mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
b416960949
commit
ac23fdf209
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "CSSA-1999-011.0",
|
"name": "255",
|
||||||
"refsource" : "CALDERA",
|
"refsource": "BID",
|
||||||
"url" : "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-011.0.txt"
|
"url": "http://www.securityfocus.com/bid/255"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.redhat.com/corp/support/errata/inn99_05_22.html",
|
"name": "http://www.redhat.com/corp/support/errata/inn99_05_22.html",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.redhat.com/corp/support/errata/inn99_05_22.html"
|
"url": "http://www.redhat.com/corp/support/errata/inn99_05_22.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "255",
|
"name": "CSSA-1999-011.0",
|
||||||
"refsource" : "BID",
|
"refsource": "CALDERA",
|
||||||
"url" : "http://www.securityfocus.com/bid/255"
|
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-011.0.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "bingo-bnsmrep1-file-include(31328)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31328"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "35898",
|
"name": "35898",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "1017477",
|
"name": "1017477",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1017477"
|
"url": "http://securitytracker.com/id?1017477"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "bingo-bnsmrep1-file-include(31328)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31328"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=475423&group_id=21558",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=475423&group_id=21558"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "22057",
|
"name": "22057",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/22057"
|
"url": "http://www.securityfocus.com/bid/22057"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2007-0183",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/0183"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "filezilla-options-queuectrl-bo(31500)",
|
"name": "filezilla-options-queuectrl-bo(31500)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31500"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31500"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://sourceforge.net/project/shownotes.php?release_id=475423&group_id=21558",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=475423&group_id=21558"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-0183",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/0183"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2007-0326",
|
"ID": "CVE-2007-0326",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-3181",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/3181"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#854769",
|
"name": "VU#854769",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/854769"
|
"url": "http://www.kb.cert.org/vuls/id/854769"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "photochannel-photo-upload-bo(36643)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36643"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "25685",
|
"name": "25685",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/25685"
|
"url": "http://www.securityfocus.com/bid/25685"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2007-3181",
|
"name": "1018701",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/3181"
|
"url": "http://www.securitytracker.com/id?1018701"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "37958",
|
"name": "37958",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/37958"
|
"url": "http://osvdb.org/37958"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1018701",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1018701"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "26830",
|
"name": "26830",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/26830"
|
"url": "http://secunia.com/advisories/26830"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "photochannel-photo-upload-bo(36643)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36643"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20070123 PR06-14: IP Phones based on Centrality Communications/Aredfox PA168 chipset weak session management vulnerability",
|
"name": "23936",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/457868/100/0/threaded"
|
"url": "http://secunia.com/advisories/23936"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.procheckup.com/Vulner_PR0614.php",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.procheckup.com/Vulner_PR0614.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "3189",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/3189"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-0346",
|
"name": "ADV-2007-0346",
|
||||||
@ -73,9 +63,14 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2007/0346"
|
"url": "http://www.vupen.com/english/advisories/2007/0346"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "32966",
|
"name": "http://www.procheckup.com/Vulner_PR0614.php",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "MISC",
|
||||||
"url" : "http://osvdb.org/32966"
|
"url": "http://www.procheckup.com/Vulner_PR0614.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070123 PR06-14: IP Phones based on Centrality Communications/Aredfox PA168 chipset weak session management vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/457868/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "23919",
|
"name": "23919",
|
||||||
@ -83,9 +78,14 @@
|
|||||||
"url": "http://secunia.com/advisories/23919"
|
"url": "http://secunia.com/advisories/23919"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "23936",
|
"name": "32966",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://secunia.com/advisories/23936"
|
"url": "http://osvdb.org/32966"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "3189",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/3189"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,14 +58,9 @@
|
|||||||
"url": "http://www.securityfocus.com/archive/1/461912/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/461912/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20071109 li-guestbook sql inj",
|
"name": "22821",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/483524/100/0/threaded"
|
"url": "http://www.securityfocus.com/bid/22821"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://belsec.com/advisories/139/summary.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://belsec.com/advisories/139/summary.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.security-news.ws/li-sql-injection",
