35215"
},
{
"name" : "24227",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24227"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "23374",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23374"
},
{
"name": "34322",
"refsource": "OSVDB",
"url": "http://osvdb.org/34322"
},
{
"name": "23374",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23374"
},
{
"name": "24820",
"refsource": "SECUNIA",

View File

@ -52,26 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "4504",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4504"
},
{
"name": "25980",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25980"
},
{
"name" : "ADV-2007-3447",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3447"
},
{
"name": "37619",
"refsource": "OSVDB",
"url": "http://osvdb.org/37619"
},
{
"name": "ADV-2007-3447",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3447"
},
{
"name": "27138",
"refsource": "SECUNIA",
@ -81,6 +76,11 @@
"name": "softbiz-browsecats-sql-injection(37027)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37027"
},
{
"name": "4504",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4504"
}
]
}

View File

@ -57,21 +57,6 @@
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066581.html"
},
{
"name" : "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066691.html"
},
{
"name" : "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066694.html"
},
{
"name" : "26057",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26057"
},
{
"name": "ADV-2007-3534",
"refsource": "VUPEN",
@ -82,10 +67,25 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27231"
},
{
"name": "26057",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26057"
},
{
"name": "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066694.html"
},
{
"name": "callmanager-openser-sip-call-hijacking(37197)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37197"
},
{
"name": "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066691.html"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20071017 Microsoft Windows XP/2003 Macrovision SecDrv.sys privilege escalation (0day)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482474/100/0/threaded"
},
{
"name" : "20071018 [CORRECTED] Microsoft Windows XP SP2/2003 - Macrovision SecDrv.sys privilege escalation (0day)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482482/100/0/threaded"
"name": "http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=43&Itemid=15",
"refsource": "MISC",
"url": "http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=43&Itemid=15"
},
{
"name": "http://blog.48bits.com/?p=172",
@ -68,29 +63,9 @@
"url": "http://blog.48bits.com/?p=172"
},
{
"name" : "http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=43&Itemid=15",
"refsource" : "MISC",
"url" : "http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=43&Itemid=15"
},
{
"name" : "http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html",
"refsource" : "MISC",
"url" : "http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html"
},
{
"name" : "HPSBST02299",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/485268/100/0/threaded"
},
{
"name" : "SSRT071506",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/485268/100/0/threaded"
},
{
"name" : "MS07-067",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-067"
"name": "27285",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27285"
},
{
"name": "944653",
@ -98,39 +73,54 @@
"url": "http://www.microsoft.com/technet/security/advisory/944653.mspx"
},
{
"name" : "TA07-345A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-345A.html"
},
{
"name" : "26121",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26121"
"name": "oval:org.mitre.oval:def:4584",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4584"
},
{
"name": "ADV-2007-3537",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3537"
},
{
"name": "SSRT071506",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/485268/100/0/threaded"
},
{
"name": "http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html",
"refsource": "MISC",
"url": "http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html"
},
{
"name": "41429",
"refsource": "OSVDB",
"url": "http://osvdb.org/41429"
},
{
"name" : "oval:org.mitre.oval:def:4584",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4584"
"name": "HPSBST02299",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/485268/100/0/threaded"
},
{
"name" : "1018833",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018833"
"name": "TA07-345A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-345A.html"
},
{
"name" : "27285",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27285"
"name": "20071018 [CORRECTED] Microsoft Windows XP SP2/2003 - Macrovision SecDrv.sys privilege escalation (0day)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482482/100/0/threaded"
},
{
"name": "windows-secdrv-bo(37284)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37284"
},
{
"name": "20071017 Microsoft Windows XP/2003 Macrovision SecDrv.sys privilege escalation (0day)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482474/100/0/threaded"
},
{
"name": "3266",
@ -138,9 +128,19 @@
"url": "http://securityreason.com/securityalert/3266"
},
{
"name" : "windows-secdrv-bo(37284)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37284"
"name": "1018833",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018833"
},
{
"name": "26121",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26121"
},
{
"name": "MS07-067",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-067"
}
]
}

