mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
84d6d4bb00
commit
a58a43035f
@ -58,14 +58,9 @@
|
||||
"url": "https://www.exploit-db.com/exploits/3259"
|
||||
},
|
||||
{
|
||||
"name" : "20070202 phpBB++ Build 100 (phpbb_root_path) Remote File Include Exploit",
|
||||
"refsource" : "VIM",
|
||||
"url" : "http://www.attrition.org/pipermail/vim/2007-February/001279.html"
|
||||
},
|
||||
{
|
||||
"name" : "22376",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22376"
|
||||
"name": "33092",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33092"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0472",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0472"
|
||||
},
|
||||
{
|
||||
"name" : "33092",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/33092"
|
||||
"name": "20070202 phpBB++ Build 100 (phpbb_root_path) Remote File Include Exploit",
|
||||
"refsource": "VIM",
|
||||
"url": "http://www.attrition.org/pipermail/vim/2007-February/001279.html"
|
||||
},
|
||||
{
|
||||
"name": "phpbbplusplus-functions-file-include(32159)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32159"
|
||||
},
|
||||
{
|
||||
"name": "24034",
|
||||
@ -83,9 +83,9 @@
|
||||
"url": "http://secunia.com/advisories/24034"
|
||||
},
|
||||
{
|
||||
"name" : "phpbbplusplus-functions-file-include(32159)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32159"
|
||||
"name": "22376",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22376"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,36 +57,36 @@
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2007/Feb/0196.html"
|
||||
},
|
||||
{
|
||||
"name" : "20070209 Re: [WEB SECURITY] Plain Old Webserver - The coolest firefox extension",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2007/Feb/0210.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://addons.mozilla.org/firefox/3002/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://addons.mozilla.org/firefox/3002/"
|
||||
},
|
||||
{
|
||||
"name": "22502",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22502"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-0558",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0558"
|
||||
},
|
||||
{
|
||||
"name": "33174",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33174"
|
||||
},
|
||||
{
|
||||
"name": "https://addons.mozilla.org/firefox/3002/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://addons.mozilla.org/firefox/3002/"
|
||||
},
|
||||
{
|
||||
"name": "20070209 Re: [WEB SECURITY] Plain Old Webserver - The coolest firefox extension",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2007/Feb/0210.html"
|
||||
},
|
||||
{
|
||||
"name": "24127",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24127"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0558",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0558"
|
||||
},
|
||||
{
|
||||
"name": "pow-httprequest-directory-traversal(32467)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2007-3383",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070721 CVE-2007-3383: XSS in Tomcat send mail example",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/474413/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070721 CVE-2007-3383: XSS in Tomcat send mail example",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2007/Jul/0448.html"
|
||||
"name": "39000",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/39000"
|
||||
},
|
||||
{
|
||||
"name": "http://tomcat.apache.org/security-4.html",
|
||||
@ -72,16 +67,36 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT2163"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1981",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
|
||||
},
|
||||
{
|
||||
"name": "20070721 CVE-2007-3383: XSS in Tomcat send mail example",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/474413/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2008-06-30",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "30802",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30802"
|
||||
},
|
||||
{
|
||||
"name": "VU#862600",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/862600"
|
||||
},
|
||||
{
|
||||
"name": "2918",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2918"
|
||||
},
|
||||
{
|
||||
"name": "24999",
|
||||
"refsource": "BID",
|
||||
@ -93,24 +108,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2618"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-1981",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/1981/references"
|
||||
},
|
||||
{
|
||||
"name" : "39000",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/39000"
|
||||
},
|
||||
{
|
||||
"name" : "30802",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30802"
|
||||
},
|
||||
{
|
||||
"name" : "2918",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/2918"
|
||||
"name": "20070721 CVE-2007-3383: XSS in Tomcat send mail example",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2007/Jul/0448.html"
|
||||
},
|
||||
{
|
||||
"name": "tomcat-sendmail-example-xss(35536)",
|
||||
|
@ -52,55 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://lostmon.blogspot.com/2007/07/netflow-analizer-5-opmanager-7-multiple.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://lostmon.blogspot.com/2007/07/netflow-analizer-5-opmanager-7-multiple.html"
|
||||
},
|
||||
{
|
||||
"name": "24767",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24767"
|
||||
},
|
||||
{
|
||||
"name" : "38945",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/38945"
|
||||
},
|
||||
{
|
||||
"name" : "38946",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/38946"
|
||||
},
|
||||
{
|
||||
"name" : "38947",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/38947"
|
||||
},
|
||||
{
|
||||
"name" : "38948",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/38948"
|
||||
},
|
||||
{
|
||||
"name": "38949",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38949"
|
||||
},
|
||||
{
|
||||
