"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:03:17 +00:00
parent fb49076f86
commit 9a29c9fb5e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
63 changed files with 3803 additions and 3803 deletions

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://forums.grsecurity.net/viewtopic.php?t=1646",
"name": "http://www.digitalarmaments.com/news_news.shtml",
"refsource": "MISC",
"url" : "http://forums.grsecurity.net/viewtopic.php?t=1646"
"url": "http://www.digitalarmaments.com/news_news.shtml"
},
{
"name": "http://grsecurity.net/news.php#digitalfud",
@ -63,9 +63,9 @@
"url": "http://grsecurity.net/news.php#digitalfud"
},
{
"name" : "http://www.digitalarmaments.com/news_news.shtml",
"name": "http://forums.grsecurity.net/viewtopic.php?t=1646",
"refsource": "MISC",
"url" : "http://www.digitalarmaments.com/news_news.shtml"
"url": "http://forums.grsecurity.net/viewtopic.php?t=1646"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html"
},
{
"name" : "http://www.hackers.ir/advisories/festival.txt",
"refsource" : "MISC",
"url" : "http://www.hackers.ir/advisories/festival.txt"
},
{
"name": "34651",
"refsource": "OSVDB",
"url": "http://osvdb.org/34651"
},
{
"name": "http://www.hackers.ir/advisories/festival.txt",
"refsource": "MISC",
"url": "http://www.hackers.ir/advisories/festival.txt"
}
]
}

View File

@ -52,30 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "20070123 AToZed Software Intraweb Component for Borland Delphi and Kylix DoS vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/457758/100/0/threaded"
},
{
"name" : "20070125 Re: AToZed Software Intraweb Component for Borland Delphi and Kylix DoS vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/458121/100/0/threaded"
},
{
"name": "20070124 Re: AToZed Software Intraweb Component for Borland Delphi and Kylix DoS vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/457947/100/0/threaded"
},
{
"name" : "http://blogs.atozed.com/Olaf/20070124A.en.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.atozed.com/Olaf/20070124A.en.aspx"
"name": "intraweb-component-dos(31685)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31685"
},
{
"name" : "http://blogs.atozed.com/Olaf/20070124.en.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.atozed.com/Olaf/20070124.en.aspx"
"name": "23902",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23902"
},
{
"name": "22185",
@ -87,20 +77,30 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0355"
},
{
"name": "http://blogs.atozed.com/Olaf/20070124A.en.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.atozed.com/Olaf/20070124A.en.aspx"
},
{
"name": "20070123 AToZed Software Intraweb Component for Borland Delphi and Kylix DoS vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/457758/100/0/threaded"
},
{
"name": "http://blogs.atozed.com/Olaf/20070124.en.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.atozed.com/Olaf/20070124.en.aspx"
},
{
"name": "20070125 Re: AToZed Software Intraweb Component for Borland Delphi and Kylix DoS vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/458121/100/0/threaded"
},
{
"name": "32973",
"refsource": "OSVDB",
"url": "http://osvdb.org/32973"
},
{
"name" : "23902",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23902"
},
{
"name" : "intraweb-component-dos(31685)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31685"
}
]
}