View File

@ -53,49 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://taviso.decsystem.org/virtsec.pdf",
"refsource" : "MISC",
"url" : "http://taviso.decsystem.org/virtsec.pdf"
},
{
"name" : "DSA-1284",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1284"
"name": "23731",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23731"
},
{
"name": "MDKSA-2007:203",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:203"
},
{
"name" : "MDVSA-2008:162",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:162"
},
{
"name": "RHSA-2008:0194",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0194.html"
},
{
"name" : "20071030 Clarification on old QEMU/NE2000/Xen issues",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2007-October/001842.html"
},
{
"name" : "23731",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23731"
},
{
"name" : "oval:org.mitre.oval:def:10000",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000"
},
{
"name" : "ADV-2007-1597",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1597"
"name": "qemu-net-socket-bo(38239)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38239"
},
{
"name": "42985",
@ -103,9 +78,9 @@
"url": "http://osvdb.org/42985"
},
{
"name" : "27486",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27486"
"name": "DSA-1284",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1284"
},
{
"name": "25073",
@ -113,24 +88,49 @@
"url": "http://secunia.com/advisories/25073"
},
{
"name" : "25095",
"name": "http://taviso.decsystem.org/virtsec.pdf",
"refsource": "MISC",
"url": "http://taviso.decsystem.org/virtsec.pdf"
},
{
"name": "27486",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/25095"
"url": "http://secunia.com/advisories/27486"
},
{
"name": "MDVSA-2008:162",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:162"
},
{
"name": "oval:org.mitre.oval:def:10000",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000"
},
{
"name": "29963",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29963"
},
{
"name": "ADV-2007-1597",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1597"
},
{
"name": "29129",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29129"
},
{
"name" : "qemu-net-socket-bo(38239)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38239"
"name": "25095",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25095"
},
{
"name": "20071030 Clarification on old QEMU/NE2000/Xen issues",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-October/001842.html"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20071025 Flatnuke3 Remote Cookie Manipoulation / Privilege Escalation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482774/100/0/threaded"
},
{
"name": "4562",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4562"
},
{
"name": "20071025 Flatnuke3 Remote Cookie Manipoulation / Privilege Escalation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482774/100/0/threaded"
},
{
"name": "43636",
"refsource": "OSVDB",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-3825",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-3962",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01"
},
{
"name": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-254-01",
"refsource": "CONFIRM",
"url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-254-01"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6435",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20160120 Cisco Unified Computing System Manager and Cisco Firepower 9000 Remote Command Execution Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-ucsm"
},
{
"name": "1034743",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034743"
},
{
"name": "20160120 Cisco Unified Computing System Manager and Cisco Firepower 9000 Remote Command Execution Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-ucsm"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@suse.com",
"ID": "CVE-2015-6833",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "DSA-3344",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3344"
},
{
"name": "https://bugs.php.net/bug.php?id=70019",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=70019"
},
{
"name": "[oss-security] 20150819 CVE Request: more php unserializing issues",
"refsource": "MLIST",
@ -62,16 +72,6 @@
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"name" : "https://bugs.php.net/bug.php?id=70019",
"refsource" : "CONFIRM",
"url" : "https://bugs.php.net/bug.php?id=70019"
},
{
"name" : "DSA-3344",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3344"
},
{
"name": "GLSA-201606-10",
"refsource": "GENTOO",

