"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:32:36 +00:00
parent ddb0d46780
commit 8778677cac
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 4025 additions and 4025 deletions

View File

@ -52,26 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "http://bugs.cubecart.com/?do=details&id=459",
"refsource" : "MISC",
"url" : "http://bugs.cubecart.com/?do=details&id=459"
},
{
"name" : "http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html",
"refsource" : "MISC",
"url" : "http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html"
},
{
"name" : "16259",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16259"
},
{
"name": "ADV-2006-0227",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0227"
},
{
"name": "cubecart-index-script-xss(24177)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24177"
},
{
"name": "http://bugs.cubecart.com/?do=details&id=459",
"refsource": "MISC",
"url": "http://bugs.cubecart.com/?do=details&id=459"
},
{
"name": "22471",
"refsource": "OSVDB",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/18519"
},
{
"name" : "cubecart-index-script-xss(24177)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24177"
"name": "16259",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16259"
},
{
"name": "http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html",
"refsource": "MISC",
"url": "http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060114 [NMRC Advisory] Microsoft Windows Wireless Exposure on Laptops",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/421868/100/0/threaded"
},
{
"name" : "http://www.securiteam.com/windowsntfocus/5YP0D2KHHO.html",
"refsource" : "MISC",
"url" : "http://www.securiteam.com/windowsntfocus/5YP0D2KHHO.html"
},
{
"name" : "http://www.nmrc.org/pub/advise/20060114.txt",
"refsource" : "MISC",
"url" : "http://www.nmrc.org/pub/advise/20060114.txt"
},
{
"name": "http://www.theta44.org/karma/",
"refsource": "MISC",
@ -82,10 +67,25 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/349"
},
{
"name": "http://www.nmrc.org/pub/advise/20060114.txt",
"refsource": "MISC",
"url": "http://www.nmrc.org/pub/advise/20060114.txt"
},
{
"name": "windows-wireless-adhoc-unauth-access(24157)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24157"
},
{
"name": "http://www.securiteam.com/windowsntfocus/5YP0D2KHHO.html",
"refsource": "MISC",
"url": "http://www.securiteam.com/windowsntfocus/5YP0D2KHHO.html"
},
{
"name": "20060114 [NMRC Advisory] Microsoft Windows Wireless Exposure on Laptops",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/421868/100/0/threaded"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf"
},
{
"name" : "16723",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16723"
},
{
"name": "ADV-2006-0668",
"refsource": "VUPEN",
@ -77,10 +67,20 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18952"
},
{
"name": "16723",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16723"
},
{
"name": "xerox-workcentre-postscript-dos(24805)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24805"
},
{
"name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf",
"refsource": "CONFIRM",
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf"
}
]
}

View File

@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060223 NOCC Webmail <= 1.0 multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-02/0418.html"
},
{
"name" : "http://retrogod.altervista.org/noccw_10_incl_xpl.html",
"refsource" : "MISC",
"url" : "http://retrogod.altervista.org/noccw_10_incl_xpl.html"
},
{
"name" : "16793",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16793"
},
{
"name" : "23420",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/23420"
},
{
"name": "23422",
"refsource": "OSVDB",
@ -82,10 +62,30 @@
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015671"
},
{
"name": "20060223 NOCC Webmail <= 1.0 multiple vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-02/0418.html"
},
{
"name": "23420",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23420"
},
{
"name": "16921",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16921"
},
{
"name": "http://retrogod.altervista.org/noccw_10_incl_xpl.html",
"refsource": "MISC",
"url": "http://retrogod.altervista.org/noccw_10_incl_xpl.html"
},
{
"name": "16793",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16793"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "blanknberg-index-directory-traversal(25617)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25617"
},
{
"name": "http://www.silitix.com/bnb.php",
"refsource": "MISC",
"url": "http://www.silitix.com/bnb.php"
},
{
"name" : "17345",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17345"
},
{
"name" : "24373",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24373"
},
{
"name": "1015854",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015854"
},
{
"name": "17345",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17345"
},
{
"name": "19520",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19520"
},
{
"name" : "blanknberg-index-directory-traversal(25617)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25617"
"name": "24373",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24373"
}
]
}

