"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:42:57 +00:00
parent 3c87002b44
commit aa3bb49410
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
66 changed files with 3805 additions and 3805 deletions

View File

@ -57,15 +57,15 @@
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/328867" "url": "http://www.kb.cert.org/vuls/id/328867"
}, },
{
"name" : "979",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/979"
},
{ {
"name": "4417", "name": "4417",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/4417" "url": "http://www.osvdb.org/4417"
},
{
"name": "979",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/979"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20000620 CUPS DoS Bugs", "name": "debian-cups-posts(4846)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-06/0188.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4846"
}, },
{ {
"name": "ftp://ftp.easysw.com/pub/cups/1.0.5/cups-DoS.patch", "name": "ftp://ftp.easysw.com/pub/cups/1.0.5/cups-DoS.patch",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "ftp://ftp.easysw.com/pub/cups/1.0.5/cups-DoS.patch" "url": "ftp://ftp.easysw.com/pub/cups/1.0.5/cups-DoS.patch"
}, },
{
"name": "20000620 CUPS DoS Bugs",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0188.html"
},
{ {
"name": "1373", "name": "1373",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1373" "url": "http://www.securityfocus.com/bid/1373"
},
{
"name" : "debian-cups-posts(4846)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/4846"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS00-046",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-046"
},
{
"name" : "CA-2000-14",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2000-14.html"
},
{ {
"name": "1501", "name": "1501",
"refsource": "BID", "refsource": "BID",
@ -71,6 +61,16 @@
"name": "outlook-cache-bypass(5013)", "name": "outlook-cache-bypass(5013)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5013" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5013"
},
{
"name": "MS00-046",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-046"
},
{
"name": "CA-2000-14",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2000-14.html"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "glint-symlink(5271)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5271"
},
{ {
"name": "RHSA-2000:062", "name": "RHSA-2000:062",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -61,11 +66,6 @@
"name": "1703", "name": "1703",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1703" "url": "http://www.securityfocus.com/bid/1703"
},
{
"name" : "glint-symlink(5271)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5271"
} }
] ]
} }