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20150902 NibbleBlog 4.0.3 - Code Execution - Not fixed",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Sep/5"
},
{
"name": "http://blog.curesec.com/article/blog/NibbleBlog-403-Code-Execution-47.html",
"refsource": "MISC",
"url": "http://blog.curesec.com/article/blog/NibbleBlog-403-Code-Execution-47.html"
},
{
"name" : "http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html"
},
{
"name": "http://blog.nibbleblog.com/post/nibbleblog-v4-0-5/",
"refsource": "CONFIRM",
"url": "http://blog.nibbleblog.com/post/nibbleblog-v4-0-5/"
},
{
"name": "20150902 NibbleBlog 4.0.3 - Code Execution - Not fixed",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Sep/5"
},
{
"name": "http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-7293",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "38411",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/38411/"
},
{
"name": "http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html"
},
{
"name": "38411",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38411/"
},
{
"name": "https://plone.org/security/hotfix/20151006",
"refsource": "CONFIRM",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-7633",
"STATE": "PUBLIC"
},
@ -52,55 +52,55 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html"
},
{
"name" : "GLSA-201511-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201511-02"
},
{
"name": "RHSA-2015:2024",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html"
},
{
"name" : "RHSA-2015:1893",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1893.html"
},
{
"name" : "SUSE-SU-2015:1740",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html"
},
{
"name" : "SUSE-SU-2015:1742",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html"
},
{
"name": "openSUSE-SU-2015:1744",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html"
},
{
"name" : "openSUSE-SU-2015:1781",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
},
{
"name": "77065",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77065"
},
{
"name": "SUSE-SU-2015:1742",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html"
},
{
"name": "RHSA-2015:1893",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1893.html"
},
{
"name": "GLSA-201511-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201511-02"
},
{
"name": "1033797",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033797"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html"
},
{
"name": "SUSE-SU-2015:1740",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html"
},
{
"name": "openSUSE-SU-2015:1781",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-8078",
"STATE": "PUBLIC"
},
@ -52,31 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20151104 Re: CVE request: urlfetch range handling flaw in Cyrus IMAP",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/11/04/3"
},
{
"name" : "https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2",
"refsource" : "CONFIRM",
"url" : "https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2"
},
{
"name": "https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html",
"refsource": "CONFIRM",
"url": "https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html"
},
{
"name": "[oss-security] 20151104 Re: CVE request: urlfetch range handling flaw in Cyrus IMAP",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/11/04/3"
},
{
"name": "openSUSE-SU-2015:2130",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html"
},
{
"name" : "SUSE-SU-2016:1457",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html"
},
{
"name": "SUSE-SU-2016:1459",
"refsource": "SUSE",
@ -86,6 +76,16 @@
"name": "1034282",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034282"
},
{
"name": "SUSE-SU-2016:1457",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html"
},
{
"name": "https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2",
"refsource": "CONFIRM",
"url": "https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2"
}
]
}

