"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 21:30:43 +00:00
parent 116d6eb6ff
commit a8f6fbe803
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
100 changed files with 6397 additions and 6397 deletions

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070101 BattleBlog Database Download Vulnerability", "name": "battleblog-blankmaster-info-disclosure(31224)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/455614/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31224"
},
{
"name": "2097",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2097"
}, },
{ {
"name": "http://www.aria-security.com/forum/showthread.php?t=76", "name": "http://www.aria-security.com/forum/showthread.php?t=76",
@ -68,14 +73,9 @@
"url": "http://osvdb.org/33360" "url": "http://osvdb.org/33360"
}, },
{ {
"name" : "2097", "name": "20070101 BattleBlog Database Download Vulnerability",
"refsource" : "SREASON", "refsource": "BUGTRAQ",
"url" : "http://securityreason.com/securityalert/2097" "url": "http://www.securityfocus.com/archive/1/455614/100/0/threaded"
},
{
"name" : "battleblog-blankmaster-info-disclosure(31224)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31224"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "http://projects.info-pull.com/moab/MOAB-18-01-2007.html" "url": "http://projects.info-pull.com/moab/MOAB-18-01-2007.html"
}, },
{ {
"name" : "32690", "name": "rumpus-path-privilege-escalation(31597)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/32690" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31597"
}, },
{ {
"name": "23842", "name": "23842",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/23842" "url": "http://secunia.com/advisories/23842"
}, },
{ {
"name" : "rumpus-path-privilege-escalation(31597)", "name": "32690",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31597" "url": "http://osvdb.org/32690"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070118 [x0n3-h4ck] sabros.us 1.7 XSS Exploit", "name": "31602",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/archive/1/457331/100/0/threaded" "url": "http://osvdb.org/31602"
},
{
"name" : "20070118 [x0n3-h4ck] sabros.us 1.7 XSS Exploit",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051868.html"
}, },
{ {
"name": "22115", "name": "22115",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/22115" "url": "http://www.securityfocus.com/bid/22115"
}, },
{ {
"name" : "31602", "name": "2170",
"refsource" : "OSVDB", "refsource": "SREASON",
"url" : "http://osvdb.org/31602" "url": "http://securityreason.com/securityalert/2170"
},
{
"name": "20070118 [x0n3-h4ck] sabros.us 1.7 XSS Exploit",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051868.html"
}, },
{ {
"name": "23824", "name": "23824",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/23824" "url": "http://secunia.com/advisories/23824"
}, },
{ {
"name" : "2170", "name": "20070118 [x0n3-h4ck] sabros.us 1.7 XSS Exploit",
"refsource" : "SREASON", "refsource": "BUGTRAQ",
"url" : "http://securityreason.com/securityalert/2170" "url": "http://www.securityfocus.com/archive/1/457331/100/0/threaded"
}, },
{ {
"name": "sabros-index-xss(31600)", "name": "sabros-index-xss(31600)",

View File

@ -52,21 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070119 Help project files (.HPJ) buffer overflow vulnerability in Microsoft Help Workshop",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/457436/100/0/threaded"
},
{
"name" : "http://www.anspi.pl/~porkythepig/visualization/hpj-x01.cpp",
"refsource" : "MISC",
"url" : "http://www.anspi.pl/~porkythepig/visualization/hpj-x01.cpp"
},
{ {
"name": "22135", "name": "22135",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22135" "url": "http://www.securityfocus.com/bid/22135"
}, },
{
"name": "2177",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2177"
},
{ {
"name": "31899", "name": "31899",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -78,9 +73,14 @@
"url": "http://secunia.com/advisories/23862" "url": "http://secunia.com/advisories/23862"
}, },
{ {
"name" : "2177", "name": "http://www.anspi.pl/~porkythepig/visualization/hpj-x01.cpp",
"refsource" : "SREASON", "refsource": "MISC",
"url" : "http://securityreason.com/securityalert/2177" "url": "http://www.anspi.pl/~porkythepig/visualization/hpj-x01.cpp"
},
{
"name": "20070119 Help project files (.HPJ) buffer overflow vulnerability in Microsoft Help Workshop",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/457436/100/0/threaded"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=481131&group_id=98260",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=481131&group_id=98260"
},
{ {
"name": "ADV-2007-0454", "name": "ADV-2007-0454",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -67,6 +62,11 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/33650" "url": "http://osvdb.org/33650"
}, },
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=481131&group_id=98260",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=481131&group_id=98260"
},
{ {
"name": "flip-triggererrortext-xss(31900)", "name": "flip-triggererrortext-xss(31900)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070201 Comodo Multiple insufficient argument validation of hooked SSDT function Vulnerability", "name": "comodofirewallpro-cmdmon-dos(32059)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/458773/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32059"
},
{
"name" : "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php",
"refsource" : "MISC",
"url" : "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php"
}, },
{ {
"name": "22357", "name": "22357",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22357" "url": "http://www.securityfocus.com/bid/22357"
}, },
{
"name": "20070201 Comodo Multiple insufficient argument validation of hooked SSDT function Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/458773/100/0/threaded"
},
{ {
"name": "1017580", "name": "1017580",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017580" "url": "http://securitytracker.com/id?1017580"
}, },
{ {
"name" : "comodofirewallpro-cmdmon-dos(32059)", "name": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32059" "url": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php"
} }
] ]
} }

View File

@ -58,34 +58,34 @@
"url": "http://www.securityfocus.com/archive/1/459178/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/459178/100/0/threaded"
}, },
{ {
"name" : "http://www.adobe.com/support/security/bulletins/apsb07-04.html", "name": "32120",
"refsource" : "CONFIRM", "refsource": "OSVDB",
"url" : "http://www.adobe.com/support/security/bulletins/apsb07-04.html" "url": "http://osvdb.org/32120"
}, },
{ {
"name": "22401", "name": "22401",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22401" "url": "http://www.securityfocus.com/bid/22401"
}, },
{
"name": "24115",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24115"
},
{ {
"name": "ADV-2007-0593", "name": "ADV-2007-0593",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0593" "url": "http://www.vupen.com/english/advisories/2007/0593"
}, },
{
"name" : "32120",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32120"
},
{ {
"name": "1017645", "name": "1017645",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017645" "url": "http://www.securitytracker.com/id?1017645"
}, },
{ {
"name" : "24115", "name": "http://www.adobe.com/support/security/bulletins/apsb07-04.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/24115" "url": "http://www.adobe.com/support/security/bulletins/apsb07-04.html"
} }
] ]
} }