View File

@ -53,15 +53,20 @@
"references": {
"reference_data": [
{
"name" : "20060807 [vuln.sg] Lhaz LHA Long Filename Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/442445/100/0/threaded"
"name": "lhaz-error-bo(28283)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28283"
},
{
"name": "http://vuln.sg/lhaz131-en.html",
"refsource": "MISC",
"url": "http://vuln.sg/lhaz131-en.html"
},
{
"name": "20060807 [vuln.sg] Lhaz LHA Long Filename Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/442445/100/0/threaded"
},
{
"name": "http://www.chitora.jp/lhaz.html",
"refsource": "CONFIRM",
@ -78,9 +83,9 @@
"url": "http://www.vupen.com/english/advisories/2006/3173"
},
{
"name" : "21348",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21348"
"name": "lhaz-long-filename-bo(28282)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28282"
},
{
"name": "1378",
@ -88,14 +93,9 @@
"url": "http://securityreason.com/securityalert/1378"
},
{
"name" : "lhaz-error-bo(28283)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28283"
},
{
"name" : "lhaz-long-filename-bo(28282)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28282"
"name": "21348",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21348"
}
]
}

View File

@ -52,6 +52,36 @@
},
"references": {
"reference_data": [
{
"name": "20060814 Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2006-August/000975.html"
},
{
"name": "calendarix-calconfig-file-include(28349)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28349"
},
{
"name": "20060815 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443292/100/0/threaded"
},
{
"name": "20060814 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443225/100/0/threaded"
},
{
"name": "1016694",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016694"
},
{
"name": "28284",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28284"
},
{
"name": "20060812 Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource": "BUGTRAQ",
@ -61,36 +91,6 @@
"name": "20060813 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443152/100/0/threaded"
},
{
"name" : "20060814 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443225/100/0/threaded"
},
{
"name" : "20060815 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443292/100/0/threaded"
},
{
"name" : "20060814 Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2006-August/000975.html"
},
{
"name" : "28284",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/28284"
},
{
"name" : "1016694",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016694"
},
{
"name" : "calendarix-calconfig-file-include(28349)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28349"
}
]
}

View File

@ -53,74 +53,54 @@
"references": {
"reference_data": [
{
"name" : "20060815 [XSec-06-02]: Internet Explorer (IMSKDIC.DLL) COM Object Instantiation Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443290/100/0/threaded"
},
{
"name" : "20060815 [XSec-06-03]: Internet Explorer (CHTSKDIC.DLL) COM Object Instantiation Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443295/100/0/threaded"
},
{
"name" : "20060815 [XSec-06-04]: Internet Explorer (msoe.dll) COM Object Instantiation Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/443299/100/0/threaded"
},
{
"name" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=10",
"refsource" : "MISC",
"url" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=10"
},
{
"name" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=8",
"refsource" : "MISC",
"url" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=8"
},
{
"name" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=9",
"refsource" : "MISC",
"url" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=9"
},
{
"name" : "19521",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19521"
},
{
"name" : "19529",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19529"
},
{
"name" : "19530",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19530"
},
{
"name" : "29345",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/29345"
},
{
"name" : "29346",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/29346"
"name": "ie-msoe-dos(28439)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28439"
},
{
"name": "29347",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29347"
},
{
"name": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=8",
"refsource": "MISC",
"url": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=8"
},
{
"name": "29345",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29345"
},
{
"name": "20060815 [XSec-06-03]: Internet Explorer (CHTSKDIC.DLL) COM Object Instantiation Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443295/100/0/threaded"
},
{
"name": "1402",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1402"
},
{
"name" : "ie-chtskdic-dos(28438)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28438"
"name": "19530",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19530"
},
{
"name": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=10",
"refsource": "MISC",
"url": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=10"
},
{
"name": "20060815 [XSec-06-02]: Internet Explorer (IMSKDIC.DLL) COM Object Instantiation Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443290/100/0/threaded"
},
{
"name": "19521",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19521"
},
{
"name": "ie-imskdic-dos(28436)",
@ -128,9 +108,29 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28436"
},
{
"name" : "ie-msoe-dos(28439)",
"name": "19529",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19529"
},
{
"name": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=9",
"refsource": "MISC",
"url": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=9"
},
{
"name": "29346",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29346"
},
{
"name": "20060815 [XSec-06-04]: Internet Explorer (msoe.dll) COM Object Instantiation Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443299/100/0/threaded"
},
{
"name": "ie-chtskdic-dos(28438)",
"refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28439"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28438"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "jamroommediacms-login-xss(29131)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29131"
},
{
"name": "1649",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1649"
},
{
"name": "22077",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22077"
},
{
"name": "20060923 Jamroom Media Content Management System Login.php Xss Vuln.",
"refsource": "BUGTRAQ",
@ -66,21 +81,6 @@
"name": "ADV-2006-3766",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3766"
},
{
"name" : "22077",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22077"
},
{
"name" : "1649",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1649"
},
{
"name" : "jamroommediacms-login-xss(29131)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29131"
}
]
}

