mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
276e4aa4f2
commit
7ee4d0117a
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3062",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3062"
|
||||
"name": "32539",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/32539"
|
||||
},
|
||||
{
|
||||
"name": "21833",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21833"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-0016",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0016"
|
||||
},
|
||||
{
|
||||
"name" : "32539",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/32539"
|
||||
},
|
||||
{
|
||||
"name": "23572",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23572"
|
||||
},
|
||||
{
|
||||
"name": "3062",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3062"
|
||||
},
|
||||
{
|
||||
"name": "autodealer-detail-sql-injection(31219)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31219"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0016",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0016"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081111 Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3)",
|
||||
"refsource" : "ISS",
|
||||
"url" : "http://www.iss.net/threats/309.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://blogs.iss.net/archive/trend.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blogs.iss.net/archive/trend.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#768681",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/768681"
|
||||
"name": "32618",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32618"
|
||||
},
|
||||
{
|
||||
"name": "32261",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32261"
|
||||
},
|
||||
{
|
||||
"name": "application-rpc-read-bo(38760)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38760"
|
||||
},
|
||||
{
|
||||
"name": "VU#768681",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/768681"
|
||||
},
|
||||
{
|
||||
"name": "http://blogs.iss.net/archive/trend.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blogs.iss.net/archive/trend.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-3127",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3127"
|
||||
},
|
||||
{
|
||||
"name" : "32618",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32618"
|
||||
},
|
||||
{
|
||||
"name" : "application-rpc-read-bo(38760)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38760"
|
||||
"name": "20081111 Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3)",
|
||||
"refsource": "ISS",
|
||||
"url": "http://www.iss.net/threats/309.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,55 +52,55 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=197306",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=197306"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1269",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2007/dsa-1269"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200712-07",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200712-07.xml"
|
||||
},
|
||||
{
|
||||
"name" : "23026",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23026"
|
||||
},
|
||||
{
|
||||
"name" : "34263",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/34263"
|
||||
},
|
||||
{
|
||||
"name" : "1017792",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1017792"
|
||||
},
|
||||
{
|
||||
"name" : "24377",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24377"
|
||||
},
|
||||
{
|
||||
"name" : "24590",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24590"
|
||||
},
|
||||
{
|
||||
"name": "28023",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28023"
|
||||
},
|
||||
{
|
||||
"name": "1017792",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1017792"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1269",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2007/dsa-1269"
|
||||
},
|
||||
{
|
||||
"name": "34263",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34263"
|
||||
},
|
||||
{
|
||||
"name": "24590",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24590"
|
||||
},
|
||||
{
|
||||
"name": "24377",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24377"
|
||||
},
|
||||
{
|
||||
"name": "23026",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23026"
|
||||
},
|
||||
{
|
||||
"name": "lookup-ndebbinary-symlink(33052)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33052"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=197306",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=197306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3262",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3262"
|
||||
"name": "24027",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24027"
|
||||
},
|
||||
{
|
||||
"name": "wbblite-pms-sql-injection(32172)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32172"
|
||||
},
|
||||
{
|
||||
"name": "22415",
|
||||
@ -67,20 +72,15 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0491"
|
||||
},
|
||||
{
|
||||
"name": "3262",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3262"
|
||||
},
|
||||
{
|
||||
"name": "32034",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/32034"
|
||||
},
|
||||
{
|
||||
"name" : "24027",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24027"
|
||||
},
|
||||
{
|
||||
"name" : "wbblite-pms-sql-injection(32172)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32172"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3288",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3288"
|
||||
"name": "lushiwarplaner-register-sql-injection(32365)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32365"
|
||||
},
|
||||
{
|
||||
"name": "22470",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://secunia.com/advisories/24079"
|
||||
},
|
||||
{
|
||||
"name" : "lushiwarplaner-register-sql-injection(32365)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32365"
|
||||