View File

@ -52,20 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070209 mcRefer SQL injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/459649/100/0/threaded"
},
{ {
"name": "20070211 Re: mcRefer SQL injection", "name": "20070211 Re: mcRefer SQL injection",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459796/100/200/threaded" "url": "http://www.securityfocus.com/archive/1/459796/100/200/threaded"
}, },
{ {
"name" : "http://forums.avenir-geopolitique.net/viewtopic.php?t=2642", "name": "2235",
"refsource" : "MISC", "refsource": "SREASON",
"url" : "http://forums.avenir-geopolitique.net/viewtopic.php?t=2642" "url": "http://securityreason.com/securityalert/2235"
}, },
{ {
"name": "22507", "name": "22507",
@ -78,9 +73,14 @@
"url": "http://osvdb.org/33675" "url": "http://osvdb.org/33675"
}, },
{ {
"name" : "2235", "name": "http://forums.avenir-geopolitique.net/viewtopic.php?t=2642",
"refsource" : "SREASON", "refsource": "MISC",
"url" : "http://securityreason.com/securityalert/2235" "url": "http://forums.avenir-geopolitique.net/viewtopic.php?t=2642"
},
{
"name": "20070209 mcRefer SQL injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459649/100/0/threaded"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "102828", "name": "33889",
"refsource" : "SUNALERT", "refsource": "OSVDB",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102828-1" "url": "http://osvdb.org/33889"
}, },
{ {
"name": "22859", "name": "22859",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22859" "url": "http://www.securityfocus.com/bid/22859"
}, },
{
"name": "24447",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24447"
},
{
"name": "102828",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102828-1"
},
{ {
"name": "ADV-2007-0869", "name": "ADV-2007-0869",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0869" "url": "http://www.vupen.com/english/advisories/2007/0869"
}, },
{
"name" : "33889",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33889"
},
{ {
"name": "1017738", "name": "1017738",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017738" "url": "http://www.securitytracker.com/id?1017738"
},
{
"name" : "24447",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24447"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[pennmush-announce] 20070311 PennMUSH 1.8.2p3 and 1.8.3p1 Released", "name": "24504",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://www.pennmush.org/archives/pennmush-announce/2007/000137.html" "url": "http://secunia.com/advisories/24504"
},
{
"name" : "22935",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22935"
}, },
{ {
"name": "ADV-2007-0921", "name": "ADV-2007-0921",
@ -73,9 +68,14 @@
"url": "http://osvdb.org/34005" "url": "http://osvdb.org/34005"
}, },
{ {
"name" : "24504", "name": "22935",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/24504" "url": "http://www.securityfocus.com/bid/22935"
},
{
"name": "[pennmush-announce] 20070311 PennMUSH 1.8.2p3 and 1.8.3p1 Released",
"refsource": "MLIST",
"url": "http://www.pennmush.org/archives/pennmush-announce/2007/000137.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "name": "multiple-vendor-zoo-dos(34080)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/467646/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
}, },
{ {
"name": "23823", "name": "23823",
@ -63,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/23823" "url": "http://www.securityfocus.com/bid/23823"
}, },
{ {
"name" : "35794", "name": "25137",
"refsource" : "OSVDB", "refsource": "SECUNIA",
"url" : "http://osvdb.org/35794" "url": "http://secunia.com/advisories/25137"
},
{
"name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
}, },
{ {
"name": "ADV-2007-1701", "name": "ADV-2007-1701",
@ -73,19 +78,14 @@
"url": "http://www.vupen.com/english/advisories/2007/1701" "url": "http://www.vupen.com/english/advisories/2007/1701"
}, },
{ {
"name" : "25137", "name": "35794",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/25137" "url": "http://osvdb.org/35794"
}, },
{ {
"name": "2680", "name": "2680",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2680" "url": "http://securityreason.com/securityalert/2680"
},
{
"name" : "multiple-vendor-zoo-dos(34080)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "3552", "name": "philex-header-file-include(33179)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/3552" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33179"
}, },
{ {
"name": "23111", "name": "23111",
@ -67,15 +67,15 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1099" "url": "http://www.vupen.com/english/advisories/2007/1099"
}, },
{
"name": "3552",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3552"
},
{ {
"name": "37220", "name": "37220",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37220" "url": "http://osvdb.org/37220"
},
{
"name" : "philex-header-file-include(33179)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33179"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-1753", "ID": "CVE-2007-1753",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070407 [MajorSecurity Advisory #42]webblizzard CMS - Cross Site Scripting and Session fixation Issues", "name": "2557",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/464959/100/0/threaded" "url": "http://securityreason.com/securityalert/2557"
}, },
{ {
"name": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls42", "name": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls42",
@ -63,9 +63,9 @@
"url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls42" "url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls42"
}, },
{ {
"name" : "2557", "name": "20070407 [MajorSecurity Advisory #42]webblizzard CMS - Cross Site Scripting and Session fixation Issues",
"refsource" : "SREASON", "refsource": "BUGTRAQ",
"url" : "http://securityreason.com/securityalert/2557" "url": "http://www.securityfocus.com/archive/1/464959/100/0/threaded"
}, },
{ {
"name": "webblizzardcms-cookie-session-hijack(33499)", "name": "webblizzardcms-cookie-session-hijack(33499)",

View File

@ -52,90 +52,90 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070821 Trend Micro ServerProtect Multiple Buffer Overflow Vulnerabilities",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=587"
},
{
"name" : "20070907 ZDI-07-050: Trend Micro ServerProtect RPCFN_SetComputerName() Stack Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/478866/100/0/threaded"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-07-050.html",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-07-050.html"
},
{
"name" : "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt",
"refsource" : "CONFIRM",
"url" : "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt"
},
{
"name" : "TA07-235A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-235A.html"
},
{ {
"name": "VU#109056", "name": "VU#109056",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/109056" "url": "http://www.kb.cert.org/vuls/id/109056"
}, },
{ {
"name" : "VU#204448", "name": "20070821 Trend Micro ServerProtect Multiple Buffer Overflow Vulnerabilities",
"refsource" : "CERT-VN", "refsource": "IDEFENSE",
"url" : "http://www.kb.cert.org/vuls/id/204448" "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=587"
},
{
"name" : "25395",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25395"
},
{
"name" : "ADV-2007-2934",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2934"
},
{
"name" : "1018594",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1018594"
},
{
"name" : "26523",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26523"
},
{
"name" : "3052",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3052"
},
{
"name" : "serverprotect-agent-rpcfncopyausrc-bo(36178)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36178"
},
{
"name" : "serverprotect-eng50dll-bo(36175)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36175"
},
{
"name" : "serverprotect-notification-bo(36176)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36176"
}, },
{ {
"name": "serverprotect-stcommondll-bo(36174)", "name": "serverprotect-stcommondll-bo(36174)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36174" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36174"
}, },
{
"name": "25395",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25395"
},
{
"name": "serverprotect-notification-bo(36176)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36176"
},
{
"name": "serverprotect-agent-rpcfncopyausrc-bo(36178)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36178"
},
{
"name": "20070907 ZDI-07-050: Trend Micro ServerProtect RPCFN_SetComputerName() Stack Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478866/100/0/threaded"
},
{
"name": "VU#204448",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/204448"
},
{
"name": "serverprotect-eng50dll-bo(36175)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36175"
},
{
"name": "TA07-235A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-235A.html"
},
{
"name": "ADV-2007-2934",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2934"
},
{
"name": "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt",
"refsource": "CONFIRM",
"url": "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-050.html",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-050.html"
},
{
"name": "1018594",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018594"
},
{
"name": "3052",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3052"
},
{ {
"name": "serverprotect-strpcsrv-bo(36172)", "name": "serverprotect-strpcsrv-bo(36172)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36172" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36172"
},
{
"name": "26523",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26523"
} }
] ]
} }