"name": "37825",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37825"
|
||||
},
|
||||
{
|
||||
"name": "http://lostmon.blogspot.com/2007/07/netflow-analizer-5-opmanager-7-multiple.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://lostmon.blogspot.com/2007/07/netflow-analizer-5-opmanager-7-multiple.html"
|
||||
},
|
||||
{
|
||||
"name": "38947",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38947"
|
||||
},
|
||||
{
|
||||
"name": "37821",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37821"
|
||||
},
|
||||
{
|
||||
"name" : "37822",
|
||||
"name": "38946",
|
||||
"refsource": "OSVDB",
|
||||
"url" : "http://osvdb.org/37822"
|
||||
},
|
||||
{
|
||||
"name" : "37823",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37823"
|
||||
"url": "http://osvdb.org/38946"
|
||||
},
|
||||
{
|
||||
"name": "37824",
|
||||
@ -108,14 +93,29 @@
|
||||
"url": "http://osvdb.org/37824"
|
||||
},
|
||||
{
|
||||
"name" : "37825",
|
||||
"name": "37822",
|
||||
"refsource": "OSVDB",
|
||||
"url" : "http://osvdb.org/37825"
|
||||
"url": "http://osvdb.org/37822"
|
||||
},
|
||||
{
|
||||
"name": "38945",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38945"
|
||||
},
|
||||
{
|
||||
"name": "38948",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38948"
|
||||
},
|
||||
{
|
||||
"name": "netflowanalyzer-opmanager-multiple-xss(35263)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35263"
|
||||
},
|
||||
{
|
||||
"name": "37823",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37823"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,59 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070921 Re: [Full-disclosure] [USN-515-1] t1lib vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/480239/100/100/threaded"
|
||||
"name": "GLSA-200710-12",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200710-12.xml"
|
||||
},
|
||||
{
|
||||
"name" : "20070921 Re: [USN-515-1] t1lib vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/480244/100/100/threaded"
|
||||
"name": "27743",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27743"
|
||||
},
|
||||
{
|
||||
"name" : "20080105 rPSA-2008-0007-1 tetex tetex-afm tetex-dvips tetex-fonts tetex-latex tetex-xdvi",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/485823/100/0/threaded"
|
||||
"name": "26901",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26901"
|
||||
},
|
||||
{
|
||||
"name" : "20080212 FLEA-2008-0006-1 tetex tetex-dvips tetex-fonts",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/487984/100/0/threaded"
|
||||
"name": "oval:org.mitre.oval:def:10557",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10557"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.bugtraq.ir/adv/t1lib.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.bugtraq.ir/adv/t1lib.txt"
|
||||
},
|
||||
{
|
||||
"name" : "4227",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4227"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=303021",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=303021"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=193437",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=193437"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.rpath.com/browse/RPL-1972",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.rpath.com/browse/RPL-1972"
|
||||
},
|
||||
{
|
||||
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0007",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0007"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1390",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2007/dsa-1390"
|
||||
"name": "php-imagepsloadfont-bo(35620)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35620"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2007-2343",
|
||||
@ -113,39 +83,139 @@
|
||||
"url": "http://fedoranews.org/updates/FEDORA-2007-234.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2007-3390",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html"
|
||||
"name": "20070921 Re: [Full-disclosure] [USN-515-1] t1lib vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/480239/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2007-750",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html"
|
||||
"name": "DSA-1390",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2007/dsa-1390"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200710-12",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200710-12.xml"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200711-34",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200711-34.xml"
|
||||
"name": "27297",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27297"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200805-13",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
|
||||
},
|
||||
{
|
||||
"name": "20080105 rPSA-2008-0007-1 tetex tetex-afm tetex-dvips tetex-fonts tetex-latex tetex-xdvi",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/485823/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0007",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0007"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=303021",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=303021"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2007-750",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:1031",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-1031.html"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:189",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:189"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:230",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:230"
|
||||
"name": "4227",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4227"
|
||||
},
|
||||
{
|
||||
"name": "30168",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30168"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-1972",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-1972"
|
||||
},
|
||||
{
|
||||
"name": "27239",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27239"
