"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 21:47:30 +00:00
parent e58bdf316b
commit b12c3d4f79
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
71 changed files with 4043 additions and 4043 deletions

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "TA07-072A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"name": "32703",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/32703"
},
{
"name": "APPLE-SA-2007-03-13",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{ {
"name": "http://projects.info-pull.com/moab/MOAB-24-01-2007.html", "name": "http://projects.info-pull.com/moab/MOAB-24-01-2007.html",
"refsource": "MISC", "refsource": "MISC",
@ -62,40 +77,25 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305214" "url": "http://docs.info.apple.com/article.html?artnum=305214"
}, },
{
"name" : "APPLE-SA-2007-03-13",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"name" : "TA07-072A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"name" : "22222",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22222"
},
{ {
"name": "ADV-2007-0337", "name": "ADV-2007-0337",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0337" "url": "http://www.vupen.com/english/advisories/2007/0337"
}, },
{
"name": "1017755",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017755"
},
{ {
"name": "ADV-2007-0930", "name": "ADV-2007-0930",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0930" "url": "http://www.vupen.com/english/advisories/2007/0930"
}, },
{ {
"name" : "32703", "name": "22222",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://www.osvdb.org/32703" "url": "http://www.securityfocus.com/bid/22222"
},
{
"name" : "1017755",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017755"
}, },
{ {
"name": "24479", "name": "24479",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "ADV-2007-0270",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0270"
},
{ {
"name": "webspell-gallery-sql-injection(31632)", "name": "webspell-gallery-sql-injection(31632)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31632" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31632"
},
{
"name": "ADV-2007-0270",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0270"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "32698",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/32698"
},
{ {
"name": "http://projects.info-pull.com/moab/MOAB-29-01-2007.html", "name": "http://projects.info-pull.com/moab/MOAB-29-01-2007.html",
"refsource": "MISC", "refsource": "MISC",
@ -66,11 +71,6 @@
"name": "32699", "name": "32699",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/32699" "url": "http://www.osvdb.org/32699"
},
{
"name" : "32698",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/32698"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070207 remote file include in whm (all version)", "name": "ADV-2007-0545",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/459409/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2007/0545"
}, },
{ {
"name": "20070208 Re: remote file include in whm (all version)", "name": "20070208 Re: remote file include in whm (all version)",
@ -63,24 +63,9 @@
"url": "http://www.securityfocus.com/archive/1/459449/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/459449/100/0/threaded"
}, },
{ {
"name" : "http://changelog.cpanel.net/index.cgi", "name": "cpanel-webhost-objcache-xss(32400)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://changelog.cpanel.net/index.cgi" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32400"
},
{
"name" : "22455",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22455"
},
{
"name" : "ADV-2007-0545",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0545"
},
{
"name" : "32043",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32043"
}, },
{ {
"name": "33240", "name": "33240",
@ -88,9 +73,24 @@
"url": "http://osvdb.org/33240" "url": "http://osvdb.org/33240"
}, },
{ {
"name" : "35750", "name": "http://changelog.cpanel.net/index.cgi",
"refsource": "CONFIRM",
"url": "http://changelog.cpanel.net/index.cgi"
},
{
"name": "20070207 remote file include in whm (all version)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459409/100/0/threaded"
},
{
"name": "22455",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22455"
},
{
"name": "32043",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://osvdb.org/35750" "url": "http://osvdb.org/32043"
}, },
{ {
"name": "24097", "name": "24097",
@ -98,9 +98,9 @@
"url": "http://secunia.com/advisories/24097" "url": "http://secunia.com/advisories/24097"
}, },
{ {
"name" : "cpanel-webhost-objcache-xss(32400)", "name": "35750",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32400" "url": "http://osvdb.org/35750"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "JVN#40511721",
"refsource" : "JVN",
"url" : "http://jvn.jp/jp/JVN%2340511721/index.html"
},
{
"name" : "23207",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23207"
},
{ {
"name": "ADV-2007-1166", "name": "ADV-2007-1166",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -72,10 +62,20 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24681" "url": "http://secunia.com/advisories/24681"
}, },
{
"name": "23207",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23207"
},
{ {
"name": "maildwarf-unspecified-xss(33322)", "name": "maildwarf-unspecified-xss(33322)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33322" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33322"
},
{
"name": "JVN#40511721",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2340511721/index.html"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4034",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4034"
},
{ {
"name": "24334", "name": "24334",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/24334" "url": "http://www.securityfocus.com/bid/24334"
}, },
{ {
"name" : "ADV-2007-2091", "name": "kletter-scdir-file-include(34738)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2007/2091" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34738"
}, },
{ {
"name": "38797", "name": "38797",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/38797" "url": "http://osvdb.org/38797"
}, },
{
"name" : "38798",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38798"
},
{ {
"name": "38799", "name": "38799",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/38799" "url": "http://osvdb.org/38799"
}, },
{ {
"name" : "kletter-scdir-file-include(34738)", "name": "38798",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34738" "url": "http://osvdb.org/38798"
},
{
"name": "ADV-2007-2091",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2091"
},
{
"name": "4034",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4034"
} }
] ]
} }