View File

@ -53,9 +53,19 @@
"references": {
"reference_data": [
{
"name" : "http://www.cisco.com/en/US/products/products_security_response09186a00807e0a5e.html",
"refsource" : "MISC",
"url" : "http://www.cisco.com/en/US/products/products_security_response09186a00807e0a5e.html"
"name": "oval:org.mitre.oval:def:5858",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5858"
},
{
"name": "cisco-ios-ips-security-bypass(32473)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32473"
},
{
"name": "1017631",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017631"
},
{
"name": "20070213 Multiple IOS IPS Vulnerabilities",
@ -68,34 +78,24 @@
"url": "http://www.securityfocus.com/bid/22549"
},
{
"name" : "oval:org.mitre.oval:def:5858",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5858"
},
{
"name" : "ADV-2007-0597",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0597"
"name": "http://www.cisco.com/en/US/products/products_security_response09186a00807e0a5e.html",
"refsource": "MISC",
"url": "http://www.cisco.com/en/US/products/products_security_response09186a00807e0a5e.html"
},
{
"name": "33052",
"refsource": "OSVDB",
"url": "http://osvdb.org/33052"
},
{
"name" : "1017631",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017631"
},
{
"name": "24142",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24142"
},
{
"name" : "cisco-ios-ips-security-bypass(32473)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32473"
"name": "ADV-2007-0597",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0597"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name" : "22562",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22562"
},
{
"name" : "22561",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22561"
},
{
"name": "ADV-2007-0608",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name" : "33062",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33062"
},
{
"name": "1017651",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name" : "1017652",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017652"
"name": "33062",
"refsource": "OSVDB",
"url": "http://osvdb.org/33062"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "cisco-pix-asa-tcp-dos(32488)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32488"
},
{
"name": "22561",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "22562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
@ -93,9 +93,9 @@
"url": "http://secunia.com/advisories/24160"
},
{
"name" : "cisco-pix-asa-tcp-dos(32488)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32488"
"name": "1017652",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017652"
}
]
}

View File

@ -52,76 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "20070222 VeriSign ConfigChk ActiveX Control Buffer Overflow Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=479"
},
{
"name" : "http://jvn.jp/cert/JVNVU%23308087/index.html",
"refsource" : "MISC",
"url" : "http://jvn.jp/cert/JVNVU%23308087/index.html"
},
{
"name" : "http://www.jpcert.or.jp/at/2007/at070006.txt",
"refsource" : "MISC",
"url" : "http://www.jpcert.or.jp/at/2007/at070006.txt"
},
{
"name" : "https://download.verisign.co.jp/support/announce/20070216.html",
"refsource" : "CONFIRM",
"url" : "https://download.verisign.co.jp/support/announce/20070216.html"
},
{
"name" : "VU#308087",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/308087"
},
{
"name" : "20070222 Verisign ConfigChk ActiveX Overflow(s)",
"refsource" : "VIM",
"url" : "http://attrition.org/pipermail/vim/2007-February/001384.html"
},
{
"name" : "20070223 Verisign ConfigChk ActiveX Overflow(s)",
"refsource" : "VIM",
"url" : "http://attrition.org/pipermail/vim/2007-February/001385.html"
},
{
"name" : "22671",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22671"
},
{
"name" : "22676",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22676"
},
{
"name" : "ADV-2007-0702",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0702"
},
{
"name": "33479",
"refsource": "OSVDB",
"url": "http://osvdb.org/33479"
},
{
"name" : "1017692",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017692"
},
{
"name" : "1017693",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017693"
},
{
"name" : "1017694",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017694"
},
{
"name": "24249",
"refsource": "SECUNIA",
@ -131,6 +66,71 @@
"name": "verisign-configchk-bo(32639)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32639"
},
{
"name": "VU#308087",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/308087"
},
{
"name": "http://jvn.jp/cert/JVNVU%23308087/index.html",
"refsource": "MISC",
"url": "http://jvn.jp/cert/JVNVU%23308087/index.html"
},
{
"name": "https://download.verisign.co.jp/support/announce/20070216.html",
"refsource": "CONFIRM",
"url": "https://download.verisign.co.jp/support/announce/20070216.html"
},
{
"name": "20070223 Verisign ConfigChk ActiveX Overflow(s)",
"refsource": "VIM",
"url": "http://attrition.org/pipermail/vim/2007-February/001385.html"
},
{
"name": "1017693",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017693"
},
{
"name": "22676",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22676"
},
{
"name": "22671",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22671"
},
{
"name": "20070222 Verisign ConfigChk ActiveX Overflow(s)",
"refsource": "VIM",
"url": "http://attrition.org/pipermail/vim/2007-February/001384.html"
},
{
"name": "http://www.jpcert.or.jp/at/2007/at070006.txt",
"refsource": "MISC",
"url": "http://www.jpcert.or.jp/at/2007/at070006.txt"
},
{
"name": "1017692",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017692"
},
{
"name": "1017694",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017694"
},
{
"name": "ADV-2007-0702",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0702"
},
{
"name": "20070222 VeriSign ConfigChk ActiveX Control Buffer Overflow Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=479"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "3514",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3514"
},
{
"name": "23002",
"refsource": "BID",
@ -67,6 +62,11 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/34990"
},
{
"name": "3514",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3514"
},
{
"name": "avantbrowser-contenttype-dos(33049)",
"refsource": "XF",