|
"name": "http://www.security-news.ws/li-sql-injection",
|
||||||
@ -73,14 +68,14 @@
|
|||||||
"url": "http://www.security-news.ws/li-sql-injection"
|
"url": "http://www.security-news.ws/li-sql-injection"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22821",
|
"name": "20071109 li-guestbook sql inj",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/22821"
|
"url": "http://www.securityfocus.com/archive/1/483524/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "27650",
|
"name": "liguestbook-country-sql-injection(38369)",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "XF",
|
||||||
"url" : "http://secunia.com/advisories/27650"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38369"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "2348",
|
"name": "2348",
|
||||||
@ -88,9 +83,14 @@
|
|||||||
"url": "http://securityreason.com/securityalert/2348"
|
"url": "http://securityreason.com/securityalert/2348"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "liguestbook-country-sql-injection(38369)",
|
"name": "27650",
|
||||||
"refsource" : "XF",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38369"
|
"url": "http://secunia.com/advisories/27650"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://belsec.com/advisories/139/summary.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://belsec.com/advisories/139/summary.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20070315 Horde IMP Webmail Client version H3 (4.1.4) fixes multiple XSS issues",
|
"name": "1017774",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/462914/100/0/threaded"
|
"url": "http://www.securitytracker.com/id?1017774"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20070315 Horde IMP Webmail Client version H3 (4.1.4) fixes multiple XSS issues",
|
"name": "20070315 Horde IMP Webmail Client version H3 (4.1.4) fixes multiple XSS issues",
|
||||||
@ -68,24 +68,24 @@
|
|||||||
"url": "http://lists.horde.org/archives/announce/2007/000316.html"
|
"url": "http://lists.horde.org/archives/announce/2007/000316.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22975",
|
"name": "20070315 Horde IMP Webmail Client version H3 (4.1.4) fixes multiple XSS issues",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/22975"
|
"url": "http://www.securityfocus.com/archive/1/462914/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-0964",
|
"name": "ADV-2007-0964",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/0964"
|
"url": "http://www.vupen.com/english/advisories/2007/0964"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1017774",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1017774"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "24541",
|
"name": "24541",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/24541"
|
"url": "http://secunia.com/advisories/24541"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22975",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/22975"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20070314 Woltab Burning Board SQL Injection usergroups.php",
|
"name": "2455",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/462860/100/0/threaded"
|
"url": "http://securityreason.com/securityalert/2455"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20070315 Re: [Full-disclosure] Woltab Burning Board SQL Injection usergroups.php",
|
"name": "20070315 Re: [Full-disclosure] Woltab Burning Board SQL Injection usergroups.php",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/463002/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/463002/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20070314 Woltab Burning Board SQL Injection usergroups.php",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/462860/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "22970",
|
"name": "22970",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/22970"
|
"url": "http://www.securityfocus.com/bid/22970"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "2455",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/2455"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,36 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "24870",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24870"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070411 Cross site scripting in mephisto 0.7.3",
|
"name": "20070411 Cross site scripting in mephisto 0.7.3",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/465484/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/465484/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "23141",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/23141"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34911",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/34911"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "mephisto-search-xss(33620)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33620"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-1373",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/1373"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070412 Re: Cross site scripting in mephisto 0.7.3",
|
"name": "20070412 Re: Cross site scripting in mephisto 0.7.3",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -67,31 +92,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://int21.de/cve/CVE-2007-1873-mephisto.txt"
|
"url": "http://int21.de/cve/CVE-2007-1873-mephisto.txt"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "23141",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/23141"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-1373",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/1373"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34911",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/34911"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24870",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24870"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "mephisto-search-xss(33620)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33620"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "mephisto-search-function-xss(33484)",
|
"name": "mephisto-search-function-xss(33484)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -58,19 +58,9 @@
|
|||||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=504"
|
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=504"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.kaspersky.com/technews?id=203038694",
|
"name": "24778",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.kaspersky.com/technews?id=203038694"
|