View File

@ -53,29 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-312.htm", "name": "solaris-kssl-dos(35126)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-312.htm" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35126"
},
{
"name" : "102918",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102918-1"
},
{
"name" : "24686",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24686"
},
{
"name" : "ADV-2007-2365",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2365"
},
{
"name" : "36609",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36609"
}, },
{ {
"name": "oval:org.mitre.oval:def:9165", "name": "oval:org.mitre.oval:def:9165",
@ -83,9 +63,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9165" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9165"
}, },
{ {
"name" : "1018322", "name": "102918",
"refsource" : "SECTRACK", "refsource": "SUNALERT",
"url" : "http://www.securitytracker.com/id?1018322" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102918-1"
},
{
"name": "ADV-2007-2365",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2365"
}, },
{ {
"name": "25863", "name": "25863",
@ -93,9 +78,24 @@
"url": "http://secunia.com/advisories/25863" "url": "http://secunia.com/advisories/25863"
}, },
{ {
"name" : "solaris-kssl-dos(35126)", "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-312.htm",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35126" "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-312.htm"
},
{
"name": "36609",
"refsource": "OSVDB",
"url": "http://osvdb.org/36609"
},
{
"name": "24686",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24686"
},
{
"name": "1018322",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018322"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://support.citrix.com/article/CTX113543", "name": "1018343",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://support.citrix.com/article/CTX113543" "url": "http://www.securitytracker.com/id?1018343"
}, },
{ {
"name": "24790", "name": "24790",
@ -63,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/24790" "url": "http://www.securityfocus.com/bid/24790"
}, },
{ {
"name" : "37839", "name": "25897",
"refsource" : "OSVDB", "refsource": "SECUNIA",
"url" : "http://osvdb.org/37839" "url": "http://secunia.com/advisories/25897"
},
{
"name": "http://support.citrix.com/article/CTX113543",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX113543"
}, },
{ {
"name": "ADV-2007-2455", "name": "ADV-2007-2455",
@ -73,14 +78,9 @@
"url": "http://www.vupen.com/english/advisories/2007/2455" "url": "http://www.vupen.com/english/advisories/2007/2455"
}, },
{ {
"name" : "1018343", "name": "37839",
"refsource" : "SECTRACK", "refsource": "OSVDB",
"url" : "http://www.securitytracker.com/id?1018343" "url": "http://osvdb.org/37839"
},
{
"name" : "25897",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25897"
}, },
{ {
"name": "citrix-content-redirection-dos(35283)", "name": "citrix-content-redirection-dos(35283)",