|
||||
},
|
||||
{
|
||||
"name": "26241",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26241"
|
||||
},
|
||||
{
|
||||
"name": "20070921 Re: [USN-515-1] t1lib vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/480244/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "25079",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25079"
|
||||
},
|
||||
{
|
||||
"name": "27718",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27718"
|
||||
},
|
||||
{
|
||||
"name": "http://www.bugtraq.ir/adv/t1lib.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.bugtraq.ir/adv/t1lib.txt"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200711-34",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
|
||||
},
|
||||
{
|
||||
"name": "28345",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28345"
|
||||
},
|
||||
{
|
||||
"name": "27599",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27599"
|
||||
},
|
||||
{
|
||||
"name": "USN-515-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-515-1"
|
||||
},
|
||||
{
|
||||
"name": "27439",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27439"
|
||||
},
|
||||
{
|
||||
"name": "1018905",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018905"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2007-3390",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html"
|
||||
},
|
||||
{
|
||||
"name": "26981",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26981"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:1027",
|
||||
@ -158,39 +228,9 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-1030.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:1031",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1031.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2007:023",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-515-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-515-1"
|
||||
},
|
||||
{
|
||||
"name" : "25079",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25079"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10557",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10557"
|
||||
},
|
||||
{
|
||||
"name" : "1018905",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018905"
|
||||
},
|
||||
{
|
||||
"name" : "26241",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26241"
|
||||
"name": "MDKSA-2007:230",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:230"
|
||||
},
|
||||
{
|
||||
"name": "26992",
|
||||
@ -198,59 +238,19 @@
|
||||
"url": "http://secunia.com/advisories/26992"
|
||||
},
|
||||
{
|
||||
"name" : "26981",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26981"
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=193437",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=193437"
|
||||
},
|
||||
{
|
||||
"name" : "26901",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26901"
|
||||
"name": "SUSE-SR:2007:023",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
|
||||
},
|
||||
{
|
||||
"name" : "27239",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27239"
|
||||
},
|
||||
{
|
||||
"name" : "27599",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27599"
|
||||
},
|
||||
{
|
||||
"name" : "27297",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27297"
|
||||
},
|
||||
{
|
||||
"name" : "27743",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27743"
|
||||
},
|
||||
{
|
||||
"name" : "27439",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27439"
|
||||
},
|
||||
{
|
||||
"name" : "28345",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28345"
|
||||
},
|
||||
{
|
||||
"name" : "27718",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27718"
|
||||
},
|
||||
{
|
||||
"name" : "30168",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30168"
|
||||
},
|
||||
{
|
||||
"name" : "php-imagepsloadfont-bo(35620)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35620"
|
||||
"name": "20080212 FLEA-2008-0006-1 tetex tetex-dvips tetex-fonts",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/487984/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070728 phpCoupon Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/474936/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "25116",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25116"
|
||||
},
|
||||
{
|
||||
"name": "2958",
|
||||
"refsource": "SREASON",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "phpcoupon-payment-security-bypass(35664)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35664"
|
||||
},
|
||||
{
|
||||
"name": "20070728 phpCoupon Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/474936/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "25116",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25116"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070801 [BuHa-Security] DoS Vulnerability in Konqueror 3.5.7",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/475266/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html"
|
||||
},
|
||||
{
|
||||
"name": "20070801 [BuHa-Security] DoS Vulnerability in Konqueror 3.5.7",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/475266/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "25170",
|
||||
"refsource": "BID",
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070912 CS Guestbook Admin Name & Md5 Security Vuln",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/479194/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "25652",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25652"
|
||||
},
|
||||
{
|
||||
"name" : "26805",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26805"
|
||||
"name": "csguestbook-zero-information-disclosure(36587)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36587"
|
||||
},
|
||||
{
|
||||
"name": "3147",
|
||||
@ -73,9 +63,19 @@
|
||||
"url": "http://securityreason.com/securityalert/3147"
|
||||
},
|
||||
{
|
||||
"name" : "csguestbook-zero-information-disclosure(36587)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36587"
