"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:50:56 +00:00
parent 84d6d4bb00
commit a58a43035f
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3334 additions and 3334 deletions

View File

@ -58,14 +58,9 @@
"url": "https://www.exploit-db.com/exploits/3259"
},
{
"name" : "20070202 phpBB++ Build 100 (phpbb_root_path) Remote File Include Exploit",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2007-February/001279.html"
},
{
"name" : "22376",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22376"
"name": "33092",
"refsource": "OSVDB",
"url": "http://osvdb.org/33092"
},
{
"name": "ADV-2007-0472",
@ -73,9 +68,14 @@
"url": "http://www.vupen.com/english/advisories/2007/0472"
},
{
"name" : "33092",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33092"
"name": "20070202 phpBB++ Build 100 (phpbb_root_path) Remote File Include Exploit",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-February/001279.html"
},
{
"name": "phpbbplusplus-functions-file-include(32159)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32159"
},
{
"name": "24034",
@ -83,9 +83,9 @@
"url": "http://secunia.com/advisories/24034"
},
{
"name" : "phpbbplusplus-functions-file-include(32159)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32159"
"name": "22376",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22376"
}
]
}

View File

@ -57,36 +57,36 @@
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Feb/0196.html"
},
{
"name" : "20070209 Re: [WEB SECURITY] Plain Old Webserver - The coolest firefox extension",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2007/Feb/0210.html"
},
{
"name" : "https://addons.mozilla.org/firefox/3002/",
"refsource" : "CONFIRM",
"url" : "https://addons.mozilla.org/firefox/3002/"
},
{
"name": "22502",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22502"
},
{
"name" : "ADV-2007-0558",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0558"
},
{
"name": "33174",
"refsource": "OSVDB",
"url": "http://osvdb.org/33174"
},
{
"name": "https://addons.mozilla.org/firefox/3002/",
"refsource": "CONFIRM",
"url": "https://addons.mozilla.org/firefox/3002/"
},
{
"name": "20070209 Re: [WEB SECURITY] Plain Old Webserver - The coolest firefox extension",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Feb/0210.html"
},
{
"name": "24127",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24127"
},
{
"name": "ADV-2007-0558",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0558"
},
{
"name": "pow-httprequest-directory-traversal(32467)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-3383",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070721 CVE-2007-3383: XSS in Tomcat send mail example",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/474413/100/0/threaded"
},
{
"name" : "20070721 CVE-2007-3383: XSS in Tomcat send mail example",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2007/Jul/0448.html"
"name": "39000",
"refsource": "OSVDB",
"url": "http://osvdb.org/39000"
},
{
"name": "http://tomcat.apache.org/security-4.html",
@ -72,16 +67,36 @@
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT2163"
},
{
"name": "ADV-2008-1981",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "20070721 CVE-2007-3383: XSS in Tomcat send mail example",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474413/100/0/threaded"
},
{
"name": "APPLE-SA-2008-06-30",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name": "30802",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30802"
},
{
"name": "VU#862600",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/862600"
},
{
"name": "2918",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2918"
},
{
"name": "24999",
"refsource": "BID",
@ -93,24 +108,9 @@
"url": "http://www.vupen.com/english/advisories/2007/2618"
},
{
"name" : "ADV-2008-1981",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name" : "39000",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/39000"
},
{
"name" : "30802",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30802"
},
{
"name" : "2918",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2918"
"name": "20070721 CVE-2007-3383: XSS in Tomcat send mail example",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Jul/0448.html"
},
{
"name": "tomcat-sendmail-example-xss(35536)",