View File

@ -53,44 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "3141", "name": "31612",
"refsource" : "EXPLOIT-DB", "refsource": "OSVDB",
"url" : "https://www.exploit-db.com/exploits/3141" "url": "http://osvdb.org/31612"
},
{
"name" : "http://www.tv-kritik.net/mgb/index.php",
"refsource" : "CONFIRM",
"url" : "http://www.tv-kritik.net/mgb/index.php"
},
{
"name" : "20070118 vendor ACK for MGB Guestbook issue",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2007-January/001246.html"
}, },
{ {
"name": "22094", "name": "22094",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22094" "url": "http://www.securityfocus.com/bid/22094"
}, },
{
"name": "mgb-email-sql-injection(31551)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31551"
},
{
"name": "http://www.tv-kritik.net/mgb/index.php",
"refsource": "CONFIRM",
"url": "http://www.tv-kritik.net/mgb/index.php"
},
{
"name": "3141",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3141"
},
{
"name": "20070118 vendor ACK for MGB Guestbook issue",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-January/001246.html"
},
{ {
"name": "ADV-2007-0232", "name": "ADV-2007-0232",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0232" "url": "http://www.vupen.com/english/advisories/2007/0232"
}, },
{
"name" : "31612",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/31612"
},
{ {
"name": "23825", "name": "23825",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23825" "url": "http://secunia.com/advisories/23825"
},
{
"name" : "mgb-email-sql-injection(31551)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31551"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "26053",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26053"
},
{
"name": "ADV-2007-2508",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2508"
},
{
"name": "36118",
"refsource": "OSVDB",
"url": "http://osvdb.org/36118"
},
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html", "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html",
"refsource": "MISC", "refsource": "MISC",
@ -66,21 +81,6 @@
"name": "24282", "name": "24282",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/24282" "url": "http://www.securityfocus.com/bid/24282"
},
{
"name" : "36118",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36118"
},
{
"name" : "ADV-2007-2508",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2508"
},
{
"name" : "26053",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26053"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "3183",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3183"
},
{ {
"name": "ADV-2007-0318", "name": "ADV-2007-0318",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0318" "url": "http://www.vupen.com/english/advisories/2007/0318"
}, },
{
"name": "23874",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23874"
},
{ {
"name": "32957", "name": "32957",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/32957" "url": "http://osvdb.org/32957"
}, },
{ {
"name" : "23874", "name": "3183",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/23874" "url": "https://www.exploit-db.com/exploits/3183"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070318 Net Portal Dynamic System (NPDS) <= 5.10 Remote Code Execution 0day",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/463176/100/0/threaded"
},
{ {
"name": "20070323 Root cause of NPDS SQL injection is variable extraction/evaluation", "name": "20070323 Root cause of NPDS SQL injection is variable extraction/evaluation",
"refsource": "VIM", "refsource": "VIM",
@ -67,6 +62,11 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24571" "url": "http://secunia.com/advisories/24571"
}, },
{
"name": "20070318 Net Portal Dynamic System (NPDS) <= 5.10 Remote Code Execution 0day",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/463176/100/0/threaded"
},
{ {
"name": "2473", "name": "2473",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2007-1199",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1199"
},
{ {
"name": "20070331 IBM Tivoli Provisioning Manager for OS Deployment Multiple Vulnerabilities", "name": "20070331 IBM Tivoli Provisioning Manager for OS Deployment Multiple Vulnerabilities",
"refsource": "IDEFENSE", "refsource": "IDEFENSE",
@ -67,16 +72,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/23264" "url": "http://www.securityfocus.com/bid/23264"
}, },
{
"name" : "ADV-2007-1199",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1199"
},
{
"name" : "1017840",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017840"
},
{ {
"name": "24717", "name": "24717",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -86,6 +81,11 @@
"name": "tivoli-post-code-execution(33384)", "name": "tivoli-post-code-execution(33384)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33384" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33384"
},
{
"name": "1017840",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017840"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "39177",
"refsource": "OSVDB",
"url": "http://osvdb.org/39177"
},
{
"name": "sqlite-sqlitedecodebinary-bo(38518)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38518"
},
{ {
"name": "http://www.php-security.org/MOPB/MOPB-41-2007.html", "name": "http://www.php-security.org/MOPB/MOPB-41-2007.html",
"refsource": "MISC", "refsource": "MISC",
@ -62,11 +72,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.sqlite.org/cvstrac/rlog?f=sqlite/src/encode.c" "url": "http://www.sqlite.org/cvstrac/rlog?f=sqlite/src/encode.c"
}, },
{
"name" : "MDKSA-2007:091",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:091"
},
{ {
"name": "USN-455-1", "name": "USN-455-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -78,19 +83,14 @@
"url": "http://www.attrition.org/pipermail/vim/2007-April/001540.html" "url": "http://www.attrition.org/pipermail/vim/2007-April/001540.html"
}, },
{ {
"name" : "39177", "name": "MDKSA-2007:091",
"refsource" : "OSVDB", "refsource": "MANDRIVA",
"url" : "http://osvdb.org/39177" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:091"
}, },
{ {
"name": "25057", "name": "25057",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25057" "url": "http://secunia.com/advisories/25057"
},
{
"name" : "sqlite-sqlitedecodebinary-bo(38518)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38518"
} }
] ]
} }

View File

@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070925 SimpGB version 1.46.02 File Content Disclosure Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/480592/100/0/threaded"
},
{
"name" : "20070925 SimpGB version 1.46.02 Information Disclosure Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/480590/100/0/threaded"
},
{
"name" : "http://www.netvigilance.com/advisory0065",
"refsource" : "MISC",
"url" : "http://www.netvigilance.com/advisory0065"
},
{
"name" : "http://www.netvigilance.com/advisory0066",
"refsource" : "MISC",
"url" : "http://www.netvigilance.com/advisory0066"
},
{ {
"name": "http://forum.boesch-it.de/viewtopic.php?t=2790", "name": "http://forum.boesch-it.de/viewtopic.php?t=2790",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -83,24 +63,44 @@
"url": "http://osvdb.org/40612" "url": "http://osvdb.org/40612"
}, },
{ {
"name" : "40613", "name": "simpgb-htaccess-information-disclosure(36777)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/40613" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36777"
}, },
{ {
"name": "26974", "name": "26974",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26974" "url": "http://secunia.com/advisories/26974"
}, },
{
"name": "40613",
"refsource": "OSVDB",
"url": "http://osvdb.org/40613"
},
{ {
"name": "simpgb-cfginfo-information-disclosure(36776)", "name": "simpgb-cfginfo-information-disclosure(36776)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36776" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36776"
}, },
{ {
"name" : "simpgb-htaccess-information-disclosure(36777)", "name": "http://www.netvigilance.com/advisory0066",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36777" "url": "http://www.netvigilance.com/advisory0066"
},
{
"name": "http://www.netvigilance.com/advisory0065",
"refsource": "MISC",
"url": "http://www.netvigilance.com/advisory0065"
},
{
"name": "20070925 SimpGB version 1.46.02 File Content Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/480592/100/0/threaded"
},
{
"name": "20070925 SimpGB version 1.46.02 Information Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/480590/100/0/threaded"
} }
] ]
} }