"name": "3288",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3288"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,56 +52,61 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070220 TSRT-07-01: Trend Micro ServerProtect StCommon.dll Stack Overflow Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/460686/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070220 TSRT-07-02: Trend Micro ServerProtect eng50.dll Stack Overflow Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/460690/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.tippingpoint.com/security/advisories/TSRT-07-01.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.tippingpoint.com/security/advisories/TSRT-07-01.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.tippingpoint.com/security/advisories/TSRT-07-02.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.tippingpoint.com/security/advisories/TSRT-07-02.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt"
|
||||
},
|
||||
{
|
||||
"name" : "VU#349393",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/349393"
|
||||
},
|
||||
{
|
||||
"name": "VU#466609",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/466609"
|
||||
},
|
||||
{
|
||||
"name": "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt"
|
||||
},
|
||||
{
|
||||
"name": "24243",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24243"
|
||||
},
|
||||
{
|
||||
"name": "33042",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33042"
|
||||
},
|
||||
{
|
||||
"name": "VU#630025",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/630025"
|
||||
},
|
||||
{
|
||||
"name": "20070220 TSRT-07-02: Trend Micro ServerProtect eng50.dll Stack Overflow Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/460690/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20070220 TSRT-07-01: Trend Micro ServerProtect StCommon.dll Stack Overflow Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/460686/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "VU#730433",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/730433"
|
||||
},
|
||||
{
|
||||
"name": "serverprotect-eng50-bo(32594)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32594"
|
||||
},
|
||||
{
|
||||
"name": "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290"
|
||||
},
|
||||
{
|
||||
"name": "22639",
|
||||
"refsource": "BID",
|
||||
@ -113,29 +118,24 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0670"
|
||||
},
|
||||
{
|
||||
"name" : "33042",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/33042"
|
||||
"name": "http://www.tippingpoint.com/security/advisories/TSRT-07-02.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.tippingpoint.com/security/advisories/TSRT-07-02.html"
|
||||
},
|
||||
{
|
||||
"name" : "1017676",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1017676"
|
||||
},
|
||||
{
|
||||
"name" : "24243",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24243"
|
||||
},
|
||||
{
|
||||
"name" : "serverprotect-eng50-bo(32594)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32594"
|
||||
"name": "VU#349393",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/349393"
|
||||
},
|
||||
{
|
||||
"name": "serverprotect-stcommon-bo(32601)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32601"
|
||||
},
|
||||
{
|
||||
"name": "1017676",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1017676"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070222 JBoss jmx-console CSRF",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/460934/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070223 Re: JBoss jmx-console CSRF",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/461004/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "33142",
|
||||
"refsource": "OSVDB",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "jboss-jmxconsole-csrf(32673)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32673"
|
||||
},
|
||||
{
|
||||
"name": "20070222 JBoss jmx-console CSRF",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/460934/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20070223 Re: JBoss jmx-console CSRF",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/461004/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.php-security.org/MOPB/BONUS-06-2007.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zend.com/products/zend_platform/security_vulnerabilities",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.zend.com/products/zend_platform/security_vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name" : "22801",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22801"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0829",
|
||||
"refsource": "VUPEN",
|
||||
@ -77,6 +67,11 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32772"
|
||||
},
|
||||
{
|
||||
"name": "22801",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22801"
|
||||
},
|
||||
{
|
||||
"name": "24501",
|
||||
"refsource": "SECUNIA",
|
||||
@ -86,6 +81,11 @@
|
||||
"name": "zend-scd-privilege-escalation(32825)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32825"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zend.com/products/zend_platform/security_vulnerabilities",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.zend.com/products/zend_platform/security_vulnerabilities"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ADV-2007-0720",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0720"
|
||||
},
|
||||
{
|
||||
"name": "20070322 WebAPP Audit",
|
||||
"refsource": "VIM",
|
||||
"url": "http://www.attrition.org/pipermail/vim/2007-March/001455.html"
|
||||
},
|
||||
{
|
||||
"name": "35214",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35214"
|
||||
},
|
||||
{
|
||||
"name": "24227",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24227"
|
||||
},
|
||||
{
|
||||
"name": "35215",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35215"
|
||||
},
|
||||
{
|
||||
"name": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=252",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,31 +86,6 @@
|
||||
"name": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=254",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=254"
|
||||
},
|
||||
{
|
||||
"name" : "20070322 WebAPP Audit",
|
||||
"refsource" : "VIM",
|
||||
"url" : "http://www.attrition.org/pipermail/vim/2007-March/001455.html"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-0720",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0720"
|
||||
},
|
||||
{
|
||||
"name" : "35214",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35214"
|
||||
},
|
||||
{
|
||||
"name" : "35215",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35215"
|
||||
},
|
||||
{