"url": "http://secunia.com/advisories/24778"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "23325",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/23325"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-1268",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/1268"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1017871",
|
"name": "1017871",
|
||||||
@ -78,9 +68,19 @@
|
|||||||
"url": "http://www.securitytracker.com/id?1017871"
|
"url": "http://www.securitytracker.com/id?1017871"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "24778",
|
"name": "http://www.kaspersky.com/technews?id=203038694",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/24778"
|
"url": "http://www.kaspersky.com/technews?id=203038694"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-1268",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/1268"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23325",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/23325"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "kaspersky-startuploading-info-disclosure(33464)",
|
"name": "kaspersky-startuploading-info-disclosure(33464)",
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "43484",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/43484"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20071010 Vulnerabilities digest",
|
"name": "20071010 Vulnerabilities digest",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://securityvulns.ru/Sdocument68.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://securityvulns.ru/Sdocument68.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://websecurity.com.ua/1224/",
|
"name": "http://websecurity.com.ua/1224/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://websecurity.com.ua/1224/"
|
"url": "http://websecurity.com.ua/1224/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "43484",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/43484"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "3216",
|
"name": "3216",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/3216"
|
"url": "http://securityreason.com/securityalert/3216"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://securityvulns.ru/Sdocument68.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://securityvulns.ru/Sdocument68.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20071102 phphelpdesk Multiple vulnerabilities",
|
"name": "phphelpdesk-login-sql-injection(38260)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/483256/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38260"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "26319",
|
"name": "26319",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/26319"
|
"url": "http://www.securityfocus.com/bid/26319"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20071102 phphelpdesk Multiple vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/483256/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "3359",
|
"name": "3359",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/3359"
|
"url": "http://securityreason.com/securityalert/3359"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "phphelpdesk-login-sql-injection(38260)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38260"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2015-3110",
|
"ID": "CVE-2015-3110",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://helpx.adobe.com/security/products/bridge/apsb15-13.html",
|
"name": "1032659",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://helpx.adobe.com/security/products/bridge/apsb15-13.html"
|
"url": "http://www.securitytracker.com/id/1032659"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://helpx.adobe.com/security/products/photoshop/apsb15-12.html",
|
"name": "https://helpx.adobe.com/security/products/photoshop/apsb15-12.html",
|
||||||
@ -67,15 +67,15 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/75243"
|
"url": "http://www.securityfocus.com/bid/75243"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/bridge/apsb15-13.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/bridge/apsb15-13.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1032658",
|
"name": "1032658",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1032658"
|
"url": "http://www.securitytracker.com/id/1032658"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1032659",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1032659"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -62,16 +62,16 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036"
|
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c19860dba8d158c42865c3d9051b6f318cb41169",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c19860dba8d158c42865c3d9051b6f318cb41169"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201510-03",
|
"name": "GLSA-201510-03",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201510-03"
|
"url": "https://security.gentoo.org/glsa/201510-03"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c19860dba8d158c42865c3d9051b6f318cb41169",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c19860dba8d158c42865c3d9051b6f318cb41169"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "74628",
|
"name": "74628",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -53,70 +53,25 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20150511 [oCERT-2015-006] dcraw input sanitization errors",
|
"name": "74590",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/535513/100/0/threaded"
|
"url": "http://www.securityfocus.com/bid/74590"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.ocert.org/advisories/ocert-2015-006.html",
|
"name": "GLSA-201706-17",
|
||||||
"refsource" : "MISC",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://www.ocert.org/advisories/ocert-2015-006.html"
|
"url": "https://security.gentoo.org/glsa/201706-17"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/LibRaw/LibRaw/commit/4606c28f494a750892c5c1ac7903e62dd1c6fdb5",
|
"name": "https://github.com/LibRaw/LibRaw/commit/4606c28f494a750892c5c1ac7903e62dd1c6fdb5",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/LibRaw/LibRaw/commit/4606c28f494a750892c5c1ac7903e62dd1c6fdb5"
|
"url": "https://github.com/LibRaw/LibRaw/commit/4606c28f494a750892c5c1ac7903e62dd1c6fdb5"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://github.com/rawstudio/rawstudio/commit/983bda1f0fa5fa86884381208274198a620f006e",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/rawstudio/rawstudio/commit/983bda1f0fa5fa86884381208274198a620f006e"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2015-8482",
|