View File

@ -52,36 +52,36 @@
},
"references": {
"reference_data": [
{
"name" : "http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html",
"refsource" : "MISC",
"url" : "http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html"
},
{
"name": "2450",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2450"
},
{
"name" : "20260",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20260"
},
{
"name": "ADV-2006-3850",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3850"
},
{
"name" : "29293",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/29293"
"name": "20260",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20260"
},
{
"name": "22189",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22189"
},
{
"name": "http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html",
"refsource": "MISC",
"url": "http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html"
},
{
"name": "29293",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29293"
},
{
"name": "tagit-index-file-include(29257)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-2204",
"STATE": "PUBLIC"
},
@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2010-1636",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1636"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-15.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html"
},
{
"name" : "41231",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/41231"
},
{
"name": "oval:org.mitre.oval:def:7242",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7242"
},
{
"name": "41231",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41231"
},
{
"name": "1024159",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024159"
},
{
"name" : "ADV-2010-1636",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1636"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2010-2710",
"STATE": "PUBLIC"
},
@ -53,12 +53,12 @@
"references": {
"reference_data": [
{
"name" : "HPSBMA02477",
"name": "SSRT090177",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01926980"
},
{
"name" : "SSRT090177",
"name": "HPSBMA02477",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01926980"
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "14296",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/14296"
"name": "41508",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41508"
},
{
"name": "http://packetstormsecurity.org/1007-exploits/joomlaquickfaq-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1007-exploits/joomlaquickfaq-sql.txt"
},
{
"name" : "41508",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/41508"
},
{
"name": "quickfaqcom-index-sql-injection(60236)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60236"
},
{
"name": "14296",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14296"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=42736"
},
{
"name" : "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html"
},
{
"name": "oval:org.mitre.oval:def:12048",
"refsource": "OVAL",
@ -71,6 +66,11 @@
"name": "40743",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40743"
},
{
"name": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2010-3011",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "41490",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41490"
},
{
"name": "HPSBMA02568",
"refsource": "HP",
@ -66,11 +71,6 @@
"name": "41480",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41480"
},
{
"name" : "41490",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41490"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2010-3224",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-3537",
"STATE": "PUBLIC"
},

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html"
},
{
"name" : "oval:org.mitre.oval:def:14277",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14277"
},
{
"name": "42109",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42109"
},
{
"name": "oval:org.mitre.oval:def:14277",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14277"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27020327",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27020327"
},
{
"name": "IZ86207",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ86207"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg27020327",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27020327"
}
]
}