|
||||
"name" : "24227",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24227"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "23374",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23374"
|
||||
},
|
||||
{
|
||||
"name": "34322",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34322"
|
||||
},
|
||||
{
|
||||
"name": "23374",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23374"
|
||||
},
|
||||
{
|
||||
"name": "24820",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -52,26 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4504",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4504"
|
||||
},
|
||||
{
|
||||
"name": "25980",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25980"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3447",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3447"
|
||||
},
|
||||
{
|
||||
"name": "37619",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37619"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3447",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3447"
|
||||
},
|
||||
{
|
||||
"name": "27138",
|
||||
"refsource": "SECUNIA",
|
||||
@ -81,6 +76,11 @@
|
||||
"name": "softbiz-browsecats-sql-injection(37027)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37027"
|
||||
},
|
||||
{
|
||||
"name": "4504",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4504"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,21 +57,6 @@
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066581.html"
|
||||
},
|
||||
{
|
||||
"name" : "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066691.html"
|
||||
},
|
||||
{
|
||||
"name" : "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066694.html"
|
||||
},
|
||||
{
|
||||
"name" : "26057",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26057"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3534",
|
||||
"refsource": "VUPEN",
|
||||
@ -82,10 +67,25 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27231"
|
||||
},
|
||||
{
|
||||
"name": "26057",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26057"
|
||||
},
|
||||
{
|
||||
"name": "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066694.html"
|
||||
},
|
||||
{
|
||||
"name": "callmanager-openser-sip-call-hijacking(37197)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37197"
|
||||
},
|
||||
{
|
||||
"name": "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066691.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071017 Microsoft Windows XP/2003 Macrovision SecDrv.sys privilege escalation (0day)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/482474/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20071018 [CORRECTED] Microsoft Windows XP SP2/2003 - Macrovision SecDrv.sys privilege escalation (0day)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/482482/100/0/threaded"
|
||||
"name": "http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=43&Itemid=15",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=43&Itemid=15"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.48bits.com/?p=172",
|
||||
@ -68,29 +63,9 @@
|
||||
"url": "http://blog.48bits.com/?p=172"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=43&Itemid=15",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=43&Itemid=15"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBST02299",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/485268/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT071506",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/485268/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MS07-067",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-067"
|
||||
"name": "27285",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27285"
|
||||
},
|
||||
{
|
||||
"name": "944653",
|
||||
@ -98,39 +73,54 @@
|
||||
"url": "http://www.microsoft.com/technet/security/advisory/944653.mspx"
|
||||
},
|
||||
{
|
||||
"name" : "TA07-345A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-345A.html"
|
||||
},
|
||||
{
|
||||
"name" : "26121",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26121"
|
||||
"name": "oval:org.mitre.oval:def:4584",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4584"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3537",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3537"
|
||||
},
|
||||
{
|
||||
"name": "SSRT071506",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/485268/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html"
|
||||
},
|
||||
{
|
||||
"name": "41429",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/41429"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:4584",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4584"
|
||||
"name": "HPSBST02299",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/485268/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "1018833",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018833"
|
||||
"name": "TA07-345A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-345A.html"
|
||||
},
|
||||
{
|
||||
"name" : "27285",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27285"
|
||||
"name": "20071018 [CORRECTED] Microsoft Windows XP SP2/2003 - Macrovision SecDrv.sys privilege escalation (0day)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/482482/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "windows-secdrv-bo(37284)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37284"
|
||||
},
|
||||
{
|
||||
"name": "20071017 Microsoft Windows XP/2003 Macrovision SecDrv.sys privilege escalation (0day)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/482474/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "3266",
|
||||
@ -138,9 +128,19 @@
|
||||
"url": "http://securityreason.com/securityalert/3266"
|
||||
},
|
||||
{
|
||||
"name" : "windows-secdrv-bo(37284)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37284"
|
||||
"name": "1018833",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018833"
|
||||
},
|
||||
{
|
||||
"name": "26121",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26121"
|
||||
},
|
||||
{
|
||||
"name": "MS07-067",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-067"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,49 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://taviso.decsystem.org/virtsec.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://taviso.decsystem.org/virtsec.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1284",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2007/dsa-1284"
