"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:42:57 +00:00
parent 3c87002b44
commit aa3bb49410
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
66 changed files with 3805 additions and 3805 deletions

View File

@ -57,15 +57,15 @@
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/328867"
},
{
"name" : "979",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/979"
},
{
"name": "4417",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4417"
},
{
"name": "979",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/979"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20000620 CUPS DoS Bugs",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-06/0188.html"
"name": "debian-cups-posts(4846)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4846"
},
{
"name": "ftp://ftp.easysw.com/pub/cups/1.0.5/cups-DoS.patch",
"refsource": "CONFIRM",
"url": "ftp://ftp.easysw.com/pub/cups/1.0.5/cups-DoS.patch"
},
{
"name": "20000620 CUPS DoS Bugs",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0188.html"
},
{
"name": "1373",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1373"
},
{
"name" : "debian-cups-posts(4846)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/4846"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS00-046",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-046"
},
{
"name" : "CA-2000-14",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2000-14.html"
},
{
"name": "1501",
"refsource": "BID",
@ -71,6 +61,16 @@
"name": "outlook-cache-bypass(5013)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5013"
},
{
"name": "MS00-046",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-046"
},
{
"name": "CA-2000-14",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2000-14.html"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "glint-symlink(5271)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5271"
},
{
"name": "RHSA-2000:062",
"refsource": "REDHAT",
@ -61,11 +66,6 @@
"name": "1703",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1703"
},
{
"name" : "glint-symlink(5271)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5271"
}
]
}

View File

@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "3141",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3141"
},
{
"name" : "http://www.tv-kritik.net/mgb/index.php",
"refsource" : "CONFIRM",
"url" : "http://www.tv-kritik.net/mgb/index.php"
},
{
"name" : "20070118 vendor ACK for MGB Guestbook issue",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2007-January/001246.html"
"name": "31612",
"refsource": "OSVDB",
"url": "http://osvdb.org/31612"
},
{
"name": "22094",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22094"
},
{
"name": "mgb-email-sql-injection(31551)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31551"
},
{
"name": "http://www.tv-kritik.net/mgb/index.php",
"refsource": "CONFIRM",
"url": "http://www.tv-kritik.net/mgb/index.php"
},
{
"name": "3141",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3141"
},
{
"name": "20070118 vendor ACK for MGB Guestbook issue",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-January/001246.html"
},
{
"name": "ADV-2007-0232",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0232"
},
{
"name" : "31612",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/31612"
},
{
"name": "23825",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23825"
},
{
"name" : "mgb-email-sql-injection(31551)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31551"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "26053",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26053"
},
{
"name": "ADV-2007-2508",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2508"
},
{
"name": "36118",
"refsource": "OSVDB",
"url": "http://osvdb.org/36118"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html",
"refsource": "MISC",
@ -66,21 +81,6 @@
"name": "24282",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24282"
},
{
"name" : "36118",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36118"
},
{
"name" : "ADV-2007-2508",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2508"
},
{
"name" : "26053",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26053"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "3183",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3183"
},
{
"name": "ADV-2007-0318",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0318"
},
{
"name": "23874",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23874"
},
{
"name": "32957",
"refsource": "OSVDB",
"url": "http://osvdb.org/32957"
},
{
"name" : "23874",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23874"
"name": "3183",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3183"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20070318 Net Portal Dynamic System (NPDS) <= 5.10 Remote Code Execution 0day",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/463176/100/0/threaded"
},
{
"name": "20070323 Root cause of NPDS SQL injection is variable extraction/evaluation",
"refsource": "VIM",
@ -67,6 +62,11 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24571"
},
{
"name": "20070318 Net Portal Dynamic System (NPDS) <= 5.10 Remote Code Execution 0day",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/463176/100/0/threaded"
},
{
"name": "2473",
"refsource": "SREASON",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2007-1199",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1199"
},
{
"name": "20070331 IBM Tivoli Provisioning Manager for OS Deployment Multiple Vulnerabilities",
"refsource": "IDEFENSE",
@ -67,16 +72,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23264"
},
{
"name" : "ADV-2007-1199",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1199"
},
{
"name" : "1017840",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017840"
},
{
"name": "24717",
"refsource": "SECUNIA",
@ -86,6 +81,11 @@
"name": "tivoli-post-code-execution(33384)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33384"
},
{
"name": "1017840",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017840"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "39177",
"refsource": "OSVDB",
"url": "http://osvdb.org/39177"
},
{
"name": "sqlite-sqlitedecodebinary-bo(38518)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38518"
},
{
"name": "http://www.php-security.org/MOPB/MOPB-41-2007.html",
"refsource": "MISC",
@ -62,11 +72,6 @@
"refsource": "MISC",
"url": "http://www.sqlite.org/cvstrac/rlog?f=sqlite/src/encode.c"
},
{
"name" : "MDKSA-2007:091",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:091"
},
{
"name": "USN-455-1",
"refsource": "UBUNTU",
@ -78,19 +83,14 @@
"url": "http://www.attrition.org/pipermail/vim/2007-April/001540.html"
},
{
"name" : "39177",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/39177"
"name": "MDKSA-2007:091",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:091"
},
{
"name": "25057",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25057"
},
{
"name" : "sqlite-sqlitedecodebinary-bo(38518)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38518"
}
]
}