View File

@ -57,35 +57,35 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/514479/100/100/threaded"
},
{
"name": "bloofoxcms-name-sql-injection(62810)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62810"
},
{
"name": "15328",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15328"
},
{
"name" : "http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt"
},
{
"name" : "http://www.htbridge.ch/advisory/sql_injection_in_bloofoxcms_registration_plugin.html",
"refsource" : "MISC",
"url" : "http://www.htbridge.ch/advisory/sql_injection_in_bloofoxcms_registration_plugin.html"
},
{
"name" : "44464",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/44464"
},
{
"name": "8427",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8427"
},
{
"name" : "bloofoxcms-name-sql-injection(62810)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62810"
"name": "http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt"
},
{
"name": "44464",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44464"
},
{
"name": "http://www.htbridge.ch/advisory/sql_injection_in_bloofoxcms_registration_plugin.html",
"refsource": "MISC",
"url": "http://www.htbridge.ch/advisory/sql_injection_in_bloofoxcms_registration_plugin.html"
}
]
}

View File

@ -52,31 +52,31 @@
},
"references": {
"reference_data": [
{
"name" : "20100907 Security problems in Zenphoto version 1.3",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/513525/100/0/threaded"
},
{
"name": "http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt"
},
{
"name" : "http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/",
"refsource" : "MISC",
"url" : "http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/"
},
{
"name": "43021",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43021"
},
{
"name": "20100907 Security problems in Zenphoto version 1.3",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/513525/100/0/threaded"
},
{
"name": "41350",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41350"
},
{
"name": "http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/",
"refsource": "MISC",
"url": "http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/"
},
{
"name": "8442",
"refsource": "SREASON",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "31142",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/31142"
},
{
"name" : "http://packetstormsecurity.com/files/124914",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/124914"
"name": "simple-edocument-login-sql-injection(90711)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90711"
},
{
"name": "102458",
@ -68,9 +63,14 @@
"url": "http://osvdb.org/102458"
},
{
"name" : "simple-edocument-login-sql-injection(90711)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90711"
"name": "http://packetstormsecurity.com/files/124914",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/124914"
},
{
"name": "31142",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/31142"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3602",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "RHSA-2014:1796",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1796.html"
},
{
"name": "RHSA-2014:1906",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1906.html"
},
{
"name": "RHSA-2014:1796",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1796.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-3882",
"STATE": "PUBLIC"
},
@ -57,6 +57,11 @@
"refsource": "CONFIRM",
"url": "http://12net.jp/news/n20140623_01.html"
},
{
"name": "JVNDB-2014-000062",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000062"
},
{
"name": "http://wordpress.org/plugins/login-rebuilder/changelog/",
"refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "JVN#05329568",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN05329568/index.html"
},
{
"name" : "JVNDB-2014-000062",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000062"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-3900",
"STATE": "PUBLIC"
},
@ -57,16 +57,16 @@
"refsource": "CONFIRM",
"url": "http://piwigo.org/bugs/view.php?id=3089"
},
{
"name" : "http://piwigo.org/dev/changeset/28678",
"refsource" : "CONFIRM",
"url" : "http://piwigo.org/dev/changeset/28678"
},
{
"name": "JVN#09717399",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN09717399/index.html"
},
{
"name": "http://piwigo.org/dev/changeset/28678",
"refsource": "CONFIRM",
"url": "http://piwigo.org/dev/changeset/28678"
},
{
"name": "JVNDB-2014-000093",
"refsource": "JVNDB",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-8246",
"STATE": "PUBLIC"
},
@ -53,25 +53,25 @@
"references": {
"reference_data": [
{
"name" : "20141215 CA20141215-01: Security Notice for CA LISA Release Automation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/534246/100/0/threaded"
"name": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx",
"refsource": "CONFIRM",
"url": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx"
},
{
"name": "20141216 CA20141215-01: Security Notice for CA LISA Release Automation",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/55"
},
{
"name" : "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx",
"refsource" : "CONFIRM",
"url" : "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx"
},
{
"name": "VU#343060",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/343060"
},
{
"name": "20141215 CA20141215-01: Security Notice for CA LISA Release Automation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534246/100/0/threaded"
},
{
"name": "1031375",
"refsource": "SECTRACK",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20141008 [Onapsis Security Advisory 2014-032] SAP BusinessObjects Persistent Cross Site Scripting",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/533649/100/0/threaded"
},
{
"name" : "20141008 [Onapsis Security Advisory 2014-032] SAP BusinessObjects Persistent Cross Site Scripting",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Oct/41"
"name": "https://service.sap.com/sap/support/notes/1941562",
"refsource": "CONFIRM",
"url": "https://service.sap.com/sap/support/notes/1941562"
},
{
"name": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-032",
@ -68,9 +63,14 @@
"url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-032"
},
{
"name" : "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html"
"name": "20141008 [Onapsis Security Advisory 2014-032] SAP BusinessObjects Persistent Cross Site Scripting",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Oct/41"
},
{
"name": "sap-businessobjects-web-page-xss(96873)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96873"
},
{
"name": "http://scn.sap.com/docs/DOC-8218",
@ -78,9 +78,9 @@
"url": "http://scn.sap.com/docs/DOC-8218"
},
{
"name" : "https://service.sap.com/sap/support/notes/1941562",
"refsource" : "CONFIRM",
"url" : "https://service.sap.com/sap/support/notes/1941562"
"name": "20141008 [Onapsis Security Advisory 2014-032] SAP BusinessObjects Persistent Cross Site Scripting",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533649/100/0/threaded"
},
{
"name": "70290",
@ -88,9 +88,9 @@
"url": "http://www.securityfocus.com/bid/70290"
},
{
"name" : "sap-businessobjects-web-page-xss(96873)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/96873"
"name": "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html"
}
]
}