View File

@ -52,55 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "http://lostmon.blogspot.com/2007/07/netflow-analizer-5-opmanager-7-multiple.html",
"refsource" : "MISC",
"url" : "http://lostmon.blogspot.com/2007/07/netflow-analizer-5-opmanager-7-multiple.html"
},
{
"name": "24767",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24767"
},
{
"name" : "38945",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38945"
},
{
"name" : "38946",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38946"
},
{
"name" : "38947",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38947"
},
{
"name" : "38948",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38948"
},
{
"name": "38949",
"refsource": "OSVDB",
"url": "http://osvdb.org/38949"
},
{
"name": "37825",
"refsource": "OSVDB",
"url": "http://osvdb.org/37825"
},
{
"name": "http://lostmon.blogspot.com/2007/07/netflow-analizer-5-opmanager-7-multiple.html",
"refsource": "MISC",
"url": "http://lostmon.blogspot.com/2007/07/netflow-analizer-5-opmanager-7-multiple.html"
},
{
"name": "38947",
"refsource": "OSVDB",
"url": "http://osvdb.org/38947"
},
{
"name": "37821",
"refsource": "OSVDB",
"url": "http://osvdb.org/37821"
},
{
"name" : "37822",
"name": "38946",
"refsource": "OSVDB",
"url" : "http://osvdb.org/37822"
},
{
"name" : "37823",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37823"
"url": "http://osvdb.org/38946"
},
{
"name": "37824",
@ -108,14 +93,29 @@
"url": "http://osvdb.org/37824"
},
{
"name" : "37825",
"name": "37822",
"refsource": "OSVDB",
"url" : "http://osvdb.org/37825"
"url": "http://osvdb.org/37822"
},
{
"name": "38945",
"refsource": "OSVDB",
"url": "http://osvdb.org/38945"
},
{
"name": "38948",
"refsource": "OSVDB",
"url": "http://osvdb.org/38948"
},
{
"name": "netflowanalyzer-opmanager-multiple-xss(35263)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35263"
},
{
"name": "37823",
"refsource": "OSVDB",
"url": "http://osvdb.org/37823"
}
]
}

