mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
ddb0d46780
commit
8778677cac
@ -52,26 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://bugs.cubecart.com/?do=details&id=459",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://bugs.cubecart.com/?do=details&id=459"
|
||||
},
|
||||
{
|
||||
"name" : "http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html"
|
||||
},
|
||||
{
|
||||
"name" : "16259",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16259"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0227",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0227"
|
||||
},
|
||||
{
|
||||
"name": "cubecart-index-script-xss(24177)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24177"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.cubecart.com/?do=details&id=459",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.cubecart.com/?do=details&id=459"
|
||||
},
|
||||
{
|
||||
"name": "22471",
|
||||
"refsource": "OSVDB",
|
||||
@ -83,9 +78,14 @@
|
||||
"url": "http://secunia.com/advisories/18519"
|
||||
},
|
||||
{
|
||||
"name" : "cubecart-index-script-xss(24177)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24177"
|
||||
"name": "16259",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16259"
|
||||
},
|
||||
{
|
||||
"name": "http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060114 [NMRC Advisory] Microsoft Windows Wireless Exposure on Laptops",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/421868/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.securiteam.com/windowsntfocus/5YP0D2KHHO.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.securiteam.com/windowsntfocus/5YP0D2KHHO.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.nmrc.org/pub/advise/20060114.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.nmrc.org/pub/advise/20060114.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://www.theta44.org/karma/",
|
||||
"refsource": "MISC",
|
||||
@ -82,10 +67,25 @@
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/349"
|
||||
},
|
||||
{
|
||||
"name": "http://www.nmrc.org/pub/advise/20060114.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.nmrc.org/pub/advise/20060114.txt"
|
||||
},
|
||||
{
|
||||
"name": "windows-wireless-adhoc-unauth-access(24157)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24157"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securiteam.com/windowsntfocus/5YP0D2KHHO.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securiteam.com/windowsntfocus/5YP0D2KHHO.html"
|
||||
},
|
||||
{
|
||||
"name": "20060114 [NMRC Advisory] Microsoft Windows Wireless Exposure on Laptops",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/421868/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "16723",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16723"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0668",
|
||||
"refsource": "VUPEN",
|
||||
@ -77,10 +67,20 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18952"
|
||||
},
|
||||
{
|
||||
"name": "16723",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16723"
|
||||
},
|
||||
{
|
||||
"name": "xerox-workcentre-postscript-dos(24805)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24805"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_001.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060223 NOCC Webmail <= 1.0 multiple vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-02/0418.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://retrogod.altervista.org/noccw_10_incl_xpl.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://retrogod.altervista.org/noccw_10_incl_xpl.html"
|
||||
},
|
||||
{
|
||||
"name" : "16793",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16793"
|
||||
},
|
||||
{
|
||||
"name" : "23420",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/23420"
|
||||
},
|
||||
{
|
||||
"name": "23422",
|
||||
"refsource": "OSVDB",
|
||||
@ -82,10 +62,30 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015671"
|
||||
},
|
||||
{
|
||||
"name": "20060223 NOCC Webmail <= 1.0 multiple vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-02/0418.html"
|
||||
},
|
||||
{
|
||||
"name": "23420",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/23420"
|
||||
},
|
||||
{
|
||||
"name": "16921",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/16921"
|
||||
},
|
||||
{
|
||||
"name": "http://retrogod.altervista.org/noccw_10_incl_xpl.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://retrogod.altervista.org/noccw_10_incl_xpl.html"
|
||||
},
|
||||
{
|
||||
"name": "16793",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16793"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "blanknberg-index-directory-traversal(25617)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25617"
|
||||
},
|
||||
{
|
||||
"name": "http://www.silitix.com/bnb.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.silitix.com/bnb.php"
|
||||
},
|
||||
{
|
||||
"name" : "17345",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/17345"
|
||||
},
|
||||
{
|
||||
"name" : "24373",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/24373"
|
||||
},
|
||||
{
|
||||
"name": "1015854",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015854"
|
||||
},
|
||||
{
|
||||
"name": "17345",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17345"
|
||||
},
|
||||
{
|
||||
"name": "19520",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19520"
|
||||
},
|
||||
{
|
||||
"name" : "blanknberg-index-directory-traversal(25617)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25617"
|
||||
"name": "24373",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/24373"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060807 [vuln.sg] Lhaz LHA Long Filename Buffer Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/442445/100/0/threaded"
|
||||
"name": "lhaz-error-bo(28283)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28283"
|
||||
},
|
||||
{
|
||||
"name": "http://vuln.sg/lhaz131-en.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://vuln.sg/lhaz131-en.html"
|
||||
},
|
||||
{
|
||||
"name": "20060807 [vuln.sg] Lhaz LHA Long Filename Buffer Overflow Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/442445/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.chitora.jp/lhaz.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -78,9 +83,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3173"
|
||||
},
|
||||
{
|
||||
"name" : "21348",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21348"
|
||||
"name": "lhaz-long-filename-bo(28282)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28282"
|
||||
},
|
||||
{
|
||||
"name": "1378",
|
||||
@ -88,14 +93,9 @@
|
||||
"url": "http://securityreason.com/securityalert/1378"
|
||||
},
|
||||
{
|
||||
"name" : "lhaz-error-bo(28283)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28283"
|
||||
},
|
||||
{
|
||||
"name" : "lhaz-long-filename-bo(28282)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28282"
|
||||
"name": "21348",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21348"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,36 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "20060814 Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