View File

@ -57,21 +57,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
}, },
{
"name" : "HPSBMA02133",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name" : "SSRT061201",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name" : "TA07-290A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
},
{ {
"name": "ADV-2007-3524", "name": "ADV-2007-3524",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -82,20 +67,35 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3626" "url": "http://www.vupen.com/english/advisories/2007/3626"
}, },
{
"name": "TA07-290A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
},
{
"name": "SSRT061201",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name": "HPSBMA02133",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{ {
"name": "1018823", "name": "1018823",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018823" "url": "http://www.securitytracker.com/id?1018823"
}, },
{
"name" : "27251",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27251"
},
{ {
"name": "27409", "name": "27409",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27409" "url": "http://secunia.com/advisories/27409"
},
{
"name": "27251",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27251"
} }
] ]
} }

View File

@ -52,30 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "PK50245",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1PK50245"
},
{ {
"name": "26276", "name": "26276",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26276" "url": "http://www.securityfocus.com/bid/26276"
}, },
{ {
"name" : "ADV-2007-3672", "name": "websphere-navigatetree-xss(38177)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2007/3672" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38177"
},
{
"name" : "41618",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/41618"
},
{
"name" : "1018884",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018884"
}, },
{ {
"name": "27448", "name": "27448",
@ -83,9 +68,24 @@
"url": "http://secunia.com/advisories/27448" "url": "http://secunia.com/advisories/27448"
}, },
{ {
"name" : "websphere-navigatetree-xss(38177)", "name": "PK50245",
"refsource" : "XF", "refsource": "AIXAPAR",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38177" "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK50245"
},
{
"name": "41618",
"refsource": "OSVDB",
"url": "http://osvdb.org/41618"
},
{
"name": "ADV-2007-3672",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3672"
},
{
"name": "1018884",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018884"
} }
] ]
} }

View File

@ -53,29 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.syndeocms.org/forum/index.php?topic=1737.0", "name": "26321",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.syndeocms.org/forum/index.php?topic=1737.0" "url": "http://www.securityfocus.com/bid/26321"
}, },
{ {
"name": "4607", "name": "4607",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4607" "url": "https://www.exploit-db.com/exploits/4607"
}, },
{
"name" : "26321",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26321"
},
{ {
"name": "ADV-2007-3748", "name": "ADV-2007-3748",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3748" "url": "http://www.vupen.com/english/advisories/2007/3748"
}, },
{ {
"name" : "38406", "name": "syndeocms-maininc-file-include(38244)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/38406" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38244"
}, },
{ {
"name": "27527", "name": "27527",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/27527" "url": "http://secunia.com/advisories/27527"
}, },
{ {
"name" : "syndeocms-maininc-file-include(38244)", "name": "http://www.syndeocms.org/forum/index.php?topic=1737.0",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38244" "url": "http://www.syndeocms.org/forum/index.php?topic=1737.0"
},
{
"name": "38406",
"refsource": "OSVDB",
"url": "http://osvdb.org/38406"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt",
"refsource" : "MISC",
"url" : "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt"
},
{ {
"name": "26347", "name": "26347",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26347" "url": "http://www.securityfocus.com/bid/26347"
}, },
{
"name" : "27525",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27525"
},
{ {
"name": "openbase-stored-command-execution(38291)", "name": "openbase-stored-command-execution(38291)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38291" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38291"
},
{
"name": "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt",
"refsource": "MISC",
"url": "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt"
},
{
"name": "27525",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27525"
} }
] ]
} }