View File

@ -53,59 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20070921 Re: [Full-disclosure] [USN-515-1] t1lib vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/480239/100/100/threaded"
"name": "GLSA-200710-12",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200710-12.xml"
},
{
"name" : "20070921 Re: [USN-515-1] t1lib vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/480244/100/100/threaded"
"name": "27743",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27743"
},
{
"name" : "20080105 rPSA-2008-0007-1 tetex tetex-afm tetex-dvips tetex-fonts tetex-latex tetex-xdvi",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/485823/100/0/threaded"
"name": "26901",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26901"
},
{
"name" : "20080212 FLEA-2008-0006-1 tetex tetex-dvips tetex-fonts",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/487984/100/0/threaded"
"name": "oval:org.mitre.oval:def:10557",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10557"
},
{
"name" : "http://www.bugtraq.ir/adv/t1lib.txt",
"refsource" : "MISC",
"url" : "http://www.bugtraq.ir/adv/t1lib.txt"
},
{
"name" : "4227",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4227"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=303021",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=303021"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=193437",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=193437"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1972",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1972"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0007",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0007"
},
{
"name" : "DSA-1390",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1390"
"name": "php-imagepsloadfont-bo(35620)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35620"
},
{
"name": "FEDORA-2007-2343",
@ -113,39 +83,139 @@
"url": "http://fedoranews.org/updates/FEDORA-2007-234.shtml"
},
{
"name" : "FEDORA-2007-3390",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html"
"name": "20070921 Re: [Full-disclosure] [USN-515-1] t1lib vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/480239/100/100/threaded"
},
{
"name" : "FEDORA-2007-750",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html"
"name": "DSA-1390",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1390"
},
{
"name" : "GLSA-200710-12",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200710-12.xml"
},
{
"name" : "GLSA-200711-34",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200711-34.xml"
"name": "27297",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27297"
},
{
"name": "GLSA-200805-13",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
},
{
"name": "20080105 rPSA-2008-0007-1 tetex tetex-afm tetex-dvips tetex-fonts tetex-latex tetex-xdvi",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485823/100/0/threaded"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0007",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0007"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=303021",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=303021"
},
{
"name": "FEDORA-2007-750",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html"
},
{
"name": "RHSA-2007:1031",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1031.html"
},
{
"name": "MDKSA-2007:189",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:189"
},
{
"name" : "MDKSA-2007:230",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:230"
"name": "4227",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4227"
},
{
"name": "30168",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30168"
},
{
"name": "https://issues.rpath.com/browse/RPL-1972",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1972"
},
{
"name": "27239",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27239"
},
{
"name": "26241",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26241"
},
{
"name": "20070921 Re: [USN-515-1] t1lib vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/480244/100/100/threaded"
},
{
"name": "25079",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25079"
},
{
"name": "27718",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27718"
},
{
"name": "http://www.bugtraq.ir/adv/t1lib.txt",
"refsource": "MISC",
"url": "http://www.bugtraq.ir/adv/t1lib.txt"
},
{
"name": "GLSA-200711-34",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"name": "28345",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28345"
},
{
"name": "27599",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27599"
},
{
"name": "USN-515-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-515-1"
},
{
"name": "27439",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27439"
},
{
"name": "1018905",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018905"
},
{
"name": "FEDORA-2007-3390",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html"
},
{
"name": "26981",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26981"
},
{
"name": "RHSA-2007:1027",
@ -158,39 +228,9 @@
"url": "http://www.redhat.com/support/errata/RHSA-2007-1030.html"
},
{
"name" : "RHSA-2007:1031",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1031.html"
},
{
"name" : "SUSE-SR:2007:023",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
},
{
"name" : "USN-515-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-515-1"
},
{
"name" : "25079",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25079"
},
{
"name" : "oval:org.mitre.oval:def:10557",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10557"
},
{
"name" : "1018905",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018905"
},
{
"name" : "26241",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26241"
"name": "MDKSA-2007:230",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:230"
},
{
"name": "26992",
@ -198,59 +238,19 @@
"url": "http://secunia.com/advisories/26992"
},
{
"name" : "26981",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26981"
"name": "http://bugs.gentoo.org/show_bug.cgi?id=193437",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=193437"
},
{
"name" : "26901",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26901"
"name": "SUSE-SR:2007:023",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
},
{
"name" : "27239",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27239"
},
{
"name" : "27599",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27599"
},
{
"name" : "27297",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27297"
},
{
"name" : "27743",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27743"
},
{
"name" : "27439",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27439"
},
{
"name" : "28345",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28345"
},
{
"name" : "27718",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27718"
},
{
"name" : "30168",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30168"
},
{
"name" : "php-imagepsloadfont-bo(35620)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35620"
"name": "20080212 FLEA-2008-0006-1 tetex tetex-dvips tetex-fonts",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/487984/100/0/threaded"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20070728 phpCoupon Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/474936/100/0/threaded"
},
{
"name" : "25116",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25116"
},
{
"name": "2958",
"refsource": "SREASON",
@ -71,6 +61,16 @@
"name": "phpcoupon-payment-security-bypass(35664)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35664"
},
{
"name": "20070728 phpCoupon Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474936/100/0/threaded"
},
{
"name": "25116",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25116"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20070801 [BuHa-Security] DoS Vulnerability in Konqueror 3.5.7",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/475266/100/0/threaded"
},
{
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html",
"refsource": "MISC",
"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html"
},
{
"name": "20070801 [BuHa-Security] DoS Vulnerability in Konqueror 3.5.7",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/475266/100/0/threaded"
},
{
"name": "25170",
"refsource": "BID",

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070912 CS Guestbook Admin Name & Md5 Security Vuln",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/479194/100/0/threaded"
},
{
"name" : "25652",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25652"
},
{
"name" : "26805",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26805"
"name": "csguestbook-zero-information-disclosure(36587)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36587"
},
{
"name": "3147",
@ -73,9 +63,19 @@
"url": "http://securityreason.com/securityalert/3147"
},
{
"name" : "csguestbook-zero-information-disclosure(36587)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36587"
"name": "25652",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25652"
},
{
"name": "20070912 CS Guestbook Admin Name & Md5 Security Vuln",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/479194/100/0/threaded"
},
{
"name": "26805",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26805"
}
]
}