|
||||
"refsource": "VIM",
|
||||
"url": "http://www.attrition.org/pipermail/vim/2006-August/000975.html"
|
||||
},
|
||||
{
|
||||
"name": "calendarix-calconfig-file-include(28349)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28349"
|
||||
},
|
||||
{
|
||||
"name": "20060815 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/443292/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20060814 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/443225/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1016694",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016694"
|
||||
},
|
||||
{
|
||||
"name": "28284",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28284"
|
||||
},
|
||||
{
|
||||
"name": "20060812 Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,36 +91,6 @@
|
||||
"name": "20060813 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/443152/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060814 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/443225/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060815 Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/443292/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060814 Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability",
|
||||
"refsource" : "VIM",
|
||||
"url" : "http://www.attrition.org/pipermail/vim/2006-August/000975.html"
|
||||
},
|
||||
{
|
||||
"name" : "28284",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/28284"
|
||||
},
|
||||
{
|
||||
"name" : "1016694",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016694"
|
||||
},
|
||||
{
|
||||
"name" : "calendarix-calconfig-file-include(28349)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28349"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,74 +53,54 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060815 [XSec-06-02]: Internet Explorer (IMSKDIC.DLL) COM Object Instantiation Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/443290/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060815 [XSec-06-03]: Internet Explorer (CHTSKDIC.DLL) COM Object Instantiation Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/443295/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060815 [XSec-06-04]: Internet Explorer (msoe.dll) COM Object Instantiation Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/443299/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=10",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=10"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=8",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=8"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=9",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=9"
|
||||
},
|
||||
{
|
||||
"name" : "19521",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19521"
|
||||
},
|
||||
{
|
||||
"name" : "19529",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19529"
|
||||
},
|
||||
{
|
||||
"name" : "19530",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19530"
|
||||
},
|
||||
{
|
||||
"name" : "29345",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/29345"
|
||||
},
|
||||
{
|
||||
"name" : "29346",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/29346"
|
||||
"name": "ie-msoe-dos(28439)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28439"
|
||||
},
|
||||
{
|
||||
"name": "29347",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/29347"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=8",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=8"
|
||||
},
|
||||
{
|
||||
"name": "29345",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/29345"
|
||||
},
|
||||
{
|
||||
"name": "20060815 [XSec-06-03]: Internet Explorer (CHTSKDIC.DLL) COM Object Instantiation Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/443295/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1402",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1402"
|
||||
},
|
||||
{
|
||||
"name" : "ie-chtskdic-dos(28438)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28438"
|
||||
"name": "19530",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19530"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=10",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=10"
|
||||
},
|
||||
{
|
||||
"name": "20060815 [XSec-06-02]: Internet Explorer (IMSKDIC.DLL) COM Object Instantiation Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/443290/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "19521",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19521"
|
||||
},
|
||||
{
|
||||
"name": "ie-imskdic-dos(28436)",
|
||||
@ -128,9 +108,29 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28436"
|
||||
},
|
||||
{
|
||||
"name" : "ie-msoe-dos(28439)",
|
||||
"name": "19529",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19529"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=9",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.xsec.org/index.php?module=releases&act=view&type=1&id=9"
|
||||
},
|
||||
{
|
||||
"name": "29346",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/29346"
|
||||
},
|
||||
{
|
||||
"name": "20060815 [XSec-06-04]: Internet Explorer (msoe.dll) COM Object Instantiation Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/443299/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ie-chtskdic-dos(28438)",
|
||||
"refsource": "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28439"
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28438"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "jamroommediacms-login-xss(29131)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29131"
|
||||
},
|
||||
{
|
||||
"name": "1649",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1649"
|
||||
},
|
||||
{
|
||||
"name": "22077",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22077"
|
||||
},
|
||||
{
|
||||
"name": "20060923 Jamroom Media Content Management System Login.php Xss Vuln.",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -66,21 +81,6 @@
|
||||
"name": "ADV-2006-3766",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3766"
|
||||
},
|
||||
{
|
||||
"name" : "22077",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22077"
|
||||
},
|
||||
{
|
||||
"name" : "1649",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1649"
|
||||
},
|
||||
{
|
||||
"name" : "jamroommediacms-login-xss(29131)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29131"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,36 +52,36 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html"
|
||||
},
|
||||
{
|
||||
"name": "2450",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2450"
|
||||
},
|
||||
{
|
||||
"name" : "20260",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20260"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3850",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3850"
|
||||
},
|
||||
{
|
||||
"name" : "29293",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/29293"
|
||||
"name": "20260",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20260"
|
||||
},
|
||||
{
|
||||
"name": "22189",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22189"
|
||||
},
|
||||
{
|
||||
"name": "http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html"