|
||||
"name": "23731",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23731"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:203",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:203"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2008:162",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:162"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0194",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0194.html"
|
||||
},
|
||||
{
|
||||
"name" : "20071030 Clarification on old QEMU/NE2000/Xen issues",
|
||||
"refsource" : "VIM",
|
||||
"url" : "http://www.attrition.org/pipermail/vim/2007-October/001842.html"
|
||||
},
|
||||
{
|
||||
"name" : "23731",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23731"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10000",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1597",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1597"
|
||||
"name": "qemu-net-socket-bo(38239)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38239"
|
||||
},
|
||||
{
|
||||
"name": "42985",
|
||||
@ -103,9 +78,9 @@
|
||||
"url": "http://osvdb.org/42985"
|
||||
},
|
||||
{
|
||||
"name" : "27486",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27486"
|
||||
"name": "DSA-1284",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2007/dsa-1284"
|
||||
},
|
||||
{
|
||||
"name": "25073",
|
||||
@ -113,24 +88,49 @@
|
||||
"url": "http://secunia.com/advisories/25073"
|
||||
},
|
||||
{
|
||||
"name" : "25095",
|
||||
"name": "http://taviso.decsystem.org/virtsec.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://taviso.decsystem.org/virtsec.pdf"
|
||||
},
|
||||
{
|
||||
"name": "27486",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25095"
|
||||
"url": "http://secunia.com/advisories/27486"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:162",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:162"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10000",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000"
|
||||
},
|
||||
{
|
||||
"name": "29963",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29963"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1597",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1597"
|
||||
},
|
||||
{
|
||||
"name": "29129",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29129"
|
||||
},
|
||||
{
|
||||
"name" : "qemu-net-socket-bo(38239)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38239"
|
||||
"name": "25095",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25095"
|
||||
},
|
||||
{
|
||||
"name": "20071030 Clarification on old QEMU/NE2000/Xen issues",
|
||||
"refsource": "VIM",
|
||||
"url": "http://www.attrition.org/pipermail/vim/2007-October/001842.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071025 Flatnuke3 Remote Cookie Manipoulation / Privilege Escalation",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/482774/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "4562",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4562"
|
||||
},
|
||||
{
|
||||
"name": "20071025 Flatnuke3 Remote Cookie Manipoulation / Privilege Escalation",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/482774/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "43636",
|
||||
"refsource": "OSVDB",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-3825",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2015-3962",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01"
|
||||
},
|
||||
{
|
||||
"name": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-254-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-254-01"
|
||||
},
|
||||
{
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-6435",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160120 Cisco Unified Computing System Manager and Cisco Firepower 9000 Remote Command Execution Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-ucsm"
|
||||
},
|
||||
{
|
||||
"name": "1034743",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034743"
|
||||
},
|
||||
{
|
||||
"name": "20160120 Cisco Unified Computing System Manager and Cisco Firepower 9000 Remote Command Execution Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-ucsm"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"ID": "CVE-2015-6833",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "DSA-3344",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3344"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.php.net/bug.php?id=70019",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.php.net/bug.php?id=70019"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150819 CVE Request: more php unserializing issues",
|
||||
"refsource": "MLIST",
|
||||
@ -62,16 +72,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.php.net/ChangeLog-5.php"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.php.net/bug.php?id=70019",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.php.net/bug.php?id=70019"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3344",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3344"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201606-10",
|
||||
"refsource": "GENTOO",
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150902 NibbleBlog 4.0.3 - Code Execution - Not fixed",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Sep/5"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.curesec.com/article/blog/NibbleBlog-403-Code-Execution-47.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.curesec.com/article/blog/NibbleBlog-403-Code-Execution-47.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.nibbleblog.com/post/nibbleblog-v4-0-5/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blog.nibbleblog.com/post/nibbleblog-v4-0-5/"
|
||||
},
|
||||
{
|
||||
"name": "20150902 NibbleBlog 4.0.3 - Code Execution - Not fixed",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Sep/5"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2015-7293",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "38411",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/38411/"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html"
|
||||