View File

@ -58,9 +58,9 @@
"url": "http://www.securityfocus.com/archive/1/472195/100/0/threaded"
},
{
"name" : "20070626 Re: KF Web Server 3.1.0 admin console XSS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/472273/100/0/threaded"
"name": "36331",
"refsource": "OSVDB",
"url": "http://osvdb.org/36331"
},
{
"name": "http://www.keyfocus.net/kfws/support/index.php",
@ -68,24 +68,14 @@
"url": "http://www.keyfocus.net/kfws/support/index.php"
},
{
"name" : "24623",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24623"
"name": "kfwebserver-index-xss(35042)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35042"
},
{
"name" : "ADV-2007-2331",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2331"
},
{
"name" : "36331",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36331"
},
{
"name" : "25828",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25828"
"name": "20070626 Re: KF Web Server 3.1.0 admin console XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/472273/100/0/threaded"
},
{
"name": "2840",
@ -93,9 +83,19 @@
"url": "http://securityreason.com/securityalert/2840"
},
{
"name" : "kfwebserver-index-xss(35042)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35042"
"name": "ADV-2007-2331",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2331"
},
{
"name": "25828",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25828"
},
{
"name": "24623",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24623"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20070722 Buffer overflow in Areca CLI, version <= 1.72.250",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/474415/100/0/threaded"
},
{
"name" : "http://www.devtarget.org/areca-advisory-07-2007.txt",
"refsource" : "MISC",
"url" : "http://www.devtarget.org/areca-advisory-07-2007.txt"
"name": "arecacli-cli32-bo(35546)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35546"
},
{
"name": "38999",
"refsource": "OSVDB",
"url": "http://osvdb.org/38999"
},
{
"name": "20070722 Buffer overflow in Areca CLI, version <= 1.72.250",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474415/100/0/threaded"
},
{
"name": "2928",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2928"
},
{
"name" : "arecacli-cli32-bo(35546)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35546"
"name": "http://www.devtarget.org/areca-advisory-07-2007.txt",
"refsource": "MISC",
"url": "http://www.devtarget.org/areca-advisory-07-2007.txt"
}
]
}

View File

@ -52,31 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20070727 WebEvents: Online Event Registration Template Username Fields SQL INJECTION",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/474933/100/0/threaded"
},
{
"name" : "20070728 WebEvents: Online Event Registration Template Username Fields SQL INJECTION",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/474931/100/0/threaded"
},
{
"name" : "http://outlaw.aria-security.info/?p=10",
"refsource" : "MISC",
"url" : "http://outlaw.aria-security.info/?p=10"
},
{
"name" : "25111",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25111"
},
{
"name" : "26252",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26252"
},
{
"name": "2948",
"refsource": "SREASON",
@ -86,6 +61,31 @@
"name": "webevents-signin-sql-injection(35671)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35671"
},
{
"name": "25111",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25111"
},
{
"name": "20070727 WebEvents: Online Event Registration Template Username Fields SQL INJECTION",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474933/100/0/threaded"
},
{
"name": "http://outlaw.aria-security.info/?p=10",
"refsource": "MISC",
"url": "http://outlaw.aria-security.info/?p=10"
},
{
"name": "26252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26252"
},
{
"name": "20070728 WebEvents: Online Event Registration Template Username Fields SQL INJECTION",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474931/100/0/threaded"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20070829 [HISPASEC] Blizzard StarCraft Brood War 1.15.1 Remote DoS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/478052/100/0/threaded"
},
{
"name": "25478",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "3086",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3086"
},
{
"name": "20070829 [HISPASEC] Blizzard StarCraft Brood War 1.15.1 Remote DoS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478052/100/0/threaded"
}
]
}