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "4420",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4420"
},
{
"name" : "http://www.shinnai.altervista.org/exploits/OREurGhGgAtlCT8J2jSY.html",
"refsource" : "MISC",
"url" : "http://www.shinnai.altervista.org/exploits/OREurGhGgAtlCT8J2jSY.html"
},
{
"name": "25702",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25702"
},
{
"name" : "ADV-2007-3195",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3195"
},
{
"name" : "37914",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37914"
},
{
"name": "37915",
"refsource": "OSVDB",
"url": "http://osvdb.org/37915"
},
{
"name": "37914",
"refsource": "OSVDB",
"url": "http://osvdb.org/37914"
},
{
"name": "26836",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26836"
},
{
"name": "4420",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4420"
},
{
"name": "ADV-2007-3195",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3195"
},
{
"name": "mw6technologies-qrcode-file-overwrite(36666)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36666"
},
{
"name": "http://www.shinnai.altervista.org/exploits/OREurGhGgAtlCT8J2jSY.html",
"refsource": "MISC",
"url": "http://www.shinnai.altervista.org/exploits/OREurGhGgAtlCT8J2jSY.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-6678",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20071225 Ho Ho H0-Day - ZyXEL P-330W multiple XSS and XSRF vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2007/Dec/0559.html"
},
{
"name": "27024",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "28172",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28172"
},
{
"name": "20071225 Ho Ho H0-Day - ZyXEL P-330W multiple XSS and XSRF vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Dec/0559.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1379",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=20",
"refsource" : "MISC",
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=20"
},
{
"name": "http://support.apple.com/kb/HT6296",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6296"
},
{
"name": "1030505",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030505"
},
{
"name": "APPLE-SA-2014-06-30-2",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html"
},
{
"name" : "1030505",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030505"
"name": "https://code.google.com/p/google-security-research/issues/detail?id=20",
"refsource": "MISC",
"url": "https://code.google.com/p/google-security-research/issues/detail?id=20"
},
{
"name": "59475",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5601",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#503385",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-2008",
"STATE": "PUBLIC"
},

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html"
"name": "1032529",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032529"
},
{
"name": "75092",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/75092"
},
{
"name" : "1032529",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032529"
"name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html"
},
{
"name": "1032530",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2598",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-6009",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2015-6598",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2015-6774",
"STATE": "PUBLIC"
},
@ -62,6 +62,21 @@
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=549251"
},
{
"name": "openSUSE-SU-2015:2290",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html"
},
{
"name": "GLSA-201603-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-09"
},
{
"name": "78416",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/78416"
},
{
"name": "https://codereview.chromium.org/1422753007",
"refsource": "CONFIRM",
@ -72,26 +87,11 @@
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3415"
},
{
"name" : "GLSA-201603-09",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-09"
},
{
"name" : "openSUSE-SU-2015:2290",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html"
},
{
"name": "openSUSE-SU-2015:2291",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html"
},
{
"name" : "78416",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/78416"
},
{
"name": "1034298",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-6981",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT205370",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205370"
},
{
"name": "APPLE-SA-2015-10-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
},
{
"name": "https://support.apple.com/HT205370",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205370"
},
{
"name": "1033929",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0573",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0577",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-0813",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-02-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-02-01.html"
},
{
"name": "https://android.googlesource.com/platform%2Fframeworks%2Fbase/+/16a76dadcc23a13223e9c2216dad1fe5cad7d6e1",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform%2Fframeworks%2Fbase/+/16a76dadcc23a13223e9c2216dad1fe5cad7d6e1"
},
{
"name": "http://source.android.com/security/bulletin/2016-02-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-02-01.html"
}
]
}