View File

@ -53,74 +53,74 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070723 n.runs-SA-2007.020 - Norman Antivirus ACE parsing Arbitrary Code Execution Advisory", "name": "37982",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/archive/1/474423/100/0/threaded" "url": "http://osvdb.org/37982"
},
{
"name" : "20070723 n.runs-SA-2007.021 - Norman Antivirus LZH parsing Arbitrary Code Execution Advisory",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/474432/100/0/threaded"
},
{
"name" : "http://www.nruns.com/security_advisory_Norman_all_ace_buffer_overflow.php",
"refsource" : "MISC",
"url" : "http://www.nruns.com/security_advisory_Norman_all_ace_buffer_overflow.php"
},
{
"name" : "http://www.nruns.com/security_advisory_norman_antivirus_lzh_buffer_overflow.php",
"refsource" : "MISC",
"url" : "http://www.nruns.com/security_advisory_norman_antivirus_lzh_buffer_overflow.php"
}, },
{ {
"name": "25003", "name": "25003",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25003" "url": "http://www.securityfocus.com/bid/25003"
}, },
{
"name" : "25015",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25015"
},
{
"name" : "ADV-2007-2619",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2619"
},
{
"name" : "37982",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37982"
},
{ {
"name": "37983", "name": "37983",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37983" "url": "http://osvdb.org/37983"
}, },
{
"name" : "1018438",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018438"
},
{
"name" : "26178",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26178"
},
{
"name" : "2912",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2912"
},
{ {
"name": "norman-ace-bo(35561)", "name": "norman-ace-bo(35561)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35561" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35561"
}, },
{
"name": "ADV-2007-2619",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2619"
},
{
"name": "20070723 n.runs-SA-2007.020 - Norman Antivirus ACE parsing Arbitrary Code Execution Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474423/100/0/threaded"
},
{
"name": "http://www.nruns.com/security_advisory_norman_antivirus_lzh_buffer_overflow.php",
"refsource": "MISC",
"url": "http://www.nruns.com/security_advisory_norman_antivirus_lzh_buffer_overflow.php"
},
{ {
"name": "norman-lzh-bo(35559)", "name": "norman-lzh-bo(35559)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35559" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35559"
},
{
"name": "26178",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26178"
},
{
"name": "http://www.nruns.com/security_advisory_Norman_all_ace_buffer_overflow.php",
"refsource": "MISC",
"url": "http://www.nruns.com/security_advisory_Norman_all_ace_buffer_overflow.php"
},
{
"name": "25015",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25015"
},
{
"name": "1018438",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018438"
},
{
"name": "20070723 n.runs-SA-2007.021 - Norman Antivirus LZH parsing Arbitrary Code Execution Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/474432/100/0/threaded"
},
{
"name": "2912",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2912"
} }
] ]
} }

View File

@ -52,31 +52,41 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "24954",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24954"
},
{ {
"name": "37056", "name": "37056",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/37056" "url": "http://www.osvdb.org/37056"
}, },
{ {
"name" : "37057", "name": "blixkrieg-wordpress-index-xss(35474)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://www.osvdb.org/37057" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35474"
}, },
{ {
"name": "26109", "name": "26109",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26109" "url": "http://secunia.com/advisories/26109"
}, },
{
"name": "bllix-wordpress-index-xss(35472)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35472"
},
{ {
"name": "26115", "name": "26115",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26115" "url": "http://secunia.com/advisories/26115"
}, },
{
"name": "24954",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24954"
},
{
"name": "37057",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/37057"
},
{ {
"name": "26116", "name": "26116",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -86,16 +96,6 @@
"name": "blixed-wordpress-index-xss(35473)", "name": "blixed-wordpress-index-xss(35473)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35473" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35473"
},
{
"name" : "bllix-wordpress-index-xss(35472)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35472"
},
{
"name" : "blixkrieg-wordpress-index-xss(35474)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35474"
} }
] ]
} }

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "27271",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27271"
},
{ {
"name": "20080403 Medium security hole affecting Festival on Debian unstable/testing and Ubuntu Hardy Heron", "name": "20080403 Medium security hole affecting Festival on Debian unstable/testing and Ubuntu Hardy Heron",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/490465/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/490465/100/0/threaded"
}, },
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=170477",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=170477"
},
{
"name" : "GLSA-200707-10",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200707-10.xml"
},
{
"name" : "SUSE-SR:2007:021",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
},
{ {
"name": "25069", "name": "25069",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25069" "url": "http://www.securityfocus.com/bid/25069"
}, },
{
"name": "GLSA-200707-10",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200707-10.xml"
},
{ {
"name": "26229", "name": "26229",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26229" "url": "http://secunia.com/advisories/26229"
}, },
{
"name" : "27271",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27271"
},
{ {
"name": "gentoo-festival-privilege-escalation(35606)", "name": "gentoo-festival-privilege-escalation(35606)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35606" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35606"
},
{
"name": "SUSE-SR:2007:021",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=170477",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=170477"
} }
] ]
} }