View File

@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20070925 SimpGB version 1.46.02 File Content Disclosure Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/480592/100/0/threaded"
},
{
"name" : "20070925 SimpGB version 1.46.02 Information Disclosure Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/480590/100/0/threaded"
},
{
"name" : "http://www.netvigilance.com/advisory0065",
"refsource" : "MISC",
"url" : "http://www.netvigilance.com/advisory0065"
},
{
"name" : "http://www.netvigilance.com/advisory0066",
"refsource" : "MISC",
"url" : "http://www.netvigilance.com/advisory0066"
},
{
"name": "http://forum.boesch-it.de/viewtopic.php?t=2790",
"refsource": "CONFIRM",
@ -83,24 +63,44 @@
"url": "http://osvdb.org/40612"
},
{
"name" : "40613",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/40613"
"name": "simpgb-htaccess-information-disclosure(36777)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36777"
},
{
"name": "26974",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26974"
},
{
"name": "40613",
"refsource": "OSVDB",
"url": "http://osvdb.org/40613"
},
{
"name": "simpgb-cfginfo-information-disclosure(36776)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36776"
},
{
"name" : "simpgb-htaccess-information-disclosure(36777)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36777"
"name": "http://www.netvigilance.com/advisory0066",
"refsource": "MISC",
"url": "http://www.netvigilance.com/advisory0066"
},
{
"name": "http://www.netvigilance.com/advisory0065",
"refsource": "MISC",
"url": "http://www.netvigilance.com/advisory0065"
},
{
"name": "20070925 SimpGB version 1.46.02 File Content Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/480592/100/0/threaded"
},
{
"name": "20070925 SimpGB version 1.46.02 Information Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/480590/100/0/threaded"
}
]
}

View File

@ -57,21 +57,6 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
},
{
"name" : "HPSBMA02133",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name" : "SSRT061201",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name" : "TA07-290A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
},
{
"name": "ADV-2007-3524",
"refsource": "VUPEN",
@ -82,20 +67,35 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3626"
},
{
"name": "TA07-290A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
},
{
"name": "SSRT061201",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name": "HPSBMA02133",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name": "1018823",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018823"
},
{
"name" : "27251",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27251"
},
{
"name": "27409",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27409"
},
{
"name": "27251",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27251"
}
]
}

View File

@ -52,30 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "PK50245",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1PK50245"
},
{
"name": "26276",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26276"
},
{
"name" : "ADV-2007-3672",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3672"
},
{
"name" : "41618",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/41618"
},
{
"name" : "1018884",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018884"
"name": "websphere-navigatetree-xss(38177)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38177"
},
{
"name": "27448",
@ -83,9 +68,24 @@
"url": "http://secunia.com/advisories/27448"
},
{
"name" : "websphere-navigatetree-xss(38177)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38177"
"name": "PK50245",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK50245"
},
{
"name": "41618",
"refsource": "OSVDB",
"url": "http://osvdb.org/41618"
},
{
"name": "ADV-2007-3672",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3672"
},
{
"name": "1018884",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018884"
}
]
}

View File

@ -53,29 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://www.syndeocms.org/forum/index.php?topic=1737.0",
"refsource" : "CONFIRM",
"url" : "http://www.syndeocms.org/forum/index.php?topic=1737.0"
"name": "26321",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26321"
},
{
"name": "4607",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4607"
},
{
"name" : "26321",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26321"
},
{
"name": "ADV-2007-3748",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3748"
},
{
"name" : "38406",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38406"
"name": "syndeocms-maininc-file-include(38244)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38244"
},
{
"name": "27527",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/27527"
},
{
"name" : "syndeocms-maininc-file-include(38244)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38244"
"name": "http://www.syndeocms.org/forum/index.php?topic=1737.0",
"refsource": "CONFIRM",
"url": "http://www.syndeocms.org/forum/index.php?topic=1737.0"
},
{
"name": "38406",
"refsource": "OSVDB",
"url": "http://osvdb.org/38406"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt",
"refsource" : "MISC",
"url" : "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt"
},
{
"name": "26347",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26347"
},
{
"name" : "27525",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27525"
},
{
"name": "openbase-stored-command-execution(38291)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38291"
},
{
"name": "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt",
"refsource": "MISC",
"url": "http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt"
},
{
"name": "27525",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27525"
}
]
}