View File

@ -52,6 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "26324",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26324"
},
{
"name": "contentdm-search-xss(35809)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35809"
},
{
"name": "36437",
"refsource": "OSVDB",
"url": "http://osvdb.org/36437"
},
{
"name": "2980",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2980"
},
{ {
"name": "20070804 ContentDM Search.php XSS Vulnerability", "name": "20070804 ContentDM Search.php XSS Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,26 +81,6 @@
"name": "25199", "name": "25199",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25199" "url": "http://www.securityfocus.com/bid/25199"
},
{
"name" : "36437",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36437"
},
{
"name" : "26324",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26324"
},
{
"name" : "2980",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2980"
},
{
"name" : "contentdm-search-xss(35809)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35809"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://pridels-team.blogspot.com/2007/08/snif-xss-vuln.html",
"refsource" : "MISC",
"url" : "http://pridels-team.blogspot.com/2007/08/snif-xss-vuln.html"
},
{
"name" : "25212",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25212"
},
{ {
"name": "38701", "name": "38701",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -71,6 +61,16 @@
"name": "snif-index-xss(35813)", "name": "snif-index-xss(35813)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35813" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35813"
},
{
"name": "25212",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25212"
},
{
"name": "http://pridels-team.blogspot.com/2007/08/snif-xss-vuln.html",
"refsource": "MISC",
"url": "http://pridels-team.blogspot.com/2007/08/snif-xss-vuln.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2007-4349", "ID": "CVE-2007-4349",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20081022 Secunia Research: HP OpenView Products Shared Trace Service Denial of Service", "name": "4501",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/497648/100/0/threaded" "url": "http://securityreason.com/securityalert/4501"
},
{
"name" : "http://secunia.com/secunia_research/2007-83/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2007-83/"
},
{
"name" : "HPSBMA02390",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=122876827120961&w=2"
}, },
{ {
"name": "HPSBMA02391", "name": "HPSBMA02391",
@ -73,9 +63,29 @@
"url": "http://marc.info/?l=bugtraq&m=122876677518654&w=2" "url": "http://marc.info/?l=bugtraq&m=122876677518654&w=2"
}, },
{ {
"name" : "SSRT071481", "name": "1021092",
"refsource" : "HP", "refsource": "SECTRACK",
"url" : "http://marc.info/?l=bugtraq&m=122876827120961&w=2" "url": "http://www.securitytracker.com/id?1021092"
},
{
"name": "ov-traceservice-rpc-dos(46028)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46028"
},
{
"name": "27054",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27054"
},
{
"name": "http://secunia.com/secunia_research/2007-83/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2007-83/"
},
{
"name": "20081022 Secunia Research: HP OpenView Products Shared Trace Service Denial of Service",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497648/100/0/threaded"
}, },
{ {
"name": "31860", "name": "31860",
@ -88,24 +98,14 @@
"url": "http://www.vupen.com/english/advisories/2008/2888" "url": "http://www.vupen.com/english/advisories/2008/2888"
}, },
{ {
"name" : "1021092", "name": "HPSBMA02390",
"refsource" : "SECTRACK", "refsource": "HP",
"url" : "http://www.securitytracker.com/id?1021092" "url": "http://marc.info/?l=bugtraq&m=122876827120961&w=2"
}, },
{ {
"name" : "27054", "name": "SSRT071481",
"refsource" : "SECUNIA", "refsource": "HP",
"url" : "http://secunia.com/advisories/27054" "url": "http://marc.info/?l=bugtraq&m=122876827120961&w=2"
},
{
"name" : "4501",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4501"
},
{
"name" : "ov-traceservice-rpc-dos(46028)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46028"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1018632",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018632"
},
{ {
"name": "[Users] 20070822 New version: 0.8.3 beta", "name": "[Users] 20070822 New version: 0.8.3 beta",
"refsource": "MLIST", "refsource": "MLIST",
@ -62,6 +67,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.sshkeychain.org/pipermail/users/2007-August/000098.html" "url": "http://www.sshkeychain.org/pipermail/users/2007-August/000098.html"
}, },
{
"name": "26617",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26617"
},
{ {
"name": "[Users] 20070823 New version: 0.8.3 beta", "name": "[Users] 20070823 New version: 0.8.3 beta",
"refsource": "MLIST", "refsource": "MLIST",
@ -71,16 +81,6 @@
"name": "25409", "name": "25409",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25409" "url": "http://www.securityfocus.com/bid/25409"
},
{
"name" : "1018632",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018632"
},
{
"name" : "26617",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26617"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070918 Plague in (security) software drivers & BSDOhook utility", "name": "3161",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/479830/100/0/threaded" "url": "http://securityreason.com/securityalert/3161"
}, },
{ {
"name": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php", "name": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php",
@ -68,9 +68,9 @@
"url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php"
}, },
{ {
"name" : "3161", "name": "20070918 Plague in (security) software drivers & BSDOhook utility",
"refsource" : "SREASON", "refsource": "BUGTRAQ",
"url" : "http://securityreason.com/securityalert/3161" "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070918 Plague in (security) software drivers & BSDOhook utility", "name": "45897",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/archive/1/479830/100/0/threaded" "url": "http://osvdb.org/45897"
},
{
"name": "3161",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3161"
}, },
{ {
"name": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php", "name": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php",
@ -68,14 +73,9 @@
"url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php"
}, },
{ {
"name" : "45897", "name": "20070918 Plague in (security) software drivers & BSDOhook utility",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://osvdb.org/45897" "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded"
},
{
"name" : "3161",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3161"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "38508",
"refsource": "OSVDB",
"url": "http://osvdb.org/38508"
},
{
"name": "38507",
"refsource": "OSVDB",
"url": "http://osvdb.org/38507"
},
{ {
"name": "20070929 eGov Content Manager Cross Site Scripting Vulrnability", "name": "20070929 eGov Content Manager Cross Site Scripting Vulrnability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -62,25 +72,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.hackerscenter.com/Archive/view.asp?id=28033" "url": "http://www.hackerscenter.com/Archive/view.asp?id=28033"
}, },
{
"name" : "25881",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25881"
},
{
"name" : "38507",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38507"
},
{
"name" : "38508",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38508"
},
{ {
"name": "3192", "name": "3192",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3192" "url": "http://securityreason.com/securityalert/3192"
},
{
"name": "25881",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25881"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.portcullis-security.com/223.php",
"refsource" : "MISC",
"url" : "http://www.portcullis-security.com/223.php"
},
{
"name" : "26472",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26472"
},
{
"name" : "ADV-2007-3910",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3910"
},
{
"name" : "38703",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38703"
},
{ {
"name": "38704", "name": "38704",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/38704" "url": "http://osvdb.org/38704"
}, },
{
"name": "fatwire-search-xss(38305)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38305"
},
{ {
"name": "27663", "name": "27663",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27663" "url": "http://secunia.com/advisories/27663"
}, },
{ {
"name" : "fatwire-search-xss(38305)", "name": "26472",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38305" "url": "http://www.securityfocus.com/bid/26472"
},
{
"name": "http://www.portcullis-security.com/223.php",
"refsource": "MISC",
"url": "http://www.portcullis-security.com/223.php"
},
{
"name": "38703",
"refsource": "OSVDB",
"url": "http://osvdb.org/38703"
},
{
"name": "ADV-2007-3910",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3910"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2647", "ID": "CVE-2015-2647",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
}, },
{
"name" : "SUSE-SU-2015:1353",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00003.html"
},
{ {
"name": "1032918", "name": "1032918",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032918" "url": "http://www.securitytracker.com/id/1032918"
},
{
"name": "SUSE-SU-2015:1353",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00003.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-2912", "ID": "CVE-2015-2912",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/orientechnologies/orientdb/issues/4824",
"refsource" : "CONFIRM",
"url" : "https://github.com/orientechnologies/orientdb/issues/4824"
},
{ {
"name": "VU#845332", "name": "VU#845332",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/845332" "url": "https://www.kb.cert.org/vuls/id/845332"
},
{
"name": "https://github.com/orientechnologies/orientdb/issues/4824",
"refsource": "CONFIRM",
"url": "https://github.com/orientechnologies/orientdb/issues/4824"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3251", "ID": "CVE-2015-3251",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://blogs.apache.org/cloudstack/entry/two_late_announced_security_advisories",
"refsource": "CONFIRM",
"url": "https://blogs.apache.org/cloudstack/entry/two_late_announced_security_advisories"
},
{ {
"name": "20160205 CVE-2015-3251: Apache CloudStack VM Credential Exposure", "name": "20160205 CVE-2015-3251: Apache CloudStack VM Credential Exposure",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "[cloudstack-users] 20160205 CVE-2015-3251: Apache CloudStack VM Credential Exposure", "name": "[cloudstack-users] 20160205 CVE-2015-3251: Apache CloudStack VM Credential Exposure",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/cloudstack-users/201602.mbox/%3C94DD4CB4-F718-4F79-A934-3D677E497114%40gmail.com%3E" "url": "http://mail-archives.apache.org/mod_mbox/cloudstack-users/201602.mbox/%3C94DD4CB4-F718-4F79-A934-3D677E497114%40gmail.com%3E"
},
{
"name" : "https://blogs.apache.org/cloudstack/entry/two_late_announced_security_advisories",
"refsource" : "CONFIRM",