View File

@ -52,55 +52,55 @@
},
"references": {
"reference_data": [
{
"name" : "20140827 [The ManageOwnage Series, part II]: User credential disclosure in ManageEngine DeviceExpert",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/533250/100/0/threaded"
},
{
"name": "34449",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/34449"
},
{
"name" : "20140827 Re: [The ManageOwnage Series, part II]: User credential disclosure in ManageEngine DeviceExpert",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Aug/76"
},
{
"name" : "20140827 [The ManageOwnage Series, part II]: User credential disclosure in ManageEngine DeviceExpert",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Aug/75"
},
{
"name" : "20140830 Re: [The ManageOwnage Series, part II]: User credential disclosure in ManageEngine DeviceExpert",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Aug/84"
},
{
"name" : "http://packetstormsecurity.com/files/128019/ManageEngine-DeviceExpert-5.9-Credential-Disclosure.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/128019/ManageEngine-DeviceExpert-5.9-Credential-Disclosure.html"
},
{
"name": "http://www.manageengine.com/products/device-expert/release-notes.html",
"refsource": "MISC",
"url": "http://www.manageengine.com/products/device-expert/release-notes.html"
},
{
"name": "http://packetstormsecurity.com/files/128019/ManageEngine-DeviceExpert-5.9-Credential-Disclosure.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128019/ManageEngine-DeviceExpert-5.9-Credential-Disclosure.html"
},
{
"name": "https://raw.githubusercontent.com/pedrib/PoC/master/me_deviceexpert-5.txt",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/pedrib/PoC/master/me_deviceexpert-5.txt"
},
{
"name": "20140827 [The ManageOwnage Series, part II]: User credential disclosure in ManageEngine DeviceExpert",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Aug/75"
},
{
"name": "69443",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69443"
},
{
"name": "20140827 [The ManageOwnage Series, part II]: User credential disclosure in ManageEngine DeviceExpert",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533250/100/0/threaded"
},
{
"name": "20140830 Re: [The ManageOwnage Series, part II]: User credential disclosure in ManageEngine DeviceExpert",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Aug/84"
},
{
"name": "deviceexpert-cve20145377-info-disc(95562)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95562"
},
{
"name": "20140827 Re: [The ManageOwnage Series, part II]: User credential disclosure in ManageEngine DeviceExpert",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Aug/76"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-5412",
"STATE": "PUBLIC"
},

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "20150513 Concrete5 Security Advisory - Multiple XSS Vulnerabilities - CVE-2015-2250",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/535531/100/0/threaded"
},
{
"name" : "20150513 Concrete5 Security Advisory - Multiple XSS Vulnerabilities - CVE-2015-2250",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/May/51"
},
{
"name": "http://packetstormsecurity.com/files/131882/Concrete5-5.7.3.1-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/131882/Concrete5-5.7.3.1-Cross-Site-Scripting.html"
},
{
"name": "74651",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74651"
},
{
"name": "https://www.netsparker.com/cve-2015-2250-multiple-xss-vulnerabilities-identified-in-concrete5/",
"refsource": "MISC",
"url": "https://www.netsparker.com/cve-2015-2250-multiple-xss-vulnerabilities-identified-in-concrete5/"
},
{
"name": "20150513 Concrete5 Security Advisory - Multiple XSS Vulnerabilities - CVE-2015-2250",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/May/51"
},
{
"name": "20150513 Concrete5 Security Advisory - Multiple XSS Vulnerabilities - CVE-2015-2250",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/535531/100/0/threaded"
},
{
"name": "https://www.concrete5.org/documentation/developers/5.7/background/version-history/5-7-4-release-notes/",
"refsource": "CONFIRM",
"url": "https://www.concrete5.org/documentation/developers/5.7/background/version-history/5-7-4-release-notes/"
},
{
"name" : "74651",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/74651"
}
]
}