View File

@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "26315",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26315"
},
{ {
"name": "http://pridels-team.blogspot.com/2007/08/webdirector-xss-vuln.html", "name": "http://pridels-team.blogspot.com/2007/08/webdirector-xss-vuln.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://pridels-team.blogspot.com/2007/08/webdirector-xss-vuln.html" "url": "http://pridels-team.blogspot.com/2007/08/webdirector-xss-vuln.html"
}, },
{
"name": "36439",
"refsource": "OSVDB",
"url": "http://osvdb.org/36439"
},
{ {
"name": "25166", "name": "25166",
"refsource": "BID", "refsource": "BID",
@ -66,16 +76,6 @@
"name": "ADV-2007-2765", "name": "ADV-2007-2765",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2765" "url": "http://www.vupen.com/english/advisories/2007/2765"
},
{
"name" : "36439",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36439"
},
{
"name" : "26315",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26315"
} }
] ]
} }

View File

@ -52,26 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4284",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4284"
},
{ {
"name": "25292", "name": "25292",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/25292" "url": "http://www.securityfocus.com/bid/25292"
}, },
{
"name" : "ADV-2007-2877",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2877"
},
{ {
"name": "36420", "name": "36420",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/36420" "url": "http://osvdb.org/36420"
}, },
{
"name": "4284",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4284"
},
{ {
"name": "26446", "name": "26446",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +76,11 @@
"name": "prozilla-category-sql-injection(35990)", "name": "prozilla-category-sql-injection(35990)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35990" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35990"
},
{
"name": "ADV-2007-2877",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2877"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://docs.info.apple.com/article.html?artnum=307176",
"refsource" : "MISC",
"url" : "http://docs.info.apple.com/article.html?artnum=307176"
},
{
"name" : "APPLE-SA-2007-12-13",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00000.html"
},
{ {
"name": "26868", "name": "26868",
"refsource": "BID", "refsource": "BID",
@ -72,25 +62,35 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4217" "url": "http://www.vupen.com/english/advisories/2007/4217"
}, },
{
"name": "quicktime-qtl-bo(39029)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39029"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307176",
"refsource": "MISC",
"url": "http://docs.info.apple.com/article.html?artnum=307176"
},
{
"name": "APPLE-SA-2007-12-13",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00000.html"
},
{ {
"name": "40883", "name": "40883",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/40883" "url": "http://osvdb.org/40883"
}, },
{
"name" : "1019099",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019099"
},
{ {
"name": "28092", "name": "28092",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28092" "url": "http://secunia.com/advisories/28092"
}, },
{ {
"name" : "quicktime-qtl-bo(39029)", "name": "1019099",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39029" "url": "http://www.securitytracker.com/id?1019099"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "esmartcart-login-sql-injection(39988)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39988"
},
{ {
"name": "20080124 E-SMART CART bypass", "name": "20080124 E-SMART CART bypass",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/487055/100/200/threaded" "url": "http://www.securityfocus.com/archive/1/487055/100/200/threaded"
}, },
{
"name" : "http://14house.blogspot.com/2007/09/e-smart-cart-sql-injection.html",
"refsource" : "MISC",
"url" : "http://14house.blogspot.com/2007/09/e-smart-cart-sql-injection.html"
},
{
"name" : "25532",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25532"
},
{
"name" : "27452",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27452"
},
{ {
"name": "38419", "name": "38419",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/38419" "url": "http://osvdb.org/38419"
}, },
{ {
"name" : "esmartcart-login-sql-injection(39988)", "name": "27452",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39988" "url": "http://www.securityfocus.com/bid/27452"
},
{
"name": "25532",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25532"
},
{
"name": "http://14house.blogspot.com/2007/09/e-smart-cart-sql-injection.html",
"refsource": "MISC",
"url": "http://14house.blogspot.com/2007/09/e-smart-cart-sql-injection.html"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/124682" "url": "http://packetstormsecurity.com/files/124682"
}, },
{
"name": "webcrafted-useraccount-xss(90140)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90140"
},
{ {
"name": "64681", "name": "64681",
"refsource": "BID", "refsource": "BID",
@ -66,11 +71,6 @@
"name": "56307", "name": "56307",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56307" "url": "http://secunia.com/advisories/56307"
},
{
"name" : "webcrafted-useraccount-xss(90140)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90140"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://blog.mybb.com/2014/08/04/mybb-1-6-15-released-security-maintenance-release",
"refsource" : "CONFIRM",
"url" : "http://blog.mybb.com/2014/08/04/mybb-1-6-15-released-security-maintenance-release"
},
{ {
"name": "59707", "name": "59707",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59707" "url": "http://secunia.com/advisories/59707"
},
{
"name": "http://blog.mybb.com/2014/08/04/mybb-1-6-15-released-security-maintenance-release",
"refsource": "CONFIRM",