"url" : "https://blogs.apache.org/cloudstack/entry/two_late_announced_security_advisories"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20150506 Re: Local privileges escalation in rubygem open-uri-cached", "name": "https://github.com/tigris/open-uri-cached/blob/master/lib/open-uri/cached.rb#L39",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/05/06/2"
},
{
"name" : "http://www.benjaminfleischer.com/2013/03/20/yaml-and-security-in-ruby/",
"refsource": "MISC", "refsource": "MISC",
"url" : "http://www.benjaminfleischer.com/2013/03/20/yaml-and-security-in-ruby/" "url": "https://github.com/tigris/open-uri-cached/blob/master/lib/open-uri/cached.rb#L39"
}, },
{ {
"name": "https://github.com/tigris/open-uri-cached/blob/master/lib/open-uri/cached.rb#L115", "name": "https://github.com/tigris/open-uri-cached/blob/master/lib/open-uri/cached.rb#L115",
@ -73,14 +68,19 @@
"url": "https://github.com/tigris/open-uri-cached/blob/master/lib/open-uri/cached.rb#L25" "url": "https://github.com/tigris/open-uri-cached/blob/master/lib/open-uri/cached.rb#L25"
}, },
{ {
"name" : "https://github.com/tigris/open-uri-cached/blob/master/lib/open-uri/cached.rb#L39", "name": "[oss-security] 20150506 Re: Local privileges escalation in rubygem open-uri-cached",
"refsource" : "MISC", "refsource": "MLIST",
"url" : "https://github.com/tigris/open-uri-cached/blob/master/lib/open-uri/cached.rb#L39" "url": "http://www.openwall.com/lists/oss-security/2015/05/06/2"
}, },
{ {
"name": "74469", "name": "74469",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/74469" "url": "http://www.securityfocus.com/bid/74469"
},
{
"name": "http://www.benjaminfleischer.com/2013/03/20/yaml-and-security-in-ruby/",
"refsource": "MISC",
"url": "http://www.benjaminfleischer.com/2013/03/20/yaml-and-security-in-ruby/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3658", "ID": "CVE-2015-3658",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -62,6 +62,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT204950" "url": "http://support.apple.com/kb/HT204950"
}, },
{
"name": "75492",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75492"
},
{
"name": "openSUSE-SU-2016:0915",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html"
},
{ {
"name": "APPLE-SA-2015-06-30-1", "name": "APPLE-SA-2015-06-30-1",
"refsource": "APPLE", "refsource": "APPLE",
@ -73,24 +83,14 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00004.html" "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00004.html"
}, },
{ {
"name" : "openSUSE-SU-2016:0915", "name": "1032754",
"refsource" : "SUSE", "refsource": "SECTRACK",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" "url": "http://www.securitytracker.com/id/1032754"
}, },
{ {
"name": "USN-2937-1", "name": "USN-2937-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2937-1" "url": "http://www.ubuntu.com/usn/USN-2937-1"
},
{
"name" : "75492",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75492"
},
{
"name" : "1032754",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032754"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-3958", "ID": "CVE-2015-3958",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm446809.htm" "url": "http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm446809.htm"
}, },
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01B",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01B"
},
{ {
"name": "75138", "name": "75138",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75138" "url": "http://www.securityfocus.com/bid/75138"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01B",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01B"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6077", "ID": "CVE-2015-6077",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1034112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034112"
},
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-542", "name": "http://www.zerodayinitiative.com/advisories/ZDI-15-542",
"refsource": "MISC", "refsource": "MISC",
@ -66,11 +71,6 @@
"name": "77450", "name": "77450",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/77450" "url": "http://www.securityfocus.com/bid/77450"
},
{
"name" : "1034112",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034112"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6380", "ID": "CVE-2015-6380",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6414", "ID": "CVE-2015-6414",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20151210 Cisco TelePresence Video Communication Server Information Disclosure Vulnerability", "name": "1034429",
"refsource" : "CISCO", "refsource": "SECTRACK",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-tvcs" "url": "http://www.securitytracker.com/id/1034429"
}, },
{ {
"name": "79065", "name": "79065",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/79065" "url": "http://www.securityfocus.com/bid/79065"
}, },
{ {
"name" : "1034429", "name": "20151210 Cisco TelePresence Video Communication Server Information Disclosure Vulnerability",
"refsource" : "SECTRACK", "refsource": "CISCO",
"url" : "http://www.securitytracker.com/id/1034429" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-tvcs"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "39500", "name": "https://wiki.zimbra.com/wiki/Security/Collab/86#Notes_from_8.5_.28Jetty.29",
"refsource" : "EXPLOIT-DB", "refsource": "CONFIRM",
"url" : "https://www.exploit-db.com/exploits/39500/" "url": "https://wiki.zimbra.com/wiki/Security/Collab/86#Notes_from_8.5_.28Jetty.29"
}, },
{ {
"name": "20160225 CVE-2015-6541 : Multiple CSRF in Zimbra Mail interface", "name": "20160225 CVE-2015-6541 : Multiple CSRF in Zimbra Mail interface",
@ -63,9 +63,9 @@
"url": "http://seclists.org/fulldisclosure/2016/Feb/121" "url": "http://seclists.org/fulldisclosure/2016/Feb/121"
}, },
{ {
"name" : "https://wiki.zimbra.com/wiki/Security/Collab/86#Notes_from_8.5_.28Jetty.29", "name": "39500",
"refsource" : "CONFIRM", "refsource": "EXPLOIT-DB",
"url" : "https://wiki.zimbra.com/wiki/Security/Collab/86#Notes_from_8.5_.28Jetty.29" "url": "https://www.exploit-db.com/exploits/39500/"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "38051", "name": "https://github.com/bedita/bedita/issues/623",
"refsource" : "EXPLOIT-DB", "refsource": "CONFIRM",
"url" : "https://www.exploit-db.com/exploits/38051/" "url": "https://github.com/bedita/bedita/issues/623"
}, },
{ {
"name": "http://www.bedita.com/news/bedita-3-6-0-corylus-release-announcement-and-new-website", "name": "http://www.bedita.com/news/bedita-3-6-0-corylus-release-announcement-and-new-website",
@ -63,9 +63,9 @@
"url": "http://www.bedita.com/news/bedita-3-6-0-corylus-release-announcement-and-new-website" "url": "http://www.bedita.com/news/bedita-3-6-0-corylus-release-announcement-and-new-website"
}, },
{ {
"name" : "https://github.com/bedita/bedita/issues/623", "name": "38051",
"refsource" : "CONFIRM", "refsource": "EXPLOIT-DB",
"url" : "https://github.com/bedita/bedita/issues/623" "url": "https://www.exploit-db.com/exploits/38051/"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6892", "ID": "CVE-2015-6892",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7074", "ID": "CVE-2015-7074",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -63,19 +63,9 @@
"url": "https://support.apple.com/HT205637" "url": "https://support.apple.com/HT205637"
}, },
{ {
"name" : "https://support.apple.com/HT205640", "name": "1034344",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT205640" "url": "http://www.securitytracker.com/id/1034344"
},
{
"name" : "APPLE-SA-2015-12-08-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html"
},
{
"name" : "APPLE-SA-2015-12-08-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
}, },
{ {
"name": "APPLE-SA-2015-12-08-3", "name": "APPLE-SA-2015-12-08-3",
@ -83,9 +73,19 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
}, },
{ {
"name" : "1034344", "name": "APPLE-SA-2015-12-08-1",
"refsource" : "SECTRACK", "refsource": "APPLE",
"url" : "http://www.securitytracker.com/id/1034344" "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html"
},
{
"name": "https://support.apple.com/HT205640",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205640"
},
{
"name": "APPLE-SA-2015-12-08-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-7114", "ID": "CVE-2015-7114",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -62,15 +62,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://hyp3rlinx.altervista.org/advisories/AS-FORTISANDBOX-0801.txt" "url": "http://hyp3rlinx.altervista.org/advisories/AS-FORTISANDBOX-0801.txt"
}, },
{
"name" : "http://packetstormsecurity.com/files/132930/FortiSandbox-3000D-2.02-build0042-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/132930/FortiSandbox-3000D-2.02-build0042-Cross-Site-Scripting.html"
},
{ {
"name": "http://fortiguard.com/advisory/multiple-xss-vulnerabilities-in-fortisandbox-webui", "name": "http://fortiguard.com/advisory/multiple-xss-vulnerabilities-in-fortisandbox-webui",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://fortiguard.com/advisory/multiple-xss-vulnerabilities-in-fortisandbox-webui" "url": "http://fortiguard.com/advisory/multiple-xss-vulnerabilities-in-fortisandbox-webui"
},
{
"name": "http://packetstormsecurity.com/files/132930/FortiSandbox-3000D-2.02-build0042-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132930/FortiSandbox-3000D-2.02-build0042-Cross-Site-Scripting.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-7429", "ID": "CVE-2015-7429",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-7488", "ID": "CVE-2015-7488",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-7772", "ID": "CVE-2015-7772",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://jvn.jp/en/jp/JVN64625488/995707/index.html" "url": "http://jvn.jp/en/jp/JVN64625488/995707/index.html"
}, },
{
"name" : "JVN#64625488",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN64625488/index.html"
},
{ {
"name": "JVNDB-2015-000179", "name": "JVNDB-2015-000179",
"refsource": "JVNDB", "refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000179" "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000179"
},
{
"name": "JVN#64625488",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN64625488/index.html"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "38612",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/38612/"
},
{
"name" : "http://packetstormsecurity.com/files/134198/Samsung-Galaxy-S6-LibQjpeg-DoIntegralUpsample-Crash.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/134198/Samsung-Galaxy-S6-LibQjpeg-DoIntegralUpsample-Crash.html"
},
{ {
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=498&redir=1", "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=498&redir=1",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "77425", "name": "77425",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/77425" "url": "http://www.securityfocus.com/bid/77425"
},
{
"name": "http://packetstormsecurity.com/files/134198/Samsung-Galaxy-S6-LibQjpeg-DoIntegralUpsample-Crash.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/134198/Samsung-Galaxy-S6-LibQjpeg-DoIntegralUpsample-Crash.html"
},
{
"name": "38612",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38612/"
} }
] ]
} }