"name": "FEDORA-2015-8482",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159083.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159083.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-8498",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159123.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-8170",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162084.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-8621",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159665.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-8647",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159479.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-8671",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159625.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-8699",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159579.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-8706",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159518.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2015-8717",
|
"name": "FEDORA-2015-8717",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
@ -128,14 +83,59 @@
|
|||||||
"url": "https://security.gentoo.org/glsa/201701-54"
|
"url": "https://security.gentoo.org/glsa/201701-54"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201706-17",
|
"name": "FEDORA-2015-8706",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "FEDORA",
|
||||||
"url" : "https://security.gentoo.org/glsa/201706-17"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159518.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "74590",
|
"name": "FEDORA-2015-8671",
|
||||||
"refsource" : "BID",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://www.securityfocus.com/bid/74590"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159625.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-8170",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162084.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-8621",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159665.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-8699",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159579.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-8647",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159479.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20150511 [oCERT-2015-006] dcraw input sanitization errors",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/535513/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-8498",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159123.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.ocert.org/advisories/ocert-2015-006.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.ocert.org/advisories/ocert-2015-006.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/rawstudio/rawstudio/commit/983bda1f0fa5fa86884381208274198a620f006e",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/rawstudio/rawstudio/commit/983bda1f0fa5fa86884381208274198a620f006e"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-6879",
|
"ID": "CVE-2015-6879",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,41 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "38797",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/38797/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/",
|
"name": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/"
|
"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.rapid7.com/db/modules/auxiliary/gather/joomla_contenthistory_sqli",
|
"name": "http://www.rapid7.com/db/modules/auxiliary/gather/joomla_contenthistory_sqli",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.rapid7.com/db/modules/auxiliary/gather/joomla_contenthistory_sqli"
|
"url": "http://www.rapid7.com/db/modules/auxiliary/gather/joomla_contenthistory_sqli"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.rapid7.com/db/modules/exploit/unix/webapp/joomla_contenthistory_sqli_rce",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.rapid7.com/db/modules/exploit/unix/webapp/joomla_contenthistory_sqli_rce"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "77295",
|
"name": "77295",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -96,6 +71,31 @@
|
|||||||
"name": "1033950",
|
"name": "1033950",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1033950"
|
"url": "http://www.securitytracker.com/id/1033950"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.rapid7.com/db/modules/exploit/unix/webapp/joomla_contenthistory_sqli_rce",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.rapid7.com/db/modules/exploit/unix/webapp/joomla_contenthistory_sqli_rce"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "38797",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/38797/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2015-7453",
|
"ID": "CVE-2015-7453",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2015-7546",
|
"ID": "CVE-2015-7546",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://bugs.launchpad.net/keystone/+bug/1490804",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.launchpad.net/keystone/+bug/1490804"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://security.openstack.org/ossa/OSSA-2016-005.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://security.openstack.org/ossa/OSSA-2016-005.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://wiki.openstack.org/wiki/OSSN/OSSN-0062",
|
"name": "https://wiki.openstack.org/wiki/OSSN/OSSN-0062",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -72,6 +62,16 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.launchpad.net/keystone/+bug/1490804",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.launchpad.net/keystone/+bug/1490804"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://security.openstack.org/ossa/OSSA-2016-005.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://security.openstack.org/ossa/OSSA-2016-005.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "80498",
|
"name": "80498",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||||
"ID": "CVE-2015-7903",
|
"ID": "CVE-2015-7903",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2015-8269",
|
"ID": "CVE-2015-8269",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://community.rapid7.com/community/infosec/blog/2016/02/02/security-vulnerabilities-within-fisher-price-smart-toy-hereo-gps-platform",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://community.rapid7.com/community/infosec/blog/2016/02/02/security-vulnerabilities-within-fisher-price-smart-toy-hereo-gps-platform"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.kb.cert.org/vuls/id/GWAN-A6LPPW",
|
"name": "https://www.kb.cert.org/vuls/id/GWAN-A6LPPW",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www.kb.cert.org/vuls/id/GWAN-A6LPPW"