View File

@ -57,16 +57,16 @@
"refsource": "CONFIRM",
"url": "https://symfony.com/blog/cve-2015-2308-esi-code-injection"
},
{
"name" : "JVN#19578958",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN19578958/index.html"
},
{
"name": "JVNDB-2015-000089",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000089"
},
{
"name": "JVN#19578958",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN19578958/index.html"
},
{
"name": "75357",
"refsource": "BID",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2585",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2635",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-3039",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html"
},
{
"name" : "GLSA-201504-07",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-07"
},
{
"name" : "RHSA-2015:0813",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0813.html"
"name": "openSUSE-SU-2015:0718",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html"
},
{
"name": "SUSE-SU-2015:0722",
@ -73,14 +63,24 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html"
},
{
"name" : "SUSE-SU-2015:0723",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html"
"name": "GLSA-201504-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-07"
},
{
"name" : "openSUSE-SU-2015:0718",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html"
"name": "1032105",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032105"
},
{
"name": "RHSA-2015:0813",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html"
},
{
"name": "openSUSE-SU-2015:0725",
@ -93,9 +93,9 @@
"url": "http://www.securityfocus.com/bid/74064"
},
{
"name" : "1032105",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032105"
"name": "SUSE-SU-2015:0723",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6169",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6218",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6336",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-7400",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21970392",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21970392"
"name": "1035319",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035319"
},
{
"name": "IT12268",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/77986"
},
{
"name" : "1035319",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035319"
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21970392",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21970392"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-7428",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-7538",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-12-09"
},
{
"name" : "RHSA-2016:0070",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:0070"
},
{
"name": "RHSA-2016:0489",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0489.html"
},
{
"name": "RHSA-2016:0070",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:0070"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name": "USN-2788-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2788-2"
},
{
"name": "[oss-security] 20150907 Heap overflow and DoS in unzip 6.0",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/09/07/4"
},
{
"name" : "[oss-security] 20150915 Re: Heap overflow and DoS in unzip 6.0",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/09/15/6"
},
{
"name" : "[oss-security] 20150921 Re: Heap overflow and DoS in unzip 6.0",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/09/21/6"
},
{
"name" : "[oss-security] 20151011 Re: Heap overflow and DoS in unzip 6.0",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/10/11/5"
},
{
"name": "DSA-3386",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3386"
},
{
"name": "1034027",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034027"
},
{
"name": "USN-2788-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2788-1"
},
{
"name" : "USN-2788-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2788-2"
"name": "[oss-security] 20150921 Re: Heap overflow and DoS in unzip 6.0",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/09/21/6"
},
{
"name": "[oss-security] 20150915 Re: Heap overflow and DoS in unzip 6.0",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/09/15/6"
},
{
"name": "76863",
@ -93,9 +93,9 @@
"url": "http://www.securityfocus.com/bid/76863"
},
{
"name" : "1034027",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034027"
"name": "[oss-security] 20151011 Re: Heap overflow and DoS in unzip 6.0",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/10/11/5"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0175",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-281",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-281"
},
{
"name" : "MS16-062",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-062"
"name": "1035841",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035841"
},
{
"name": "90027",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/90027"
},
{
"name" : "1035841",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035841"
"name": "MS16-062",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-062"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-281",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-281"
}
]
}

View File

@ -85,15 +85,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21996417",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21996417"
},
{
"name": "95681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95681"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21996417",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21996417"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0455",
"STATE": "PUBLIC"
},