},
|
||||
{
|
||||
"name": "38411",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/38411/"
|
||||
},
|
||||
{
|
||||
"name": "https://plone.org/security/hotfix/20151006",
|
||||
"refsource": "CONFIRM",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2015-7633",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,55 +52,55 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201511-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201511-02"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:2024",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:1893",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1893.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:1740",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:1742",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1744",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1781",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name": "77065",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/77065"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:1742",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1893",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1893.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201511-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201511-02"
|
||||
},
|
||||
{
|
||||
"name": "1033797",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033797"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:1740",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1781",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2015-8078",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,31 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20151104 Re: CVE request: urlfetch range handling flaw in Cyrus IMAP",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/11/04/3"
|
||||
},
|
||||
{
|
||||
"name" : "https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20151104 Re: CVE request: urlfetch range handling flaw in Cyrus IMAP",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/11/04/3"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:2130",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1457",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1459",
|
||||
"refsource": "SUSE",
|
||||
@ -86,6 +76,16 @@
|
||||
"name": "1034282",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034282"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1457",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html"
|
||||
},
|
||||
{
|
||||
"name": "https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160113 Remote Code Execution in Roundcube",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/537304/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "39245",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/39245/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.htbridge.com/advisory/HTB23283",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.htbridge.com/advisory/HTB23283"
|
||||
},
|
||||
{
|
||||
"name" : "http://trac.roundcube.net/changeset/10e5192a2b/github",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://trac.roundcube.net/changeset/10e5192a2b/github"
|
||||
},
|
||||
{
|
||||
"name" : "http://trac.roundcube.net/ticket/1490620",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://trac.roundcube.net/ticket/1490620"
|
||||
},
|
||||
{
|
||||
"name" : "https://roundcube.net/news/2015/12/26/updates-1.1.4-and-1.0.8-released/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://roundcube.net/news/2015/12/26/updates-1.1.4-and-1.0.8-released/"
|
||||
"name": "GLSA-201603-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201603-03"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3541",
|
||||
@ -93,24 +63,54 @@
|
||||
"url": "http://www.debian.org/security/2016/dsa-3541"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201603-03",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201603-03"
|
||||
"name": "http://trac.roundcube.net/changeset/10e5192a2b/github",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://trac.roundcube.net/changeset/10e5192a2b/github"
|
||||
},
|
||||
{
|
||||
"name": "20160113 Remote Code Execution in Roundcube",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/537304/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0214",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00030.html"
|
||||
},
|
||||
{
|
||||
"name": "https://roundcube.net/news/2015/12/26/updates-1.1.4-and-1.0.8-released/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://roundcube.net/news/2015/12/26/updates-1.1.4-and-1.0.8-released/"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0210",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00028.html"
|
||||
},
|
||||
{
|
||||
"name": "http://trac.roundcube.net/ticket/1490620",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://trac.roundcube.net/ticket/1490620"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html"
|
||||
},
|
||||
{
|
||||
"name": "39245",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/39245/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.htbridge.com/advisory/HTB23283",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.htbridge.com/advisory/HTB23283"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0213",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00029.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:0214",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00030.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2016-0042",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS16-014",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-014"
|
||||
},
|
||||
{
|
||||
"name": "1034985",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034985"
|
||||
},
|
||||
{
|
||||
"name": "MS16-014",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-014"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-0611",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:0705",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0367",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:0377",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"
|
||||