"url": "http://blog.mybb.com/2014/08/04/mybb-1-6-15-released-security-maintenance-release"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5605", "ID": "CVE-2014-5605",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#744857",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/744857"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#744857", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/744857" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5791", "ID": "CVE-2014-5791",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#654041",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/654041"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#654041", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/654041" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2581", "ID": "CVE-2015-2581",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150326 Re: CVE requests for Drupal Core - Moderately Critical - Multiple Vulnerabilities - SA-CORE-2015-001",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/03/26/4"
},
{ {
"name": "http://cgit.drupalcode.org/drupal/commit/?id=d2304f840c43c190c6e136ee9901ed9797b4c3ca", "name": "http://cgit.drupalcode.org/drupal/commit/?id=d2304f840c43c190c6e136ee9901ed9797b4c3ca",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://cgit.drupalcode.org/drupal/commit/?id=d2304f840c43c190c6e136ee9901ed9797b4c3ca" "url": "http://cgit.drupalcode.org/drupal/commit/?id=d2304f840c43c190c6e136ee9901ed9797b4c3ca"
}, },
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1204753",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1204753"
},
{
"name" : "https://www.drupal.org/SA-CORE-2015-001",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/SA-CORE-2015-001"
},
{ {
"name": "DSA-3200", "name": "DSA-3200",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3200" "url": "http://www.debian.org/security/2015/dsa-3200"
}, },
{
"name": "[oss-security] 20150326 Re: CVE requests for Drupal Core - Moderately Critical - Multiple Vulnerabilities - SA-CORE-2015-001",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/03/26/4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1204753",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204753"
},
{ {
"name": "73219", "name": "73219",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/73219" "url": "http://www.securityfocus.com/bid/73219"
},
{
"name": "https://www.drupal.org/SA-CORE-2015-001",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/SA-CORE-2015-001"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-2906", "ID": "CVE-2015-2906",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.usenix.org/conference/woot15/workshop-program/presentation/foster",
"refsource" : "MISC",
"url" : "https://www.usenix.org/conference/woot15/workshop-program/presentation/foster"
},
{ {
"name": "http://www.kb.cert.org/vuls/id/CKIG-9ZAQGX", "name": "http://www.kb.cert.org/vuls/id/CKIG-9ZAQGX",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/CKIG-9ZAQGX" "url": "http://www.kb.cert.org/vuls/id/CKIG-9ZAQGX"
}, },
{
"name": "https://www.usenix.org/conference/woot15/workshop-program/presentation/foster",
"refsource": "MISC",
"url": "https://www.usenix.org/conference/woot15/workshop-program/presentation/foster"
},
{ {
"name": "VU#209512", "name": "VU#209512",
"refsource": "CERT-VN", "refsource": "CERT-VN",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1209781",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209781"
},
{ {
"name": "[oss-security] 20150406 Re: Request CVE for LinuxNode - DoS vulnerability", "name": "[oss-security] 20150406 Re: Request CVE for LinuxNode - DoS vulnerability",
"refsource": "MLIST", "refsource": "MLIST",
@ -61,11 +66,6 @@
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777013", "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777013",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777013" "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777013"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1209781",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1209781"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6132", "ID": "CVE-2015-6132",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38968/" "url": "https://www.exploit-db.com/exploits/38968/"
}, },
{
"name" : "MS15-132",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-132"
},
{ {
"name": "1034338", "name": "1034338",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034338" "url": "http://www.securitytracker.com/id/1034338"
},
{
"name": "MS15-132",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-132"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6392", "ID": "CVE-2015-6392",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20161005 Cisco NX-OS Software Crafted DHCPv4 Packet Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-dhcp1"
},
{ {
"name": "93406", "name": "93406",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/93406" "url": "http://www.securityfocus.com/bid/93406"
}, },
{
"name": "20161005 Cisco NX-OS Software Crafted DHCPv4 Packet Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-dhcp1"
},
{ {
"name": "1036948", "name": "1036948",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-6715", "ID": "CVE-2015-6715",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-491",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-491"
},
{ {
"name": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html", "name": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "1033796", "name": "1033796",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033796" "url": "http://www.securitytracker.com/id/1033796"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-491",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-491"
} }
] ]
} }