View File

@ -53,39 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20160113 Remote Code Execution in Roundcube",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/537304/100/0/threaded"
},
{
"name" : "39245",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39245/"
},
{
"name" : "http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html"
},
{
"name" : "https://www.htbridge.com/advisory/HTB23283",
"refsource" : "MISC",
"url" : "https://www.htbridge.com/advisory/HTB23283"
},
{
"name" : "http://trac.roundcube.net/changeset/10e5192a2b/github",
"refsource" : "CONFIRM",
"url" : "http://trac.roundcube.net/changeset/10e5192a2b/github"
},
{
"name" : "http://trac.roundcube.net/ticket/1490620",
"refsource" : "CONFIRM",
"url" : "http://trac.roundcube.net/ticket/1490620"
},
{
"name" : "https://roundcube.net/news/2015/12/26/updates-1.1.4-and-1.0.8-released/",
"refsource" : "CONFIRM",
"url" : "https://roundcube.net/news/2015/12/26/updates-1.1.4-and-1.0.8-released/"
"name": "GLSA-201603-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-03"
},
{
"name": "DSA-3541",
@ -93,24 +63,54 @@
"url": "http://www.debian.org/security/2016/dsa-3541"
},
{
"name" : "GLSA-201603-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-03"
"name": "http://trac.roundcube.net/changeset/10e5192a2b/github",
"refsource": "CONFIRM",
"url": "http://trac.roundcube.net/changeset/10e5192a2b/github"
},
{
"name": "20160113 Remote Code Execution in Roundcube",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537304/100/0/threaded"
},
{
"name": "openSUSE-SU-2016:0214",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00030.html"
},
{
"name": "https://roundcube.net/news/2015/12/26/updates-1.1.4-and-1.0.8-released/",
"refsource": "CONFIRM",
"url": "https://roundcube.net/news/2015/12/26/updates-1.1.4-and-1.0.8-released/"
},
{
"name": "openSUSE-SU-2016:0210",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00028.html"
},
{
"name": "http://trac.roundcube.net/ticket/1490620",
"refsource": "CONFIRM",
"url": "http://trac.roundcube.net/ticket/1490620"
},
{
"name": "http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html"
},
{
"name": "39245",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39245/"
},
{
"name": "https://www.htbridge.com/advisory/HTB23283",
"refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23283"
},
{
"name": "openSUSE-SU-2016:0213",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00029.html"
},
{
"name" : "openSUSE-SU-2016:0214",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00030.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0042",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "MS16-014",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-014"
},
{
"name": "1034985",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034985"
},
{
"name": "MS16-014",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-014"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0611",
"STATE": "PUBLIC"
},
@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name" : "RHSA-2016:0705",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
},
{
"name": "openSUSE-SU-2016:0367",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"
},
{
"name" : "openSUSE-SU-2016:0377",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"
"name": "1034708",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034708"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "USN-2881-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2881-1"
},
{
"name": "openSUSE-SU-2016:0377",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"
},
{
"name": "RHSA-2016:0705",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
},
{
"name": "81164",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/81164"
},
{
"name" : "1034708",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034708"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2016:0813",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html"
},
{
"name": "https://www.samba.org/samba/security/CVE-2016-0771.html",
"refsource": "CONFIRM",
"url": "https://www.samba.org/samba/security/CVE-2016-0771.html"
},
{
"name": "https://bugzilla.samba.org/show_bug.cgi?id=11128",
"refsource": "CONFIRM",
@ -63,19 +73,9 @@
"url": "https://bugzilla.samba.org/show_bug.cgi?id=11686"
},
{
"name" : "https://www.samba.org/samba/security/CVE-2016-0771.html",
"refsource" : "CONFIRM",
"url" : "https://www.samba.org/samba/security/CVE-2016-0771.html"
},
{
"name" : "DSA-3514",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3514"
},
{
"name" : "openSUSE-SU-2016:0813",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html"
"name": "84273",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84273"
},
{
"name": "USN-2922-1",
@ -83,9 +83,9 @@
"url": "http://www.ubuntu.com/usn/USN-2922-1"
},
{
"name" : "84273",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/84273"
"name": "DSA-3514",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3514"
},
{
"name": "1035219",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1150",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "JVNDB-2016-000026",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000026"
},
{
"name": "https://cs.cybozu.co.jp/2015/006072.html",
"refsource": "CONFIRM",
@ -67,20 +72,15 @@
"refsource": "CONFIRM",
"url": "https://cs.cybozu.co.jp/2016/006107.html"
},
{
"name" : "https://cs.cybozu.co.jp/2016/006109.html",
"refsource" : "CONFIRM",
"url" : "https://cs.cybozu.co.jp/2016/006109.html"
},
{
"name": "JVN#69278491",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN69278491/index.html"
},
{
"name" : "JVNDB-2016-000026",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000026"
"name": "https://cs.cybozu.co.jp/2016/006109.html",
"refsource": "CONFIRM",
"url": "https://cs.cybozu.co.jp/2016/006109.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1212",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.futomi.com/library/info/2016/201605.html",
"refsource" : "CONFIRM",
"url" : "http://www.futomi.com/library/info/2016/201605.html"
"name": "JVNDB-2016-000069",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000069"
},
{
"name": "JVN#42545812",
@ -63,9 +63,9 @@
"url": "http://jvn.jp/en/jp/JVN42545812/index.html"
},
{
"name" : "JVNDB-2016-000069",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000069"
"name": "http://www.futomi.com/library/info/2016/201605.html",
"refsource": "CONFIRM",
"url": "http://www.futomi.com/library/info/2016/201605.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2016-1237",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160625 Linux CVE-2016-1237: nfsd: any user can set a file's ACL over NFS and grant access to it",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/25/2"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4"
"name": "USN-3070-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3070-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1350845",
@ -68,9 +63,19 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1350845"
},
{
"name" : "https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4"
"name": "USN-3053-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3053-1"
},
{
"name": "[oss-security] 20160625 Linux CVE-2016-1237: nfsd: any user can set a file's ACL over NFS and grant access to it",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/25/2"
},
{
"name": "USN-3070-3",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3070-3"
},
{
"name": "DSA-3607",
@ -83,9 +88,14 @@
"url": "http://www.ubuntu.com/usn/USN-3070-2"
},
{
"name" : "USN-3070-3",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3070-3"
"name": "https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4"
},
{
"name": "91456",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91456"
},
{
"name": "USN-3070-4",
@ -93,19 +103,9 @@
"url": "http://www.ubuntu.com/usn/USN-3070-4"
},
{
"name" : "USN-3053-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3053-1"
},
{
"name" : "USN-3070-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3070-1"
},
{
"name" : "91456",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91456"
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1444",
"STATE": "PUBLIC"
},

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.drupal.org/node/2645350",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2645350"
},
{
"name": "https://www.drupal.org/node/2644832",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2644832"
},
{
"name": "https://www.drupal.org/node/2645350",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2645350"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5462",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1036400",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036400"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "91968",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91968"
},
{
"name" : "1036400",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036400"
}
]
}