|
||||
},
|
||||
{
|
||||
"name": "29293",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/29293"
|
||||
},
|
||||
{
|
||||
"name": "tagit-index-file-include(29257)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2010-2204",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ADV-2010-1636",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1636"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb10-15.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html"
|
||||
},
|
||||
{
|
||||
"name" : "41231",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/41231"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:7242",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7242"
|
||||
},
|
||||
{
|
||||
"name": "41231",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/41231"
|
||||
},
|
||||
{
|
||||
"name": "1024159",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1024159"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1636",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1636"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2010-2710",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,12 +53,12 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBMA02477",
|
||||
"name": "SSRT090177",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01926980"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT090177",
|
||||
"name": "HPSBMA02477",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01926980"
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "14296",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/14296"
|
||||
"name": "41508",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/41508"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/1007-exploits/joomlaquickfaq-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/1007-exploits/joomlaquickfaq-sql.txt"
|
||||
},
|
||||
{
|
||||
"name" : "41508",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/41508"
|
||||
},
|
||||
{
|
||||
"name": "quickfaqcom-index-sql-injection(60236)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60236"
|
||||
},
|
||||
{
|
||||
"name": "14296",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/14296"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=42736"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:12048",
|
||||
"refsource": "OVAL",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "40743",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/40743"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2010-3011",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "41490",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41490"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMA02568",
|
||||
"refsource": "HP",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "41480",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41480"
|
||||
},
|
||||
{
|
||||
"name" : "41490",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/41490"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2010-3224",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2010-3537",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:14277",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14277"
|
||||
},
|
||||
{
|
||||
"name": "42109",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42109"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14277",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14277"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27020327",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27020327"
|
||||
},
|
||||
{
|
||||
"name": "IZ86207",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ86207"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg27020327",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27020327"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,35 +57,35 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/514479/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "bloofoxcms-name-sql-injection(62810)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62810"
|
||||
},
|
||||
{
|
||||
"name": "15328",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/15328"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.htbridge.ch/advisory/sql_injection_in_bloofoxcms_registration_plugin.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.htbridge.ch/advisory/sql_injection_in_bloofoxcms_registration_plugin.html"
|
||||
},
|
||||
{
|
||||
"name" : "44464",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/44464"
|
||||
},
|
||||
{
|
||||
"name": "8427",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/8427"
|
||||
},
|
||||
{
|
||||
"name" : "bloofoxcms-name-sql-injection(62810)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62810"
|
||||
"name": "http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt"
|
||||
},
|
||||
{
|
||||
"name": "44464",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/44464"
|
||||
},
|
||||
{
|
||||
"name": "http://www.htbridge.ch/advisory/sql_injection_in_bloofoxcms_registration_plugin.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.htbridge.ch/advisory/sql_injection_in_bloofoxcms_registration_plugin.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,31 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100907 Security problems in Zenphoto version 1.3",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/513525/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/"
|
||||
},
|
||||
{
|
||||
"name": "43021",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/43021"
|
||||
},
|
||||
{
|
||||
"name": "20100907 Security problems in Zenphoto version 1.3",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/513525/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "41350",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41350"
|
||||
},
|
||||
{
|
||||
"name": "http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/"
|
||||
},
|
||||
{
|
||||
"name": "8442",
|
||||
"refsource": "SREASON",
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "31142",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/31142"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/124914",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/124914"
|
||||
"name": "simple-edocument-login-sql-injection(90711)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90711"
|
||||
},
|
||||
{
|
||||
"name": "102458",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://osvdb.org/102458"
|
||||
},
|
||||
{
|
||||
"name" : "simple-edocument-login-sql-injection(90711)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90711"
|
||||
"name": "http://packetstormsecurity.com/files/124914",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/124914"
|
||||
},
|
||||
{
|
||||
"name": "31142",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/31142"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2014-3602",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "RHSA-2014:1796",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1796.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:1906",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-1906.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:1796",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-1796.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2014-3882",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://12net.jp/news/n20140623_01.html"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2014-000062",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000062"