View File

@ -57,30 +57,30 @@
"refsource": "CONFIRM",
"url": "http://www.netcommons.org/modules/journal/journal_detail.php?block_id=2121&news_id=316&op=comment#2121"
},
{
"name" : "JVN#79295963",
"refsource" : "JVN",
"url" : "http://jvn.jp/jp/JVN%2379295963/index.html"
},
{
"name": "26328",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26328"
},
{
"name": "netcommons-unspecified-parameters-xss(38257)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38257"
},
{
"name": "ADV-2007-3717",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3717"
},
{
"name": "JVN#79295963",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2379295963/index.html"
},
{
"name": "27484",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27484"
},
{
"name" : "netcommons-unspecified-parameters-xss(38257)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38257"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3205",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "37249",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/37249/"
},
{
"name": "http://packetstormsecurity.com/files/132257/Libmimedir-VCF-Memory-Corruption-Proof-Of-Concept.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132257/Libmimedir-VCF-Memory-Corruption-Proof-Of-Concept.html"
},
{
"name": "37249",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37249/"
},
{
"name": "75147",
"refsource": "BID",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150504 Re: CVE requests / Advisory: phpMyBackupPro",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/05/04/4"
},
{
"name": "1032250",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032250"
},
{
"name": "[oss-security] 20150504 Re: CVE requests / Advisory: phpMyBackupPro",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/05/04/4"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6887",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-7662",
"STATE": "PUBLIC"
},
@ -53,25 +53,20 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
},
{
"name" : "GLSA-201511-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201511-02"
},
{
"name" : "RHSA-2015:2023",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
"name": "1034111",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034111"
},
{
"name": "RHSA-2015:2024",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
},
{
"name": "openSUSE-SU-2015:1984",
"refsource": "SUSE",
@ -83,9 +78,14 @@
"url": "http://www.securityfocus.com/bid/77535"
},
{
"name" : "1034111",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034111"
"name": "GLSA-201511-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201511-02"
},
{
"name": "RHSA-2015:2023",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
}
]
}