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://openwall.com/lists/oss-security/2017/03/01/10",
"refsource" : "CONFIRM",
"url" : "http://openwall.com/lists/oss-security/2017/03/01/10"
"name": "96525",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96525"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=19519",
@ -63,9 +63,9 @@
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19519"
},
{
"name" : "96525",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96525"
"name": "http://openwall.com/lists/oss-security/2017/03/01/10",
"refsource": "CONFIRM",
"url": "http://openwall.com/lists/oss-security/2017/03/01/10"
}
]
}

View File

@ -53,15 +53,20 @@
"references": {
"reference_data": [
{
"name" : "https://github.com/uclouvain/openjpeg/issues/776",
"refsource" : "CONFIRM",
"url" : "https://github.com/uclouvain/openjpeg/issues/776"
"name": "GLSA-201710-26",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201710-26"
},
{
"name": "https://github.com/uclouvain/openjpeg/issues/784",
"refsource": "CONFIRM",
"url": "https://github.com/uclouvain/openjpeg/issues/784"
},
{
"name": "https://github.com/uclouvain/openjpeg/issues/776",
"refsource": "CONFIRM",
"url": "https://github.com/uclouvain/openjpeg/issues/776"
},
{
"name": "https://github.com/uclouvain/openjpeg/issues/785",
"refsource": "CONFIRM",
@ -71,11 +76,6 @@
"name": "https://github.com/uclouvain/openjpeg/issues/792",
"refsource": "CONFIRM",
"url": "https://github.com/uclouvain/openjpeg/issues/792"
},
{
"name" : "GLSA-201710-26",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201710-26"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1050",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-298",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-298"
},
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{
"name": "90512",
"refsource": "BID",
@ -71,6 +61,16 @@
"name": "1035828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-298",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-298"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.drupal.org/node/2649800",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2649800"
},
{
"name": "https://www.drupal.org/node/2649780",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2649780"
},
{
"name": "https://www.drupal.org/node/2649800",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2649800"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-1978",
"STATE": "PUBLIC"
},
@ -52,80 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes",
"refsource" : "MISC",
"url" : "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes"
},
{
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-15.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-15.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1209546",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1209546"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa124",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa124"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "DSA-3688",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3688"
},
{
"name" : "GLSA-201605-06",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201605-06"
},
{
"name" : "RHSA-2016:0591",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0591.html"
},
{
"name": "RHSA-2016:0684",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0684.html"
},
{
"name" : "RHSA-2016:0685",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0685.html"
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name" : "SUSE-SU-2016:0909",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html"
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-15.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-15.html"
},
{
"name" : "SUSE-SU-2016:0727",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html"
},
{
"name" : "SUSE-SU-2016:0777",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "SUSE-SU-2016:0820",
@ -133,24 +93,64 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html"
},
{
"name" : "USN-2973-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2973-1"
"name": "RHSA-2016:0685",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0685.html"
},
{
"name" : "91787",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91787"
"name": "SUSE-SU-2016:0727",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html"
},
{
"name": "84275",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84275"
},
{
"name": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes",
"refsource": "MISC",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes"
},
{
"name": "USN-2973-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2973-1"
},
{
"name": "RHSA-2016:0591",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0591.html"
},
{
"name": "SUSE-SU-2016:0909",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html"
},
{
"name": "1035258",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035258"
},
{
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1209546",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1209546"
},
{
"name": "SUSE-SU-2016:0777",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html"
},
{
"name": "GLSA-201605-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201605-06"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst",
"refsource" : "CONFIRM",
"url" : "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst"
},
{
"name" : "https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e",
"refsource" : "CONFIRM",
"url" : "https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e"
"name": "GLSA-201612-52",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-52"
},
{
"name": "https://github.com/python-pillow/Pillow/pull/1714",
@ -68,14 +63,19 @@
"url": "https://github.com/python-pillow/Pillow/pull/1714"
},
{
"name" : "GLSA-201612-52",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201612-52"
"name": "https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e",
"refsource": "CONFIRM",
"url": "https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e"
},
{
"name": "86064",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/86064"
},
{
"name": "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst",
"refsource": "CONFIRM",
"url": "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05219560",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05219560"
},
{
"name": "92357",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92357"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05219560",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05219560"
},
{
"name": "1036533",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-4828",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.welcart.com/community/archives/78977",
"refsource" : "CONFIRM",
"url" : "http://www.welcart.com/community/archives/78977"
},
{
"name": "JVN#61578437",
"refsource": "JVN",
@ -66,6 +61,11 @@
"name": "JVNDB-2016-000118",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000118"
},
{
"name": "http://www.welcart.com/community/archives/78977",
"refsource": "CONFIRM",
"url": "http://www.welcart.com/community/archives/78977"
}
]
}