|
||||
},
|
||||
{
|
||||
"name": "http://wordpress.org/plugins/login-rebuilder/changelog/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "JVN#05329568",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN05329568/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2014-000062",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000062"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2014-3900",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,16 +57,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://piwigo.org/bugs/view.php?id=3089"
|
||||
},
|
||||
{
|
||||
"name" : "http://piwigo.org/dev/changeset/28678",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://piwigo.org/dev/changeset/28678"
|
||||
},
|
||||
{
|
||||
"name": "JVN#09717399",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN09717399/index.html"
|
||||
},
|
||||
{
|
||||
"name": "http://piwigo.org/dev/changeset/28678",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://piwigo.org/dev/changeset/28678"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2014-000093",
|
||||
"refsource": "JVNDB",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-8246",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,25 +53,25 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20141215 CA20141215-01: Security Notice for CA LISA Release Automation",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/534246/100/0/threaded"
|
||||
"name": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx"
|
||||
},
|
||||
{
|
||||
"name": "20141216 CA20141215-01: Security Notice for CA LISA Release Automation",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Dec/55"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx"
|
||||
},
|
||||
{
|
||||
"name": "VU#343060",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/343060"
|
||||
},
|
||||
{
|
||||
"name": "20141215 CA20141215-01: Security Notice for CA LISA Release Automation",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/534246/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1031375",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20141008 [Onapsis Security Advisory 2014-032] SAP BusinessObjects Persistent Cross Site Scripting",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/533649/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20141008 [Onapsis Security Advisory 2014-032] SAP BusinessObjects Persistent Cross Site Scripting",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Oct/41"
|
||||
"name": "https://service.sap.com/sap/support/notes/1941562",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://service.sap.com/sap/support/notes/1941562"
|
||||
},
|
||||
{
|
||||
"name": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-032",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-032"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html"
|
||||
"name": "20141008 [Onapsis Security Advisory 2014-032] SAP BusinessObjects Persistent Cross Site Scripting",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Oct/41"
|
||||
},
|
||||
{
|
||||
"name": "sap-businessobjects-web-page-xss(96873)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96873"
|
||||
},
|
||||
{
|
||||
"name": "http://scn.sap.com/docs/DOC-8218",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://scn.sap.com/docs/DOC-8218"
|
||||
},
|
||||
{
|
||||
"name" : "https://service.sap.com/sap/support/notes/1941562",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://service.sap.com/sap/support/notes/1941562"
|
||||
"name": "20141008 [Onapsis Security Advisory 2014-032] SAP BusinessObjects Persistent Cross Site Scripting",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/533649/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "70290",
|
||||
@ -88,9 +88,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/70290"
|
||||
},
|
||||
{
|
||||
"name" : "sap-businessobjects-web-page-xss(96873)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/96873"
|
||||
"name": "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20141106 CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2014/q4/539"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20141106 Re: CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q4/551"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20141106 Re: CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2014/q4/622"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135"
|
||||
"name": "dpkg-format-sting(98551)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98551"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2015-6974",
|
||||
@ -83,9 +68,24 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html"
|
||||
},
|
||||
{
|
||||
"name" : "dpkg-format-sting(98551)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98551"
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20141106 CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q4/539"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20141106 Re: CVE-Request: dpkg handling of 'control' and warnings format string vulnerability",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q4/622"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "75726",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75726"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html"
|
||||
},
|
||||
{
|
||||
"name": "37604",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "20150708 SOPlanning - Simple Online Planning Tool multiple vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Jul/44"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html"
|
||||
},
|
||||
{
|
||||
"name" : "75726",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/75726"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/533968/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "71059",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/71059"
|
||||
},
|
||||
{
|
||||
"name": "20141113 Re: CVE-2014-8731 - RCE in phpMemcachedAdmin <=1.2.2",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -67,11 +72,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/129089/PHPMemcachedAdmin-1.2.2-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"name" : "71059",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/71059"
|
||||
},
|
||||
{
|
||||
"name": "phpmemcachedadmin-cve20148731-code-exec(98638)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "35371",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/35371"
|
||||
},
|
||||
{
|
||||
"name" : "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html"
|
||||
"name": "wp-googledocembedder-sql-injection(98944)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98944"
|
||||
},
|
||||
{
|
||||
"name": "https://plugins.trac.wordpress.org/changeset/1023572/google-document-embedder",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/1023572/google-document-embedder"
|
||||
},
|
||||
{
|
||||
"name": "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html"
|
||||