|
||||
"name": "25652",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25652"
|
||||
},
|
||||
{
|
||||
"name": "20070912 CS Guestbook Admin Name & Md5 Security Vuln",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/479194/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "26805",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26805"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4420",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4420"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.shinnai.altervista.org/exploits/OREurGhGgAtlCT8J2jSY.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.shinnai.altervista.org/exploits/OREurGhGgAtlCT8J2jSY.html"
|
||||
},
|
||||
{
|
||||
"name": "25702",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25702"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3195",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3195"
|
||||
},
|
||||
{
|
||||
"name" : "37914",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37914"
|
||||
},
|
||||
{
|
||||
"name": "37915",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37915"
|
||||
},
|
||||
{
|
||||
"name": "37914",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37914"
|
||||
},
|
||||
{
|
||||
"name": "26836",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26836"
|
||||
},
|
||||
{
|
||||
"name": "4420",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4420"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3195",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3195"
|
||||
},
|
||||
{
|
||||
"name": "mw6technologies-qrcode-file-overwrite(36666)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36666"
|
||||
},
|
||||
{
|
||||
"name": "http://www.shinnai.altervista.org/exploits/OREurGhGgAtlCT8J2jSY.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.shinnai.altervista.org/exploits/OREurGhGgAtlCT8J2jSY.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2007-6678",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071225 Ho Ho H0-Day - ZyXEL P-330W multiple XSS and XSRF vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2007/Dec/0559.html"
|
||||
},
|
||||
{
|
||||
"name": "27024",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "28172",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28172"
|
||||
},
|
||||
{
|
||||
"name": "20071225 Ho Ho H0-Day - ZyXEL P-330W multiple XSS and XSRF vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2007/Dec/0559.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2014-1379",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=20",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=20"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT6296",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT6296"
|
||||
},
|
||||
{
|
||||
"name": "1030505",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030505"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-06-30-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html"
|
||||
},
|
||||
{
|
||||
"name" : "1030505",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030505"
|
||||
"name": "https://code.google.com/p/google-security-research/issues/detail?id=20",
|
||||
"refsource": "MISC",
|
||||
"url": "https://code.google.com/p/google-security-research/issues/detail?id=20"
|
||||
},
|
||||
{
|
||||
"name": "59475",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-5601",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#503385",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2015-2008",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2015-0004.html"
|
||||
"name": "1032529",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032529"
|
||||
},
|
||||
{
|
||||
"name": "75092",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/75092"
|
||||
},
|
||||
{
|
||||
"name" : "1032529",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032529"
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html"
|
||||
},
|
||||
{
|
||||
"name": "1032530",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2015-2598",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2015-6009",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2015-6598",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2015-6774",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,6 +62,21 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=549251"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:2290",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201603-09",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201603-09"
|
||||
},
|
||||
{
|
||||
"name": "78416",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/78416"
|
||||
},
|
||||
{
|
||||
"name": "https://codereview.chromium.org/1422753007",
|
||||
"refsource": "CONFIRM",
|
||||
@ -72,26 +87,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3415"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201603-09",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201603-09"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:2290",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:2291",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name" : "78416",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/78416"
|
||||
},
|
||||
{
|
||||
"name": "1034298",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-6981",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205370",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205370"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-10-21-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205370",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205370"
|
||||
},
|
||||
{
|
||||
"name": "1033929",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-0573",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-0577",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-0813",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://source.android.com/security/bulletin/2016-02-01.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://source.android.com/security/bulletin/2016-02-01.html"