View File

@ -57,30 +57,30 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.netcommons.org/modules/journal/journal_detail.php?block_id=2121&news_id=316&op=comment#2121" "url": "http://www.netcommons.org/modules/journal/journal_detail.php?block_id=2121&news_id=316&op=comment#2121"
}, },
{
"name" : "JVN#79295963",
"refsource" : "JVN",
"url" : "http://jvn.jp/jp/JVN%2379295963/index.html"
},
{ {
"name": "26328", "name": "26328",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26328" "url": "http://www.securityfocus.com/bid/26328"
}, },
{
"name": "netcommons-unspecified-parameters-xss(38257)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38257"
},
{ {
"name": "ADV-2007-3717", "name": "ADV-2007-3717",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3717" "url": "http://www.vupen.com/english/advisories/2007/3717"
}, },
{
"name": "JVN#79295963",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2379295963/index.html"
},
{ {
"name": "27484", "name": "27484",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27484" "url": "http://secunia.com/advisories/27484"
},
{
"name" : "netcommons-unspecified-parameters-xss(38257)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38257"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3205", "ID": "CVE-2015-3205",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "37249",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/37249/"
},
{ {
"name": "http://packetstormsecurity.com/files/132257/Libmimedir-VCF-Memory-Corruption-Proof-Of-Concept.html", "name": "http://packetstormsecurity.com/files/132257/Libmimedir-VCF-Memory-Corruption-Proof-Of-Concept.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132257/Libmimedir-VCF-Memory-Corruption-Proof-Of-Concept.html" "url": "http://packetstormsecurity.com/files/132257/Libmimedir-VCF-Memory-Corruption-Proof-Of-Concept.html"
}, },
{
"name": "37249",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37249/"
},
{ {
"name": "75147", "name": "75147",
"refsource": "BID", "refsource": "BID",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150504 Re: CVE requests / Advisory: phpMyBackupPro",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/05/04/4"
},
{ {
"name": "1032250", "name": "1032250",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032250" "url": "http://www.securitytracker.com/id/1032250"
},
{
"name": "[oss-security] 20150504 Re: CVE requests / Advisory: phpMyBackupPro",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/05/04/4"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6887", "ID": "CVE-2015-6887",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-7662", "ID": "CVE-2015-7662",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "name": "1034111",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" "url": "http://www.securitytracker.com/id/1034111"
},
{
"name" : "GLSA-201511-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201511-02"
},
{
"name" : "RHSA-2015:2023",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
}, },
{ {
"name": "RHSA-2015:2024", "name": "RHSA-2015:2024",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html"
}, },
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
},
{ {
"name": "openSUSE-SU-2015:1984", "name": "openSUSE-SU-2015:1984",
"refsource": "SUSE", "refsource": "SUSE",
@ -83,9 +78,14 @@
"url": "http://www.securityfocus.com/bid/77535" "url": "http://www.securityfocus.com/bid/77535"
}, },
{ {
"name" : "1034111", "name": "GLSA-201511-02",
"refsource" : "SECTRACK", "refsource": "GENTOO",
"url" : "http://www.securitytracker.com/id/1034111" "url": "https://security.gentoo.org/glsa/201511-02"
},
{
"name": "RHSA-2015:2023",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
} }
] ]
} }