View File

@ -52,46 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://bugs.ntp.org/3043",
"refsource" : "CONFIRM",
"url" : "http://bugs.ntp.org/3043"
},
{
"name" : "http://support.ntp.org/bin/view/Main/NtpBug3043",
"refsource" : "CONFIRM",
"url" : "http://support.ntp.org/bin/view/Main/NtpBug3043"
},
{
"name" : "http://support.ntp.org/bin/view/Main/SecurityNotice",
"refsource" : "CONFIRM",
"url" : "http://support.ntp.org/bin/view/Main/SecurityNotice"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "FreeBSD-SA-16:24",
"refsource" : "FREEBSD",
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc"
},
{
"name" : "GLSA-201607-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201607-15"
},
{
"name" : "SUSE-SU-2016:1563",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html"
},
{
"name" : "SUSE-SU-2016:1584",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html"
},
{
"name": "SUSE-SU-2016:1602",
"refsource": "SUSE",
@ -103,24 +63,64 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html"
},
{
"name" : "openSUSE-SU-2016:1636",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html"
},
{
"name" : "VU#321640",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/321640"
"name": "FreeBSD-SA-16:24",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc"
},
{
"name": "91007",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91007"
},
{
"name": "http://support.ntp.org/bin/view/Main/NtpBug3043",
"refsource": "CONFIRM",
"url": "http://support.ntp.org/bin/view/Main/NtpBug3043"
},
{
"name": "1036037",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036037"
},
{
"name": "SUSE-SU-2016:1584",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "http://bugs.ntp.org/3043",
"refsource": "CONFIRM",
"url": "http://bugs.ntp.org/3043"
},
{
"name": "VU#321640",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/321640"
},
{
"name": "http://support.ntp.org/bin/view/Main/SecurityNotice",
"refsource": "CONFIRM",
"url": "http://support.ntp.org/bin/view/Main/SecurityNotice"
},
{
"name": "openSUSE-SU-2016:1636",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html"
},
{
"name": "SUSE-SU-2016:1563",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html"
},
{
"name": "GLSA-201607-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-15"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://github.com/mimblewimble/grin/pull/2624",
"name": "https://www.grin-forum.org/t/critical-vulnerability-in-grin-1-0-1-and-older-fixed-in-1-0-2/4343",
"refsource": "MISC",
"url" : "https://github.com/mimblewimble/grin/pull/2624"
"url": "https://www.grin-forum.org/t/critical-vulnerability-in-grin-1-0-1-and-older-fixed-in-1-0-2/4343"
},
{
"name": "https://github.com/mimblewimble/grin/releases/tag/v1.0.2",
@ -63,9 +63,9 @@
"url": "https://github.com/mimblewimble/grin/releases/tag/v1.0.2"
},
{
"name" : "https://www.grin-forum.org/t/critical-vulnerability-in-grin-1-0-1-and-older-fixed-in-1-0-2/4343",
"name": "https://github.com/mimblewimble/grin/pull/2624",
"refsource": "MISC",
"url" : "https://www.grin-forum.org/t/critical-vulnerability-in-grin-1-0-1-and-older-fixed-in-1-0-2/4343"
"url": "https://github.com/mimblewimble/grin/pull/2624"
}
]
}