View File

@ -52,30 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20141106 CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q4/539"
},
{
"name": "[oss-security] 20141106 Re: CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q4/551"
},
{
"name" : "[oss-security] 20141106 Re: CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q4/622"
},
{
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485",
"refsource" : "CONFIRM",
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485"
},
{
"name" : "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135"
"name": "dpkg-format-sting(98551)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98551"
},
{
"name": "FEDORA-2015-6974",
@ -83,9 +68,24 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html"
},
{
"name" : "dpkg-format-sting(98551)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98551"
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485"
},
{
"name": "[oss-security] 20141106 CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q4/539"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135"
},
{
"name": "[oss-security] 20141106 Re: CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q4/622"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "75726",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75726"
},
{
"name": "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html"
},
{
"name": "37604",
"refsource": "EXPLOIT-DB",
@ -61,16 +71,6 @@
"name": "20150708 SOPlanning - Simple Online Planning Tool multiple vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jul/44"
},
{
"name" : "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html"
},
{
"name" : "75726",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75726"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533968/100/0/threaded"
},
{
"name": "71059",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71059"
},
{
"name": "20141113 Re: CVE-2014-8731 - RCE in phpMemcachedAdmin <=1.2.2",
"refsource": "BUGTRAQ",
@ -67,11 +72,6 @@
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/129089/PHPMemcachedAdmin-1.2.2-Remote-Code-Execution.html"
},
{
"name" : "71059",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71059"
},
{
"name": "phpmemcachedadmin-cve20148731-code-exec(98638)",
"refsource": "XF",

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "35371",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/35371"
},
{
"name" : "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html",
"refsource" : "MISC",
"url" : "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html"
"name": "wp-googledocembedder-sql-injection(98944)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98944"
},
{
"name": "https://plugins.trac.wordpress.org/changeset/1023572/google-document-embedder",
"refsource": "CONFIRM",
"url": "https://plugins.trac.wordpress.org/changeset/1023572/google-document-embedder"
},
{
"name": "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html",
"refsource": "MISC",
"url": "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html"
},
{
"name": "35371",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/35371"
},
{
"name": "115044",
"refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/115044"
},
{
"name" : "wp-googledocembedder-sql-injection(98944)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98944"
}
]
}