View File

@ -57,16 +57,16 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537248/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/537248/100/0/threaded"
}, },
{
"name" : "20160108 Serendipity Security Advisory - XSS Vulnerability - CVE-2015-8603",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Jan/18"
},
{ {
"name": "http://packetstormsecurity.com/files/135164/Serendipity-2.0.2-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/135164/Serendipity-2.0.2-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135164/Serendipity-2.0.2-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/135164/Serendipity-2.0.2-Cross-Site-Scripting.html"
}, },
{
"name": "20160108 Serendipity Security Advisory - XSS Vulnerability - CVE-2015-8603",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Jan/18"
},
{ {
"name": "http://blog.s9y.org/archives/266-Serendipity-2.0.3-released.html", "name": "http://blog.s9y.org/archives/266-Serendipity-2.0.3-released.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -53,89 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20160111 CVE Request: Linux kernel - SCTP denial of service during heartbeat timeout functions.", "name": "USN-2930-1",
"refsource" : "MLIST", "refsource": "UBUNTU",
"url" : "http://www.openwall.com/lists/oss-security/2016/01/11/4" "url": "http://www.ubuntu.com/usn/USN-2930-1"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=635682a14427d241bab7bbdeebb48a7d7b91638e",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=635682a14427d241bab7bbdeebb48a7d7b91638e"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1297389",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1297389"
},
{
"name" : "https://github.com/torvalds/linux/commit/635682a14427d241bab7bbdeebb48a7d7b91638e",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/635682a14427d241bab7bbdeebb48a7d7b91638e"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name" : "DSA-3503",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3503"
},
{
"name" : "DSA-3448",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3448"
},
{
"name" : "FEDORA-2016-5d43766e33",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html"
},
{
"name" : "RHSA-2016:1277",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1277"
},
{
"name" : "RHSA-2016:1301",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1301"
},
{
"name" : "RHSA-2016:1341",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1341"
},
{
"name" : "RHSA-2016:0715",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0715.html"
},
{
"name" : "SUSE-SU-2016:2074",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name" : "openSUSE-SU-2016:1008",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html"
},
{
"name" : "SUSE-SU-2016:0911",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"
},
{
"name" : "SUSE-SU-2016:1102",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"
}, },
{ {
"name": "USN-2967-1", "name": "USN-2967-1",
@ -143,39 +63,119 @@
"url": "http://www.ubuntu.com/usn/USN-2967-1" "url": "http://www.ubuntu.com/usn/USN-2967-1"
}, },
{ {
"name" : "USN-2967-2", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-2967-2" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
}, },
{ {
"name" : "USN-2930-1", "name": "RHSA-2016:1341",
"refsource" : "UBUNTU", "refsource": "REDHAT",
"url" : "http://www.ubuntu.com/usn/USN-2930-1" "url": "https://access.redhat.com/errata/RHSA-2016:1341"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "RHSA-2016:0715",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0715.html"
}, },
{ {
"name": "USN-2930-2", "name": "USN-2930-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2930-2" "url": "http://www.ubuntu.com/usn/USN-2930-2"
}, },
{
"name": "RHSA-2016:1301",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1301"
},
{
"name": "[oss-security] 20160111 CVE Request: Linux kernel - SCTP denial of service during heartbeat timeout functions.",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/11/4"
},
{
"name": "DSA-3503",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3503"
},
{
"name": "USN-2967-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2967-2"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=635682a14427d241bab7bbdeebb48a7d7b91638e",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=635682a14427d241bab7bbdeebb48a7d7b91638e"
},
{ {
"name": "USN-2930-3", "name": "USN-2930-3",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2930-3" "url": "http://www.ubuntu.com/usn/USN-2930-3"
}, },
{ {
"name" : "USN-2931-1", "name": "SUSE-SU-2016:1102",
"refsource" : "UBUNTU", "refsource": "SUSE",
"url" : "http://www.ubuntu.com/usn/USN-2931-1" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"
}, },
{ {
"name": "USN-2932-1", "name": "USN-2932-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2932-1" "url": "http://www.ubuntu.com/usn/USN-2932-1"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1297389",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1297389"
},
{
"name": "FEDORA-2016-5d43766e33",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html"
},
{
"name": "SUSE-SU-2016:2074",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{ {
"name": "80268", "name": "80268",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/80268" "url": "http://www.securityfocus.com/bid/80268"
},
{
"name": "https://github.com/torvalds/linux/commit/635682a14427d241bab7bbdeebb48a7d7b91638e",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/635682a14427d241bab7bbdeebb48a7d7b91638e"
},
{
"name": "USN-2931-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2931-1"
},
{
"name": "DSA-3448",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3448"
},
{
"name": "openSUSE-SU-2016:1008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html"
},
{
"name": "RHSA-2016:1277",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1277"
},
{
"name": "SUSE-SU-2016:0911",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0063", "ID": "CVE-2016-0063",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://blog.skylined.nl/20161128001.html",
"refsource": "MISC",
"url": "http://blog.skylined.nl/20161128001.html"
},
{ {
"name": "40845", "name": "40845",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -63,19 +68,14 @@
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-166" "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-166"
}, },
{ {
"name" : "http://blog.skylined.nl/20161128001.html", "name": "1034971",
"refsource" : "MISC", "refsource": "SECTRACK",
"url" : "http://blog.skylined.nl/20161128001.html" "url": "http://www.securitytracker.com/id/1034971"
}, },
{ {
"name": "MS16-009", "name": "MS16-009",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-009" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-009"
},
{
"name" : "1034971",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034971"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0084", "ID": "CVE-2016-0084",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS16-011", "name": "1034972",
"refsource" : "MS", "refsource": "SECTRACK",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-011" "url": "http://www.securitytracker.com/id/1034972"
}, },
{ {
"name": "82635", "name": "82635",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/82635" "url": "http://www.securityfocus.com/bid/82635"
}, },
{ {
"name" : "1034972", "name": "MS16-011",
"refsource" : "SECTRACK", "refsource": "MS",
"url" : "http://www.securitytracker.com/id/1034972" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-011"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0516", "ID": "CVE-2016-0516",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,220 +52,220 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://openssl.org/news/secadv/20160301.txt",
"refsource" : "CONFIRM",
"url" : "http://openssl.org/news/secadv/20160301.txt"
},
{
"name" : "https://git.openssl.org/?p=openssl.git;a=commit;h=c175308407858afff3fc8c2e5e085d94d12edc7d",
"refsource" : "CONFIRM",
"url" : "https://git.openssl.org/?p=openssl.git;a=commit;h=c175308407858afff3fc8c2e5e085d94d12edc7d"
},
{
"name" : "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168",
"refsource" : "CONFIRM",
"url" : "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10156",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10156"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
}, },
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name" : "https://www.openssl.org/news/secadv/20160301.txt",
"refsource" : "CONFIRM",
"url" : "https://www.openssl.org/news/secadv/20160301.txt"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us"
},
{
"name" : "20160302 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl"
},
{