View File

@ -52,115 +52,115 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20151022 Crafted xml causes out of bound memory access - Libxml2",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/10/22/5"
},
{
"name" : "[oss-security] 20151022 Re: Crafted xml causes out of bound memory access - Libxml2",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/10/22/8"
},
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=744980",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=744980"
},
{
"name" : "https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489",
"refsource" : "CONFIRM",
"url" : "https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489"
},
{
"name" : "https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31",
"refsource" : "CONFIRM",
"url" : "https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31"
},
{
"name" : "http://xmlsoft.org/news.html",
"refsource" : "CONFIRM",
"url" : "http://xmlsoft.org/news.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name" : "DSA-3430",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3430"
},
{
"name" : "FEDORA-2016-189a7bf68c",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html"
},
{
"name" : "FEDORA-2016-a9ee80b01d",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html"
},
{
"name" : "GLSA-201701-37",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-37"
},
{
"name" : "HPSBGN03537",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=145382616617563&w=2"
},
{
"name" : "RHSA-2015:2549",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2549.html"
},
{ {
"name": "RHSA-2015:2550", "name": "RHSA-2015:2550",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2550.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-2550.html"
}, },
{
"name" : "RHSA-2016:1089",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1089.html"
},
{
"name" : "openSUSE-SU-2015:2372",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html"
},
{
"name" : "openSUSE-SU-2016:0106",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html"
},
{
"name" : "USN-2812-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2812-1"
},
{ {
"name": "74241", "name": "74241",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/74241" "url": "http://www.securityfocus.com/bid/74241"
}, },
{
"name": "openSUSE-SU-2016:0106",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html"
},
{
"name": "[oss-security] 20151022 Crafted xml causes out of bound memory access - Libxml2",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/10/22/5"
},
{
"name": "https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489"
},
{
"name": "DSA-3430",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3430"
},
{
"name": "http://xmlsoft.org/news.html",
"refsource": "CONFIRM",
"url": "http://xmlsoft.org/news.html"
},
{
"name": "FEDORA-2016-a9ee80b01d",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=744980",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=744980"
},
{
"name": "RHSA-2016:1089",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1089.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{ {
"name": "1034243", "name": "1034243",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034243" "url": "http://www.securitytracker.com/id/1034243"
},
{
"name": "RHSA-2015:2549",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2549.html"
},
{
"name": "USN-2812-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2812-1"
},
{
"name": "HPSBGN03537",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=145382616617563&w=2"
},
{
"name": "FEDORA-2016-189a7bf68c",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name": "GLSA-201701-37",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-37"
},
{
"name": "openSUSE-SU-2015:2372",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html"
},
{
"name": "[oss-security] 20151022 Re: Crafted xml causes out of bound memory access - Libxml2",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/10/22/8"
},
{
"name": "https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1034288",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034288"
},
{ {
"name": "http://www.quantumleap.it/mcafee-siem-esm-esmrec-and-esmlm-authentication-bypass-vulnerability/", "name": "http://www.quantumleap.it/mcafee-siem-esm-esmrec-and-esmlm-authentication-bypass-vulnerability/",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10137", "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10137",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10137" "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10137"
},
{
"name" : "1034288",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034288"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-8056", "ID": "CVE-2015-8056",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "openSUSE-SU-2015:2239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{ {
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html", "name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html" "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
}, },
{ {
"name" : "GLSA-201601-03", "name": "78715",
"refsource" : "GENTOO", "refsource": "BID",
"url" : "https://security.gentoo.org/glsa/201601-03" "url": "http://www.securityfocus.com/bid/78715"
}, },
{ {
"name": "SUSE-SU-2015:2236", "name": "SUSE-SU-2015:2236",
@ -72,20 +77,15 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
}, },
{
"name" : "openSUSE-SU-2015:2239",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{
"name" : "78715",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/78715"
},
{ {
"name": "1034318", "name": "1034318",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034318" "url": "http://www.securitytracker.com/id/1034318"
},
{
"name": "GLSA-201601-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-03"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537099/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/537099/100/0/threaded"
}, },
{
"name" : "20151213 XSS Vulnerability in Synnefo Client for Synnefo IMS 2015 - CVE-2015-8247",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Dec/54"
},
{ {
"name": "http://packetstormsecurity.com/files/134797/Synnefo-Client-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/134797/Synnefo-Client-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/134797/Synnefo-Client-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/134797/Synnefo-Client-Cross-Site-Scripting.html"
},
{
"name": "20151213 XSS Vulnerability in Synnefo Client for Synnefo IMS 2015 - CVE-2015-8247",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Dec/54"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0104", "ID": "CVE-2016-0104",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS16-023", "name": "1035203",
"refsource" : "MS", "refsource": "SECTRACK",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-023" "url": "http://www.securitytracker.com/id/1035203"
}, },
{ {