View File

@ -53,9 +53,19 @@
"references": {
"reference_data": [
{
"name" : "20141216 \"Ettercap 8.0 - 8.1\" multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/534248/100/0/threaded"
"name": "GLSA-201505-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201505-01"
},
{
"name": "https://github.com/Ettercap/ettercap/pull/606",
"refsource": "CONFIRM",
"url": "https://github.com/Ettercap/ettercap/pull/606"
},
{
"name": "71696",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71696"
},
{
"name": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/",
@ -73,24 +83,14 @@
"url": "https://github.com/Ettercap/ettercap/pull/605"
},
{
"name" : "https://github.com/Ettercap/ettercap/pull/606",
"refsource" : "CONFIRM",
"url" : "https://github.com/Ettercap/ettercap/pull/606"
"name": "20141216 \"Ettercap 8.0 - 8.1\" multiple vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534248/100/0/threaded"
},
{
"name": "https://github.com/Ettercap/ettercap/pull/609",
"refsource": "CONFIRM",
"url": "https://github.com/Ettercap/ettercap/pull/609"
},
{
"name" : "GLSA-201505-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201505-01"
},
{
"name" : "71696",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71696"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537441/100/0/threaded"
},
{
"name" : "20160203 Security Advisories",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Feb/8"
},
{
"name": "http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html"
},
{
"name": "20160203 Security Advisories",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Feb/8"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2014-9890",
"STATE": "PUBLIC"
},

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-06-01.html",
"name": "https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve",
"refsource": "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-06-01.html"
"url": "https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve"
},
{
"name": "https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=775fca8289eff931f91ff6e8c36cf2034ba59e88",
"refsource": "CONFIRM",
"url": "https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=775fca8289eff931f91ff6e8c36cf2034ba59e88"
},
{
"name" : "https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve",
"refsource" : "CONFIRM",
"url" : "https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve"
},
{
"name": "91046",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91046"
},
{
"name": "http://source.android.com/security/bulletin/2016-06-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-06-01.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2643",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-2647",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2016-2871",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21987769",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21987769"
},
{
"name": "94861",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94861"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21987769",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987769"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2016-2929",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991880"
},
{
"name" : "IV89789",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV89789"
},
{
"name": "94560",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94560"
},
{
"name": "IV89789",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV89789"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-3575",
"STATE": "PUBLIC"
},
@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988009",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988009"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988718",
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988718"
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "91787",
@ -73,14 +68,19 @@
"url": "http://www.securityfocus.com/bid/91787"
},
{
"name" : "91921",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91921"
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988718",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988718"
},
{
"name": "1036370",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036370"
},
{
"name": "91921",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91921"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20160819 Onapsis Security Advisory ONAPSIS-2016-037: SAP HANA Potential Remote Code Execution",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Aug/95"
},
{
"name" : "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf",
"name": "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html",
"refsource": "MISC",
"url" : "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf"
"url": "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html"
},
{
"name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016",
@ -68,9 +63,14 @@
"url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016"
},
{
"name" : "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html",
"name": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf",
"refsource": "MISC",
"url" : "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html"
"url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf"
},
{
"name": "20160819 Onapsis Security Advisory ONAPSIS-2016-037: SAP HANA Potential Remote Code Execution",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Aug/95"
},
{
"name": "92067",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-6930",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html"
},
{
"name": "GLSA-201610-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-10"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html"
},
{
"name": "RHSA-2016:1865",
"refsource": "REDHAT",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-7496",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
},
{
"name" : "GLSA-201701-17",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-17"
"name": "SUSE-SU-2016:3148",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
},
{
"name": "MS16-154",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
},
{
"name": "GLSA-201701-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-17"
},
{
"name": "1037442",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037442"
},
{
"name": "RHSA-2016:2947",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
},
{
"name" : "SUSE-SU-2016:3148",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
},
{
"name" : "openSUSE-SU-2016:3160",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
},
{
"name": "94870",
@ -88,9 +88,9 @@
"url": "http://www.securityfocus.com/bid/94870"
},
{
"name" : "1037442",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037442"
"name": "openSUSE-SU-2016:3160",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
}
]
}