"name" : "DSA-3500",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3500"
},
{
"name" : "FreeBSD-SA-16:12",
"refsource" : "FREEBSD",
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc"
},
{
"name" : "GLSA-201603-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-15"
},
{
"name" : "HPSBGN03563",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=145889460330120&w=2"
},
{
"name" : "RHSA-2016:2957",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name" : "openSUSE-SU-2016:1566",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html"
},
{
"name" : "openSUSE-SU-2016:1239",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html"
},
{
"name" : "openSUSE-SU-2016:1241",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html"
},
{
"name" : "SUSE-SU-2016:1057",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html"
},
{
"name" : "SUSE-SU-2016:0617",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html"
},
{
"name" : "SUSE-SU-2016:0620",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html"
},
{
"name" : "SUSE-SU-2016:0621",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html"
},
{
"name" : "SUSE-SU-2016:0624",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html"
},
{
"name" : "SUSE-SU-2016:0631",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html"
},
{
"name" : "SUSE-SU-2016:0641",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html"
},
{
"name" : "openSUSE-SU-2016:0627",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html"
},
{
"name" : "openSUSE-SU-2016:0628",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html"
},
{
"name" : "openSUSE-SU-2016:0637",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html"
},
{
"name" : "openSUSE-SU-2016:0638",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html"
},
{
"name" : "openSUSE-SU-2016:0640",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
},
{
"name" : "SUSE-SU-2016:0678",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html"
},
{
"name" : "openSUSE-SU-2016:0720",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html"
},
{
"name" : "USN-2914-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2914-1"
},
{
"name" : "91787",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91787"
},
{ {
"name": "83763", "name": "83763",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/83763" "url": "http://www.securityfocus.com/bid/83763"
}, },
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10156",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10156"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "openSUSE-SU-2016:0638",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917"
},
{
"name": "FreeBSD-SA-16:12",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "openSUSE-SU-2016:1239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html"
},
{
"name": "SUSE-SU-2016:0621",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html"
},
{
"name": "openSUSE-SU-2016:0640",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
},
{
"name": "HPSBGN03563",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=145889460330120&w=2"
},
{
"name": "USN-2914-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2914-1"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "SUSE-SU-2016:1057",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html"
},
{
"name": "openSUSE-SU-2016:1566",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html"
},
{
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168",
"refsource": "CONFIRM",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168"
},
{
"name": "openSUSE-SU-2016:1241",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html"
},
{
"name": "https://git.openssl.org/?p=openssl.git;a=commit;h=c175308407858afff3fc8c2e5e085d94d12edc7d",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/?p=openssl.git;a=commit;h=c175308407858afff3fc8c2e5e085d94d12edc7d"
},
{
"name": "http://openssl.org/news/secadv/20160301.txt",
"refsource": "CONFIRM",
"url": "http://openssl.org/news/secadv/20160301.txt"
},
{
"name": "20160302 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl"
},
{
"name": "openSUSE-SU-2016:0720",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "SUSE-SU-2016:0624",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html"
},
{
"name": "DSA-3500",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3500"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us"
},
{
"name": "SUSE-SU-2016:0631",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html"
},
{
"name": "https://www.openssl.org/news/secadv/20160301.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20160301.txt"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
},
{
"name": "SUSE-SU-2016:0617",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html"
},
{
"name": "RHSA-2016:2957",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "GLSA-201603-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-15"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name": "openSUSE-SU-2016:0628",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html"
},
{ {
"name": "1035133", "name": "1035133",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035133" "url": "http://www.securitytracker.com/id/1035133"
},
{
"name": "SUSE-SU-2016:0678",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html"
},
{
"name": "SUSE-SU-2016:0620",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html"
},
{
"name": "openSUSE-SU-2016:0637",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html"
},
{
"name": "openSUSE-SU-2016:0627",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html"
},
{
"name": "SUSE-SU-2016:0641",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-0831", "ID": "CVE-2016-0831",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1054", "ID": "CVE-2016-1054",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-302",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-302"
},
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{ {
"name": "90512", "name": "90512",
"refsource": "BID", "refsource": "BID",
@ -71,6 +61,16 @@
"name": "1035828", "name": "1035828",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828" "url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-302",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-302"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1188", "ID": "CVE-2016-1188",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03", "name": "JVN#18975349",
"refsource" : "CONFIRM", "refsource": "JVN",
"url" : "https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03" "url": "http://jvn.jp/en/jp/JVN18975349/index.html"
}, },
{ {
"name": "https://support.cybozu.com/ja-jp/article/8845", "name": "https://support.cybozu.com/ja-jp/article/8845",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.cybozu.com/ja-jp/article/8845" "url": "https://support.cybozu.com/ja-jp/article/8845"
}, },
{
"name" : "JVN#18975349",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN18975349/index.html"
},
{ {
"name": "JVNDB-2016-000077", "name": "JVNDB-2016-000077",
"refsource": "JVNDB", "refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000077" "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000077"
},
{
"name": "https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03",
"refsource": "CONFIRM",
"url": "https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1194", "ID": "CVE-2016-1194",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.cybozu.com/ja-jp/article/8983" "url": "https://support.cybozu.com/ja-jp/article/8983"
}, },
{
"name" : "JVN#26298347",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN26298347/index.html"
},
{ {
"name": "JVNDB-2016-000080", "name": "JVNDB-2016-000080",
"refsource": "JVNDB", "refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000080.html" "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000080.html"
},
{
"name": "JVN#26298347",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN26298347/index.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1207", "ID": "CVE-2016-1207",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.iodata.jp/support/information/2016/wn-g300r_xss/",
"refsource" : "CONFIRM",
"url" : "http://www.iodata.jp/support/information/2016/wn-g300r_xss/"
},
{ {
"name": "JVN#22978346", "name": "JVN#22978346",
"refsource": "JVN", "refsource": "JVN",
@ -66,6 +61,11 @@
"name": "JVNDB-2016-000062", "name": "JVNDB-2016-000062",
"refsource": "JVNDB", "refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000062" "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000062"
},
{
"name": "http://www.iodata.jp/support/information/2016/wn-g300r_xss/",
"refsource": "CONFIRM",