View File

@ -52,115 +52,115 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20151022 Crafted xml causes out of bound memory access - Libxml2",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/10/22/5"
},
{
"name" : "[oss-security] 20151022 Re: Crafted xml causes out of bound memory access - Libxml2",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/10/22/8"
},
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=744980",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=744980"
},
{
"name" : "https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489",
"refsource" : "CONFIRM",
"url" : "https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489"
},
{
"name" : "https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31",
"refsource" : "CONFIRM",
"url" : "https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31"
},
{
"name" : "http://xmlsoft.org/news.html",
"refsource" : "CONFIRM",
"url" : "http://xmlsoft.org/news.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name" : "DSA-3430",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3430"
},
{
"name" : "FEDORA-2016-189a7bf68c",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html"
},
{
"name" : "FEDORA-2016-a9ee80b01d",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html"
},
{
"name" : "GLSA-201701-37",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-37"
},
{
"name" : "HPSBGN03537",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=145382616617563&w=2"
},
{
"name" : "RHSA-2015:2549",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2549.html"
},
{
"name": "RHSA-2015:2550",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2550.html"
},
{
"name" : "RHSA-2016:1089",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1089.html"
},
{
"name" : "openSUSE-SU-2015:2372",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html"
},
{
"name" : "openSUSE-SU-2016:0106",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html"
},
{
"name" : "USN-2812-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2812-1"
},
{
"name": "74241",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74241"
},
{
"name": "openSUSE-SU-2016:0106",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html"
},
{
"name": "[oss-security] 20151022 Crafted xml causes out of bound memory access - Libxml2",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/10/22/5"
},
{
"name": "https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489"
},
{
"name": "DSA-3430",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3430"
},
{
"name": "http://xmlsoft.org/news.html",
"refsource": "CONFIRM",
"url": "http://xmlsoft.org/news.html"
},
{
"name": "FEDORA-2016-a9ee80b01d",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=744980",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=744980"
},
{
"name": "RHSA-2016:1089",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1089.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name": "1034243",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034243"
},
{
"name": "RHSA-2015:2549",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2549.html"
},
{
"name": "USN-2812-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2812-1"
},
{
"name": "HPSBGN03537",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=145382616617563&w=2"
},
{
"name": "FEDORA-2016-189a7bf68c",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name": "GLSA-201701-37",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-37"
},
{
"name": "openSUSE-SU-2015:2372",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html"
},
{
"name": "[oss-security] 20151022 Re: Crafted xml causes out of bound memory access - Libxml2",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/10/22/8"
},
{
"name": "https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1034288",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034288"
},
{
"name": "http://www.quantumleap.it/mcafee-siem-esm-esmrec-and-esmlm-authentication-bypass-vulnerability/",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10137",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10137"
},
{
"name" : "1034288",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034288"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-8056",
"STATE": "PUBLIC"
},
@ -52,15 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2015:2239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
},
{
"name" : "GLSA-201601-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201601-03"
"name": "78715",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/78715"
},
{
"name": "SUSE-SU-2015:2236",
@ -72,20 +77,15 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
},
{
"name" : "openSUSE-SU-2015:2239",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{
"name" : "78715",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/78715"
},
{
"name": "1034318",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034318"
},
{
"name": "GLSA-201601-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-03"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537099/100/0/threaded"
},
{
"name" : "20151213 XSS Vulnerability in Synnefo Client for Synnefo IMS 2015 - CVE-2015-8247",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Dec/54"
},
{
"name": "http://packetstormsecurity.com/files/134797/Synnefo-Client-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/134797/Synnefo-Client-Cross-Site-Scripting.html"
},
{
"name": "20151213 XSS Vulnerability in Synnefo Client for Synnefo IMS 2015 - CVE-2015-8247",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Dec/54"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0104",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MS16-023",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-023"
"name": "1035203",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035203"
},
{
"name": "84009",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/84009"
},
{
"name" : "1035203",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035203"
"name": "MS16-023",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-023"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21975358",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21975358"
},
{
"name": "http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21975358",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21975358"
},
{
"name": "PI54088",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI54088"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21975358",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21975358"
},
{
"name": "83488",
"refsource": "BID",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1048",
"STATE": "PUBLIC"
},
@ -57,11 +57,6 @@
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-296"
},
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{
"name": "90512",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "1035828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1409",
"STATE": "PUBLIC"
},
@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-ipv6-en",
"refsource" : "CONFIRM",
"url" : "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-ipv6-en"
},
{
"name": "20160525 Cisco Products IPv6 Neighbor Discovery Crafted Packet Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160525-ipv6"
},
{
"name" : "90872",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90872"
},
{
"name" : "1035962",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035962"
},
{
"name" : "1035963",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035963"
},
{
"name": "1035964",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035964"
},
{
"name": "90872",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90872"
},
{
"name": "1035965",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035965"
},
{
"name": "1035962",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035962"
},
{
"name": "1036651",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036651"
},
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-ipv6-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-ipv6-en"
},
{
"name": "1035963",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035963"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1732",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT206167",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206167"
},
{
"name": "APPLE-SA-2016-03-21-5",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
},
{
"name": "https://support.apple.com/HT206167",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206167"
},
{
"name": "1035363",
"refsource": "SECTRACK",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html",
"refsource" : "CONFIRM",
"url" : "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html"
},
{
"name" : "https://crbug.com/660678",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/660678"
"name": "1037273",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037273"
},
{
"name": "GLSA-201611-16",
@ -68,9 +63,9 @@
"url": "https://security.gentoo.org/glsa/201611-16"
},
{
"name" : "RHSA-2016:2718",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2718.html"
"name": "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop_9.html"
},
{
"name": "94196",
@ -78,9 +73,14 @@
"url": "http://www.securityfocus.com/bid/94196"
},
{
"name" : "1037273",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037273"
"name": "RHSA-2016:2718",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2718.html"
},
{
"name": "https://crbug.com/660678",
"refsource": "CONFIRM",
"url": "https://crbug.com/660678"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5510",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "93669",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93669"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5631",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "GLSA-201701-01",
"refsource": "GENTOO",
@ -67,6 +62,11 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93684"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "1037050",
"refsource": "SECTRACK",

View File

@ -57,16 +57,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://launchpad.support.sap.com/#/notes/2679789",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2679789"
},
{
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
"refsource": "CONFIRM",
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
},
{
"name": "https://launchpad.support.sap.com/#/notes/2679789",
"refsource": "MISC",
"url": "https://launchpad.support.sap.com/#/notes/2679789"
},
{
"name": "105526",
"refsource": "BID",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/TeamSeri0us/pocs/tree/master/matio",
"refsource" : "MISC",
"url" : "https://github.com/TeamSeri0us/pocs/tree/master/matio"
},
{
"name": "https://github.com/tbeu/matio/issues/103",
"refsource": "MISC",
"url": "https://github.com/tbeu/matio/issues/103"
},
{
"name": "https://github.com/TeamSeri0us/pocs/tree/master/matio",
"refsource": "MISC",
"url": "https://github.com/TeamSeri0us/pocs/tree/master/matio"
}
]
}