"name": "84009", "name": "84009",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/84009" "url": "http://www.securityfocus.com/bid/84009"
}, },
{ {
"name" : "1035203", "name": "MS16-023",
"refsource" : "SECTRACK", "refsource": "MS",
"url" : "http://www.securitytracker.com/id/1035203" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-023"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216"
},
{ {
"name": "http://www.ibm.com/support/docview.wss?uid=swg21975358", "name": "http://www.ibm.com/support/docview.wss?uid=swg21975358",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21975358" "url": "http://www.ibm.com/support/docview.wss?uid=swg21975358"
},
{
"name": "http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21975358",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21975358"
},
{ {
"name": "PI54088", "name": "PI54088",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI54088" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI54088"
}, },
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21975358",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21975358"
},
{ {
"name": "83488", "name": "83488",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1048", "ID": "CVE-2016-1048",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,11 +57,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-296" "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-296"
}, },
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{ {
"name": "90512", "name": "90512",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "1035828", "name": "1035828",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828" "url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1409", "ID": "CVE-2016-1409",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-ipv6-en",
"refsource" : "CONFIRM",
"url" : "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-ipv6-en"
},
{ {
"name": "20160525 Cisco Products IPv6 Neighbor Discovery Crafted Packet Denial of Service Vulnerability", "name": "20160525 Cisco Products IPv6 Neighbor Discovery Crafted Packet Denial of Service Vulnerability",
"refsource": "CISCO", "refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160525-ipv6" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160525-ipv6"
}, },
{
"name" : "90872",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90872"
},
{
"name" : "1035962",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035962"
},
{
"name" : "1035963",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035963"
},
{ {
"name": "1035964", "name": "1035964",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035964" "url": "http://www.securitytracker.com/id/1035964"
}, },
{
"name": "90872",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90872"
},
{ {
"name": "1035965", "name": "1035965",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035965" "url": "http://www.securitytracker.com/id/1035965"
}, },
{
"name": "1035962",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035962"
},
{ {
"name": "1036651", "name": "1036651",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036651" "url": "http://www.securitytracker.com/id/1036651"
},
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-ipv6-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-ipv6-en"
},
{
"name": "1035963",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035963"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1732", "ID": "CVE-2016-1732",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/HT206167",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206167"
},
{ {
"name": "APPLE-SA-2016-03-21-5", "name": "APPLE-SA-2016-03-21-5",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
}, },
{
"name": "https://support.apple.com/HT206167",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206167"
},
{ {
"name": "1035363", "name": "1035363",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html", "name": "1037273",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html" "url": "http://www.securitytracker.com/id/1037273"
},
{
"name" : "https://crbug.com/660678",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/660678"
}, },
{ {
"name": "GLSA-201611-16", "name": "GLSA-201611-16",
@ -68,9 +63,9 @@
"url": "https://security.gentoo.org/glsa/201611-16" "url": "https://security.gentoo.org/glsa/201611-16"
}, },
{ {
"name" : "RHSA-2016:2718", "name": "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2718.html" "url": "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html"
}, },
{ {
"name": "94196", "name": "94196",
@ -78,9 +73,14 @@
"url": "http://www.securityfocus.com/bid/94196" "url": "http://www.securityfocus.com/bid/94196"
}, },
{ {
"name" : "1037273", "name": "RHSA-2016:2718",
"refsource" : "SECTRACK", "refsource": "REDHAT",
"url" : "http://www.securitytracker.com/id/1037273" "url": "http://rhn.redhat.com/errata/RHSA-2016-2718.html"
},
{
"name": "https://crbug.com/660678",
"refsource": "CONFIRM",
"url": "https://crbug.com/660678"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5510", "ID": "CVE-2016-5510",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{ {
"name": "93669", "name": "93669",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/93669" "url": "http://www.securityfocus.com/bid/93669"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5631", "ID": "CVE-2016-5631",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{ {
"name": "GLSA-201701-01", "name": "GLSA-201701-01",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -67,6 +62,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/93684" "url": "http://www.securityfocus.com/bid/93684"
}, },
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{ {
"name": "1037050", "name": "1037050",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -57,16 +57,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://launchpad.support.sap.com/#/notes/2679789",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2679789"
},
{ {
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095", "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095" "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
}, },
{
"name": "https://launchpad.support.sap.com/#/notes/2679789",
"refsource": "MISC",
"url": "https://launchpad.support.sap.com/#/notes/2679789"
},
{ {
"name": "105526", "name": "105526",
"refsource": "BID", "refsource": "BID",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/TeamSeri0us/pocs/tree/master/matio",
"refsource" : "MISC",
"url" : "https://github.com/TeamSeri0us/pocs/tree/master/matio"
},
{ {
"name": "https://github.com/tbeu/matio/issues/103", "name": "https://github.com/tbeu/matio/issues/103",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/tbeu/matio/issues/103" "url": "https://github.com/tbeu/matio/issues/103"
},
{
"name": "https://github.com/TeamSeri0us/pocs/tree/master/matio",
"refsource": "MISC",
"url": "https://github.com/TeamSeri0us/pocs/tree/master/matio"
} }
] ]
} }