"url": "http://www.iodata.jp/support/information/2016/wn-g300r_xss/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1309", "ID": "CVE-2016-1309",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160202 Cisco WebEx Meetings Server Multiple Cross-Site Scripting Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160202-wms"
},
{ {
"name": "1034919", "name": "1034919",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034919" "url": "http://www.securitytracker.com/id/1034919"
},
{
"name": "20160202 Cisco WebEx Meetings Server Multiple Cross-Site Scripting Vulnerabilities",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160202-wms"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1316", "ID": "CVE-2016-1316",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160208 Cisco Video Communications Server Information Disclosure Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160208-vcs"
},
{ {
"name": "1034956", "name": "1034956",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034956" "url": "http://www.securitytracker.com/id/1034956"
},
{
"name": "20160208 Cisco Video Communications Server Information Disclosure Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160208-vcs"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1847", "ID": "CVE-2016-1847",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT206564", "name": "https://support.apple.com/HT206567",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT206564" "url": "https://support.apple.com/HT206567"
},
{
"name": "90691",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90691"
},
{
"name": "APPLE-SA-2016-05-16-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
}, },
{ {
"name": "https://support.apple.com/HT206566", "name": "https://support.apple.com/HT206566",
@ -63,9 +73,24 @@
"url": "https://support.apple.com/HT206566" "url": "https://support.apple.com/HT206566"
}, },
{ {
"name" : "https://support.apple.com/HT206567", "name": "APPLE-SA-2016-05-16-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html"
},
{
"name": "https://support.apple.com/HT206564",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT206567" "url": "https://support.apple.com/HT206564"
},
{
"name": "1035890",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035890"
},
{
"name": "APPLE-SA-2016-05-16-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html"
}, },
{ {
"name": "https://support.apple.com/HT206568", "name": "https://support.apple.com/HT206568",
@ -76,31 +101,6 @@
"name": "APPLE-SA-2016-05-16-1", "name": "APPLE-SA-2016-05-16-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html"
},
{
"name" : "APPLE-SA-2016-05-16-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html"
},
{
"name" : "APPLE-SA-2016-05-16-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html"
},
{
"name" : "APPLE-SA-2016-05-16-4",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
},
{
"name" : "90691",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90691"
},
{
"name" : "1035890",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035890"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-1949", "ID": "CVE-2016-1949",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1035007",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035007"
},
{ {
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-13.html", "name": "http://www.mozilla.org/security/announce/2016/mfsa2016-13.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,16 +67,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1245724" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1245724"
}, },
{
"name" : "GLSA-201605-06",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201605-06"
},
{
"name" : "openSUSE-SU-2016:0489",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00102.html"
},
{ {
"name": "openSUSE-SU-2016:0553", "name": "openSUSE-SU-2016:0553",
"refsource": "SUSE", "refsource": "SUSE",
@ -83,9 +78,14 @@
"url": "http://www.ubuntu.com/usn/USN-2893-1" "url": "http://www.ubuntu.com/usn/USN-2893-1"
}, },
{ {
"name" : "1035007", "name": "GLSA-201605-06",
"refsource" : "SECTRACK", "refsource": "GENTOO",
"url" : "http://www.securitytracker.com/id/1035007" "url": "https://security.gentoo.org/glsa/201605-06"
},
{
"name": "openSUSE-SU-2016:0489",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00102.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4236", "ID": "CVE-2016-4236",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,15 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html", "name": "SUSE-SU-2016:1826",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
}, },
{ {
"name": "GLSA-201607-03", "name": "GLSA-201607-03",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-03" "url": "https://security.gentoo.org/glsa/201607-03"
}, },
{
"name" : "RHSA-2016:1423",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
},
{
"name" : "SUSE-SU-2016:1826",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
},
{ {
"name": "openSUSE-SU-2016:1802", "name": "openSUSE-SU-2016:1802",
"refsource": "SUSE", "refsource": "SUSE",
@ -82,6 +72,16 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91725" "url": "http://www.securityfocus.com/bid/91725"
}, },
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
},
{
"name": "RHSA-2016:1423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
},
{ {
"name": "1036280", "name": "1036280",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2016-4539", "ID": "CVE-2016-4539",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,55 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160505 CVE Request: PHP: several issues fixed with 7.0.6, 5.6.21 and 5.5.35",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/05/21"
},
{
"name" : "http://php.net/ChangeLog-5.php",
"refsource" : "CONFIRM",
"url" : "http://php.net/ChangeLog-5.php"
},
{
"name" : "http://php.net/ChangeLog-7.php",
"refsource" : "CONFIRM",
"url" : "http://php.net/ChangeLog-7.php"
},
{
"name" : "https://bugs.php.net/bug.php?id=72099",
"refsource" : "CONFIRM",
"url" : "https://bugs.php.net/bug.php?id=72099"
},
{
"name" : "https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc",
"refsource" : "CONFIRM",
"url" : "https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
},
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149"
}, },
{ {
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "name": "openSUSE-SU-2016:1524",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html"
},
{
"name" : "DSA-3602",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3602"
},
{
"name" : "FEDORA-2016-f4e73663f4",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html"
}, },
{ {
"name": "GLSA-201611-22", "name": "GLSA-201611-22",
@ -113,9 +73,44 @@
"url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1524", "name": "[oss-security] 20160505 CVE Request: PHP: several issues fixed with 7.0.6, 5.6.21 and 5.5.35",
"refsource" : "SUSE", "refsource": "MLIST",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html" "url": "http://www.openwall.com/lists/oss-security/2016/05/05/21"
},
{
"name": "DSA-3602",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3602"
},
{
"name": "http://php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://php.net/ChangeLog-5.php"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "90174",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90174"
},
{
"name": "http://php.net/ChangeLog-7.php",
"refsource": "CONFIRM",
"url": "http://php.net/ChangeLog-7.php"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
},
{
"name": "https://bugs.php.net/bug.php?id=72099",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=72099"
}, },
{ {
"name": "openSUSE-SU-2016:1357", "name": "openSUSE-SU-2016:1357",
@ -123,9 +118,14 @@
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html"
}, },
{ {
"name" : "90174", "name": "https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/90174" "url": "https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc"
},
{
"name": "FEDORA-2016-f4e73663f4",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-4841", "ID": "CVE-2016-4841",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,9 +58,9 @@
"url": "https://support.cybozu.com/ja-jp/article/9607" "url": "https://support.cybozu.com/ja-jp/article/9607"
}, },
{ {
"name" : "JVN#01353821", "name": "92459",
"refsource" : "JVN", "refsource": "BID",
"url" : "http://jvn.jp/en/jp/JVN01353821/index.html" "url": "http://www.securityfocus.com/bid/92459"
}, },
{ {
"name": "JVNDB-2016-000135", "name": "JVNDB-2016-000135",
@ -68,9 +68,9 @@
"url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000135.html" "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000135.html"
}, },
{ {
"name" : "92459", "name": "JVN#01353821",
"refsource" : "BID", "refsource": "JVN",
"url" : "http://www.securityfocus.com/bid/92459" "url": "http://jvn.jp/en/jp/JVN01353821/index.html"
} }
] ]
} }