|
"url": "https://www.kb.cert.org/vuls/id/GWAN-A6LPPW"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://community.rapid7.com/community/infosec/blog/2016/02/02/security-vulnerabilities-within-fisher-price-smart-toy-hereo-gps-platform",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://community.rapid7.com/community/infosec/blog/2016/02/02/security-vulnerabilities-within-fisher-price-smart-toy-hereo-gps-platform"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#719736",
|
"name": "VU#719736",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://packetstormsecurity.com/files/136763/Exponent-CMS-2.3.5-Cross-Site-Scripting.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://packetstormsecurity.com/files/136763/Exponent-CMS-2.3.5-Cross-Site-Scripting.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://exponentcms.lighthouseapp.com/projects/61783/tickets/1320-exponent-cms-235-cross-site-scripting-vulnerability",
|
"name": "https://exponentcms.lighthouseapp.com/projects/61783/tickets/1320-exponent-cms-235-cross-site-scripting-vulnerability",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://exponentcms.lighthouseapp.com/projects/61783/tickets/1320-exponent-cms-235-cross-site-scripting-vulnerability"
|
"url": "https://exponentcms.lighthouseapp.com/projects/61783/tickets/1320-exponent-cms-235-cross-site-scripting-vulnerability"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://packetstormsecurity.com/files/136763/Exponent-CMS-2.3.5-Cross-Site-Scripting.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://packetstormsecurity.com/files/136763/Exponent-CMS-2.3.5-Cross-Site-Scripting.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2015-35.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2015-35.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9887",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9887"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=eb6ccb1b0c4ad02b828652c3fe6e8d51c30a315e",
|
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=eb6ccb1b0c4ad02b828652c3fe6e8d51c30a315e",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=eb6ccb1b0c4ad02b828652c3fe6e8d51c30a315e"
|
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=eb6ccb1b0c4ad02b828652c3fe6e8d51c30a315e"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-3505",
|
"name": "DSA-3505",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2016/dsa-3505"
|
"url": "http://www.debian.org/security/2016/dsa-3505"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "79816",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/79816"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201604-05",
|
"name": "GLSA-201604-05",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201604-05"
|
"url": "https://security.gentoo.org/glsa/201604-05"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "79816",
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/79816"
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9887",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9887"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.wireshark.org/security/wnpa-sec-2015-35.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.wireshark.org/security/wnpa-sec-2015-35.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1034551",
|
"name": "1034551",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2015-8998",
|
"ID": "CVE-2015-8998",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2016-0053",
|
"ID": "CVE-2016-0053",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1034976",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1034976"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "MS16-015",
|
"name": "MS16-015",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "1034975",
|
"name": "1034975",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034975"
|
"url": "http://www.securitytracker.com/id/1034975"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1034976",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1034976"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2016-0193",
|
"ID": "CVE-2016-0193",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-283",
|
"name": "1035821",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-283"
|
"url": "http://www.securitytracker.com/id/1035821"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MS16-052",
|
"name": "MS16-052",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-052"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-052"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-283",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-283"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "90009",
|
"name": "90009",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/90009"
|
"url": "http://www.securityfocus.com/bid/90009"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1035821",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1035821"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-0515",
|
"ID": "CVE-2016-0515",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-0673",
|
"ID": "CVE-2016-0673",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1035598",
|
"name": "1035598",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1035598"
|
"url": "http://www.securitytracker.com/id/1035598"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2016-0822",
|
"ID": "CVE-2016-0822",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2016-1302",
|
"ID": "CVE-2016-1302",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2016-1310",
|
"ID": "CVE-2016-1310",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20160203 Cisco Unity Connection Web Framework Cross-Site Scripting Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-uc"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1034937",
|
"name": "1034937",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034937"
|
"url": "http://www.securitytracker.com/id/1034937"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20160203 Cisco Unity Connection Web Framework Cross-Site Scripting Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-uc"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2016-1564",
|
"ID": "CVE-2016-1564",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1034622",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1034622"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://codex.wordpress.org/Version_4.4.1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://codex.wordpress.org/Version_4.4.1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3444",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3444"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160108 Re: CVE Request: WordPress: cross-site scripting vulnerability fixed in new 4.4.1 release",