|
||||
},
|
||||
{
|
||||
"name": "https://android.googlesource.com/platform%2Fframeworks%2Fbase/+/16a76dadcc23a13223e9c2216dad1fe5cad7d6e1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform%2Fframeworks%2Fbase/+/16a76dadcc23a13223e9c2216dad1fe5cad7d6e1"
|
||||
},
|
||||
{
|
||||
"name": "http://source.android.com/security/bulletin/2016-02-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://source.android.com/security/bulletin/2016-02-01.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03"
|
||||
},
|
||||
{
|
||||
"name": "https://nodesecurity.io/advisories/112",
|
||||
"refsource": "MISC",
|
||||
"url": "https://nodesecurity.io/advisories/112"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-4119",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-4173",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
|
||||
},
|
||||
{
|
||||
"name" : "MS16-093",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:1423",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1826",
|
||||
"refsource": "SUSE",
|
||||
@ -82,6 +67,21 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91719"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:1423",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
|
||||
},
|
||||
{
|
||||
"name": "MS16-093",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093"
|
||||
},
|
||||
{
|
||||
"name": "1036280",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2016-4301",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://blog.talosintel.com/2016/06/the-poisoned-archives.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blog.talosintel.com/2016/06/the-poisoned-archives.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.talosintel.com/reports/TALOS-2016-0153/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.talosintel.com/reports/TALOS-2016-0153/"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1348441",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1348441"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77"
|
||||
"name": "91328",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91328"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/libarchive/libarchive/issues/715",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/libarchive/libarchive/issues/715"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.talosintel.com/2016/06/the-poisoned-archives.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.talosintel.com/2016/06/the-poisoned-archives.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77"
|
||||
},
|
||||
{
|
||||
"name": "http://www.talosintel.com/reports/TALOS-2016-0153/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.talosintel.com/reports/TALOS-2016-0153/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1348441",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348441"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-03"
|
||||
},
|
||||
{
|
||||
"name" : "91328",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/91328"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2016-4354",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "USN-2982-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2982-1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160429 CVE request: three issues in libksba",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/04/29/5"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20160429 Re: CVE request: three issues in libksba",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/04/29/8"
|
||||
},
|
||||
{
|
||||
"name": "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=aea7b6032865740478ca4b706850a5217f1c3887",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=aea7b6032865740478ca4b706850a5217f1c3887"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160429 Re: CVE request: three issues in libksba",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/04/29/8"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201604-04",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201604-04"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2982-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2982-1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://xenbits.xen.org/xsa/advisory-192.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://xenbits.xen.org/xsa/advisory-192.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.citrix.com/article/CTX218775",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.citrix.com/article/CTX218775"
|
||||
"name": "94470",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94470"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201612-56",
|
||||
@ -68,14 +63,19 @@
|
||||
"url": "https://security.gentoo.org/glsa/201612-56"
|
||||
},
|
||||
{
|
||||
"name" : "94470",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94470"
|
||||
"name": "http://xenbits.xen.org/xsa/advisory-192.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://xenbits.xen.org/xsa/advisory-192.html"
|
||||
},
|
||||
{
|
||||
"name": "1037341",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037341"
|
||||
},
|
||||
{
|
||||
"name": "https://support.citrix.com/article/CTX218775",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.citrix.com/article/CTX218775"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://marlam.de/msmtp/news/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://marlam.de/msmtp/news/"
|
||||
},
|
||||
{
|
||||
"name": "https://marlam.de/mpop/news/mpop-1-4-3/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://marlam.de/mpop/news/mpop-1-4-3/"
|
||||
},
|
||||
{
|
||||
"name": "https://marlam.de/msmtp/news/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://marlam.de/msmtp/news/"
|
||||
},
|
||||
{
|
||||
"name": "https://gitlab.marlam.de/marlam/mpop/commit/b51a6c6b8b83bf0913cc52fa2ff64307e987a5b8",
|
||||
"refsource": "MISC",
|
||||
|
Loading…
x
Reference in New Issue
Block a user