View File

@ -53,9 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20160501 Re: CVE request: DoS in multiple versions of GraphicsMagick", "name": "openSUSE-SU-2016:2073",
"refsource" : "MLIST", "refsource": "SUSE",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/01/6" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html"
},
{
"name": "openSUSE-SU-2016:1724",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html"
},
{
"name": "89348",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/89348"
},
{
"name": "http://www.graphicsmagick.org/NEWS.html#may-30-2016",
"refsource": "CONFIRM",
"url": "http://www.graphicsmagick.org/NEWS.html#may-30-2016"
}, },
{ {
"name": "[oss-security] 20160602 Re: CVE request: DoS in multiple versions of GraphicsMagick", "name": "[oss-security] 20160602 Re: CVE request: DoS in multiple versions of GraphicsMagick",
@ -68,29 +83,14 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html" "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html"
}, },
{ {
"name" : "http://www.graphicsmagick.org/NEWS.html#may-30-2016", "name": "[oss-security] 20160501 Re: CVE request: DoS in multiple versions of GraphicsMagick",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "http://www.graphicsmagick.org/NEWS.html#may-30-2016" "url": "http://www.openwall.com/lists/oss-security/2016/05/01/6"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1333410", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1333410",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333410" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333410"
},
{
"name" : "openSUSE-SU-2016:1724",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html"
},
{
"name" : "openSUSE-SU-2016:2073",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html"
},
{
"name" : "89348",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/89348"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5531", "ID": "CVE-2016-5531",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
}, },
{
"name" : "93730",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/93730"
},
{ {
"name": "1037052", "name": "1037052",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037052" "url": "http://www.securitytracker.com/id/1037052"
},
{
"name": "93730",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93730"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5561", "ID": "CVE-2016-5561",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1037048",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037048"
},
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "93710", "name": "93710",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/93710" "url": "http://www.securityfocus.com/bid/93710"
},
{
"name" : "1037048",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037048"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5628", "ID": "CVE-2016-5628",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{ {
"name": "GLSA-201701-01", "name": "GLSA-201701-01",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-01" "url": "https://security.gentoo.org/glsa/201701-01"
}, },
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{ {
"name": "93662", "name": "93662",
"refsource": "BID", "refsource": "BID",

View File

@ -73,16 +73,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://launchpad.support.sap.com/#/notes/2689925",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2689925"
},
{ {
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=515408080", "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=515408080",
"refsource": "MISC", "refsource": "MISC",
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=515408080" "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=515408080"
}, },
{
"name": "https://launchpad.support.sap.com/#/notes/2689925",
"refsource": "MISC",
"url": "https://launchpad.support.sap.com/#/notes/2689925"
},
{ {
"name": "107362", "name": "107362",
"refsource": "BID", "refsource": "BID",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/TeamSeri0us/pocs/tree/master/matio",
"refsource" : "MISC",
"url" : "https://github.com/TeamSeri0us/pocs/tree/master/matio"
},
{ {
"name": "https://github.com/tbeu/matio/issues/103", "name": "https://github.com/tbeu/matio/issues/103",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/tbeu/matio/issues/103" "url": "https://github.com/tbeu/matio/issues/103"
},
{
"name": "https://github.com/TeamSeri0us/pocs/tree/master/matio",
"refsource": "MISC",
"url": "https://github.com/TeamSeri0us/pocs/tree/master/matio"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/46109" "url": "https://www.exploit-db.com/exploits/46109"
}, },
{
"name" : "https://pentest.com.tr/exploits/Brigade-ERP-4-5-Database-Backup-Disclosure-via-AFD.html",
"refsource" : "MISC",
"url" : "https://pentest.com.tr/exploits/Brigade-ERP-4-5-Database-Backup-Disclosure-via-AFD.html"
},
{ {
"name": "https://sourceforge.net/p/ebrigade/code/5912/", "name": "https://sourceforge.net/p/ebrigade/code/5912/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://sourceforge.net/p/ebrigade/code/5912/" "url": "https://sourceforge.net/p/ebrigade/code/5912/"
},
{
"name": "https://pentest.com.tr/exploits/Brigade-ERP-4-5-Database-Backup-Disclosure-via-AFD.html",
"refsource": "MISC",
"url": "https://pentest.com.tr/exploits/Brigade-ERP-4-5-Database-Backup-Disclosure-via-AFD.html"
} }
] ]
} }