},
|
||||
{
|
||||
"name": "35371",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/35371"
|
||||
},
|
||||
{
|
||||
"name": "115044",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/show/osvdb/115044"
|
||||
},
|
||||
{
|
||||
"name" : "wp-googledocembedder-sql-injection(98944)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98944"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20141216 \"Ettercap 8.0 - 8.1\" multiple vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/534248/100/0/threaded"
|
||||
"name": "GLSA-201505-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201505-01"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Ettercap/ettercap/pull/606",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/Ettercap/ettercap/pull/606"
|
||||
},
|
||||
{
|
||||
"name": "71696",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/71696"
|
||||
},
|
||||
{
|
||||
"name": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/",
|
||||
@ -73,24 +83,14 @@
|
||||
"url": "https://github.com/Ettercap/ettercap/pull/605"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/Ettercap/ettercap/pull/606",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/Ettercap/ettercap/pull/606"
|
||||
"name": "20141216 \"Ettercap 8.0 - 8.1\" multiple vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/534248/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Ettercap/ettercap/pull/609",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/Ettercap/ettercap/pull/609"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201505-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201505-01"
|
||||
},
|
||||
{
|
||||
"name" : "71696",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/71696"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/537441/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20160203 Security Advisories",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Feb/8"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html"
|
||||
},
|
||||
{
|
||||
"name": "20160203 Security Advisories",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2016/Feb/8"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2014-9890",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://source.android.com/security/bulletin/2016-06-01.html",
|
||||
"name": "https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://source.android.com/security/bulletin/2016-06-01.html"
|
||||
"url": "https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve"
|
||||
},
|
||||
{
|
||||
"name": "https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=775fca8289eff931f91ff6e8c36cf2034ba59e88",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=775fca8289eff931f91ff6e8c36cf2034ba59e88"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve"
|
||||
},
|
||||
{
|
||||
"name": "91046",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91046"
|
||||
},
|
||||
{
|
||||
"name": "http://source.android.com/security/bulletin/2016-06-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://source.android.com/security/bulletin/2016-06-01.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-2643",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-2647",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2016-2871",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21987769",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21987769"
|
||||
},
|
||||
{
|
||||
"name": "94861",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94861"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21987769",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987769"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2016-2929",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991880"
|
||||
},
|
||||
{
|
||||
"name" : "IV89789",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV89789"
|
||||
},
|
||||
{
|
||||
"name": "94560",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94560"
|
||||
},
|
||||
{
|
||||
"name": "IV89789",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV89789"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-3575",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988009",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988009"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988718",
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988718"
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
||||
},
|
||||
{
|
||||
"name": "91787",
|
||||
@ -73,14 +68,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/91787"
|
||||
},
|
||||
{
|
||||
"name" : "91921",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/91921"
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988718",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988718"
|
||||
},
|
||||
{
|
||||
"name": "1036370",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036370"
|
||||
},
|
||||
{
|
||||
"name": "91921",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91921"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160819 Onapsis Security Advisory ONAPSIS-2016-037: SAP HANA Potential Remote Code Execution",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Aug/95"
|
||||
},
|
||||
{
|
||||
"name" : "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf",
|
||||
"name": "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf"
|
||||
"url": "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html",
|
||||
"name": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf",
|
||||
"refsource": "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html"
|
||||
"url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf"
|
||||
},
|
||||
{
|
||||
"name": "20160819 Onapsis Security Advisory ONAPSIS-2016-037: SAP HANA Potential Remote Code Execution",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2016/Aug/95"
|
||||
},
|
||||
{
|
||||
"name": "92067",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-6930",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201610-10",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201610-10"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:1865",
|
||||
"refsource": "REDHAT",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-7496",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201701-17",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201701-17"
|
||||
"name": "SUSE-SU-2016:3148",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
|
||||
},
|
||||
{
|
||||
"name": "MS16-154",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-17",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-17"
|
||||
},
|
||||
{
|
||||
"name": "1037442",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037442"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2947",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:3148",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:3160",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
|
||||
},
|
||||
{
|
||||
"name": "94870",
|
||||
@ -88,9 +88,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/94870"
|
||||
},
|
||||
{
|
||||
"name" : "1037442",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1037442"
|
||||
"name": "openSUSE-SU-2016:3160",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user