"name": "1034708",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034708"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2881-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2881-1"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0377",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:0705",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
|
||||
},
|
||||
{
|
||||
"name": "81164",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/81164"
|
||||
},
|
||||
{
|
||||
"name" : "1034708",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1034708"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0813",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.samba.org/samba/security/CVE-2016-0771.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.samba.org/samba/security/CVE-2016-0771.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.samba.org/show_bug.cgi?id=11128",
|
||||
"refsource": "CONFIRM",
|
||||
@ -63,19 +73,9 @@
|
||||
"url": "https://bugzilla.samba.org/show_bug.cgi?id=11686"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.samba.org/samba/security/CVE-2016-0771.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.samba.org/samba/security/CVE-2016-0771.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3514",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3514"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:0813",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html"
|
||||
"name": "84273",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/84273"
|
||||
},
|
||||
{
|
||||
"name": "USN-2922-1",
|
||||
@ -83,9 +83,9 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-2922-1"
|
||||
},
|
||||
{
|
||||
"name" : "84273",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/84273"
|
||||
"name": "DSA-3514",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3514"
|
||||
},
|
||||
{
|
||||
"name": "1035219",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2016-1150",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "JVNDB-2016-000026",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000026"
|
||||
},
|
||||
{
|
||||
"name": "https://cs.cybozu.co.jp/2015/006072.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,20 +72,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cs.cybozu.co.jp/2016/006107.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://cs.cybozu.co.jp/2016/006109.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://cs.cybozu.co.jp/2016/006109.html"
|
||||
},
|
||||
{
|
||||
"name": "JVN#69278491",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN69278491/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2016-000026",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000026"
|
||||
"name": "https://cs.cybozu.co.jp/2016/006109.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cs.cybozu.co.jp/2016/006109.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2016-1212",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.futomi.com/library/info/2016/201605.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.futomi.com/library/info/2016/201605.html"
|
||||
"name": "JVNDB-2016-000069",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000069"
|
||||
},
|
||||
{
|
||||
"name": "JVN#42545812",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://jvn.jp/en/jp/JVN42545812/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2016-000069",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000069"
|
||||
"name": "http://www.futomi.com/library/info/2016/201605.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.futomi.com/library/info/2016/201605.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2016-1237",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20160625 Linux CVE-2016-1237: nfsd: any user can set a file's ACL over NFS and grant access to it",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/06/25/2"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4"
|
||||
"name": "USN-3070-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3070-1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1350845",
|
||||
@ -68,9 +63,19 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1350845"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4"
|
||||
"name": "USN-3053-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3053-1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160625 Linux CVE-2016-1237: nfsd: any user can set a file's ACL over NFS and grant access to it",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/25/2"
|
||||
},
|
||||
{
|
||||
"name": "USN-3070-3",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3070-3"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3607",
|
||||
@ -83,9 +88,14 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-3070-2"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3070-3",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-3070-3"
|
||||
"name": "https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4"
|
||||
},
|
||||
{
|
||||
"name": "91456",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91456"
|
||||
},
|
||||
{
|
||||
"name": "USN-3070-4",
|
||||
@ -93,19 +103,9 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-3070-4"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3053-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-3053-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3070-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-3070-1"
|
||||
},
|
||||
{
|
||||
"name" : "91456",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/91456"
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1444",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.drupal.org/node/2645350",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.drupal.org/node/2645350"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/node/2644832",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.drupal.org/node/2644832"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/node/2645350",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.drupal.org/node/2645350"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-5462",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1036400",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036400"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "91968",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91968"
|
||||
},
|
||||
{
|
||||
"name" : "1036400",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036400"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user