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03",
"refsource" : "MISC",
"url" : "https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03"
},
{
"name": "https://nodesecurity.io/advisories/112",
"refsource": "MISC",
"url": "https://nodesecurity.io/advisories/112"
},
{
"name": "https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03",
"refsource": "MISC",
"url": "https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4119",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4173",
"STATE": "PUBLIC"
},
@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
},
{
"name" : "MS16-093",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093"
},
{
"name" : "RHSA-2016:1423",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
},
{
"name": "SUSE-SU-2016:1826",
"refsource": "SUSE",
@ -82,6 +67,21 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91719"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
},
{
"name": "RHSA-2016:1423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
},
{
"name": "MS16-093",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093"
},
{
"name": "1036280",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2016-4301",
"STATE": "PUBLIC"
},
@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "http://blog.talosintel.com/2016/06/the-poisoned-archives.html",
"refsource" : "MISC",
"url" : "http://blog.talosintel.com/2016/06/the-poisoned-archives.html"
},
{
"name" : "http://www.talosintel.com/reports/TALOS-2016-0153/",
"refsource" : "MISC",
"url" : "http://www.talosintel.com/reports/TALOS-2016-0153/"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1348441",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1348441"
},
{
"name" : "https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77",
"refsource" : "CONFIRM",
"url" : "https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77"
"name": "91328",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91328"
},
{
"name": "https://github.com/libarchive/libarchive/issues/715",
"refsource": "CONFIRM",
"url": "https://github.com/libarchive/libarchive/issues/715"
},
{
"name": "http://blog.talosintel.com/2016/06/the-poisoned-archives.html",
"refsource": "MISC",
"url": "http://blog.talosintel.com/2016/06/the-poisoned-archives.html"
},
{
"name": "https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77",
"refsource": "CONFIRM",
"url": "https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77"
},
{
"name": "http://www.talosintel.com/reports/TALOS-2016-0153/",
"refsource": "MISC",
"url": "http://www.talosintel.com/reports/TALOS-2016-0153/"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1348441",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348441"
},
{
"name": "GLSA-201701-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-03"
},
{
"name" : "91328",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91328"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4354",
"STATE": "PUBLIC"
},
@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "USN-2982-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2982-1"
},
{
"name": "[oss-security] 20160429 CVE request: three issues in libksba",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/29/5"
},
{
"name" : "[oss-security] 20160429 Re: CVE request: three issues in libksba",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/04/29/8"
},
{
"name": "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=aea7b6032865740478ca4b706850a5217f1c3887",
"refsource": "CONFIRM",
"url": "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=aea7b6032865740478ca4b706850a5217f1c3887"
},
{
"name": "[oss-security] 20160429 Re: CVE request: three issues in libksba",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/29/8"
},
{
"name": "GLSA-201604-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201604-04"
},
{
"name" : "USN-2982-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2982-1"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://xenbits.xen.org/xsa/advisory-192.html",
"refsource" : "CONFIRM",
"url" : "http://xenbits.xen.org/xsa/advisory-192.html"
},
{
"name" : "https://support.citrix.com/article/CTX218775",
"refsource" : "CONFIRM",
"url" : "https://support.citrix.com/article/CTX218775"
"name": "94470",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94470"
},
{
"name": "GLSA-201612-56",
@ -68,14 +63,19 @@
"url": "https://security.gentoo.org/glsa/201612-56"
},
{
"name" : "94470",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94470"
"name": "http://xenbits.xen.org/xsa/advisory-192.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-192.html"
},
{
"name": "1037341",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037341"
},
{
"name": "https://support.citrix.com/article/CTX218775",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX218775"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://marlam.de/msmtp/news/",
"refsource" : "CONFIRM",
"url" : "https://marlam.de/msmtp/news/"
},
{
"name": "https://marlam.de/mpop/news/mpop-1-4-3/",
"refsource": "CONFIRM",
"url": "https://marlam.de/mpop/news/mpop-1-4-3/"
},
{
"name": "https://marlam.de/msmtp/news/",
"refsource": "CONFIRM",
"url": "https://marlam.de/msmtp/news/"
},
{
"name": "https://gitlab.marlam.de/marlam/mpop/commit/b51a6c6b8b83bf0913cc52fa2ff64307e987a5b8",
"refsource": "MISC",