|
"name": "[oss-security] 20160108 Re: CVE Request: WordPress: cross-site scripting vulnerability fixed in new 4.4.1 release",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -67,30 +82,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://wpvulndb.com/vulnerabilities/8358"
|
"url": "https://wpvulndb.com/vulnerabilities/8358"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://codex.wordpress.org/Version_4.4.1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://codex.wordpress.org/Version_4.4.1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://core.trac.wordpress.org/changeset/36185",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://core.trac.wordpress.org/changeset/36185"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://wordpress.org/news/2016/01/wordpress-4-4-1-security-and-maintenance-release/",
|
"name": "https://wordpress.org/news/2016/01/wordpress-4-4-1-security-and-maintenance-release/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://wordpress.org/news/2016/01/wordpress-4-4-1-security-and-maintenance-release/"
|
"url": "https://wordpress.org/news/2016/01/wordpress-4-4-1-security-and-maintenance-release/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-3444",
|
"name": "https://core.trac.wordpress.org/changeset/36185",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3444"
|
"url": "https://core.trac.wordpress.org/changeset/36185"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1034622",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1034622"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2016-1696",
|
"ID": "CVE-2016-1696",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,11 +57,26 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html"
|
"url": "http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1201",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:1201"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://codereview.chromium.org/1866103002",
|
"name": "https://codereview.chromium.org/1866103002",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://codereview.chromium.org/1866103002"
|
"url": "https://codereview.chromium.org/1866103002"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1036026",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1036026"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:1496",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://crbug.com/601073",
|
"name": "https://crbug.com/601073",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -72,11 +87,6 @@
|
|||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2016/dsa-3594"
|
"url": "http://www.debian.org/security/2016/dsa-3594"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1201",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1201"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2016:1490",
|
"name": "SUSE-SU-2016:1490",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
@ -86,16 +96,6 @@
|
|||||||
"name": "openSUSE-SU-2016:1489",
|
"name": "openSUSE-SU-2016:1489",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:1496",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1036026",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1036026"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,20 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://crbug.com/630654",
|
"name": "https://crbug.com/630654",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://crbug.com/630654"
|
"url": "https://crbug.com/630654"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201610-09",
|
"name": "93528",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "BID",
|
||||||
"url" : "https://security.gentoo.org/glsa/201610-09"
|
"url": "http://www.securityfocus.com/bid/93528"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2067",
|
"name": "RHSA-2016:2067",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2067.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2067.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "93528",
|
"name": "GLSA-201610-09",
|
||||||
"refsource" : "BID",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://www.securityfocus.com/bid/93528"
|
"url": "https://security.gentoo.org/glsa/201610-09"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1634",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1634.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "92585",
|
"name": "92585",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/92585"
|
"url": "http://www.securityfocus.com/bid/92585"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1634",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1634.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-5619",
|
"ID": "CVE-2016-5619",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1037049",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1037049"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "93639",
|
"name": "93639",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/93639"
|
"url": "http://www.securityfocus.com/bid/93639"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1037049",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1037049"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2016-5972",
|
"ID": "CVE-2016-5972",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21989205",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21989205"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "93077",
|
"name": "93077",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/93077"
|
"url": "http://www.securityfocus.com/bid/93077"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21989205",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21989205"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -77,9 +77,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://launchpad.support.sap.com/#/notes/2723142",
|
"name": "106471",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "https://launchpad.support.sap.com/#/notes/2723142"
|
"url": "http://www.securityfocus.com/bid/106471"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985",
|
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985",
|
||||||
@ -87,9 +87,9 @@
|
|||||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
|
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "106471",
|
"name": "https://launchpad.support.sap.com/#/notes/2723142",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/106471"
|
"url": "https://launchpad.support.sap.com/#/notes/2723142"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user