View File

@ -57,16 +57,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/09/22/14" "url": "http://www.openwall.com/lists/oss-security/2015/09/22/14"
}, },
{
"name" : "https://github.com/plone/Products.CMFPlone/commit/3da710a2cd68587f0bf34f2e7ea1167d6eeee087",
"refsource" : "MISC",
"url" : "https://github.com/plone/Products.CMFPlone/commit/3da710a2cd68587f0bf34f2e7ea1167d6eeee087"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1264788", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1264788",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1264788" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1264788"
}, },
{
"name": "https://github.com/plone/Products.CMFPlone/commit/3da710a2cd68587f0bf34f2e7ea1167d6eeee087",
"refsource": "MISC",
"url": "https://github.com/plone/Products.CMFPlone/commit/3da710a2cd68587f0bf34f2e7ea1167d6eeee087"
},
{ {
"name": "https://plone.org/security/hotfix/20150910/non-persistent-xss-in-plone", "name": "https://plone.org/security/hotfix/20150910/non-persistent-xss-in-plone",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-7660", "ID": "CVE-2015-7660",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,44 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-565", "name": "1034111",
"refsource" : "MISC", "refsource": "SECTRACK",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-565" "url": "http://www.securitytracker.com/id/1034111"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
},
{
"name" : "GLSA-201511-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201511-02"
},
{
"name" : "RHSA-2015:2023",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
}, },
{ {
"name": "RHSA-2015:2024", "name": "RHSA-2015:2024",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html"
}, },
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
},
{ {
"name": "openSUSE-SU-2015:1984", "name": "openSUSE-SU-2015:1984",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"
}, },
{
"name": "GLSA-201511-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201511-02"
},
{ {
"name": "77533", "name": "77533",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/77533" "url": "http://www.securityfocus.com/bid/77533"
}, },
{ {
"name" : "1034111", "name": "RHSA-2015:2023",
"refsource" : "SECTRACK", "refsource": "REDHAT",
"url" : "http://www.securitytracker.com/id/1034111" "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-565",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-565"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0576", "ID": "CVE-2016-0576",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1084", "ID": "CVE-2016-1084",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{ {
"name": "1035828", "name": "1035828",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828" "url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2016-1660", "ID": "CVE-2016-1660",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html", "name": "openSUSE-SU-2016:1208",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html"
},
{
"name" : "https://codereview.chromium.org/1672603002",
"refsource" : "CONFIRM",
"url" : "https://codereview.chromium.org/1672603002"
},
{
"name" : "https://codereview.chromium.org/1677363002",
"refsource" : "CONFIRM",
"url" : "https://codereview.chromium.org/1677363002"
}, },
{ {
"name": "https://crbug.com/574802", "name": "https://crbug.com/574802",
@ -77,31 +67,11 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3564" "url": "http://www.debian.org/security/2016/dsa-3564"
}, },
{
"name" : "GLSA-201605-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201605-02"
},
{
"name" : "RHSA-2016:0707",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0707.html"
},
{ {
"name": "openSUSE-SU-2016:1655", "name": "openSUSE-SU-2016:1655",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
}, },
{
"name" : "openSUSE-SU-2016:1207",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html"
},
{
"name" : "openSUSE-SU-2016:1208",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html"
},
{ {
"name": "openSUSE-SU-2016:1209", "name": "openSUSE-SU-2016:1209",
"refsource": "SUSE", "refsource": "SUSE",
@ -112,10 +82,40 @@
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2960-1" "url": "http://www.ubuntu.com/usn/USN-2960-1"
}, },
{
"name": "https://codereview.chromium.org/1677363002",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1677363002"
},
{ {
"name": "89106", "name": "89106",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/89106" "url": "http://www.securityfocus.com/bid/89106"
},
{
"name": "openSUSE-SU-2016:1207",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html"
},
{
"name": "RHSA-2016:0707",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html"
},
{
"name": "GLSA-201605-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201605-02"
},
{
"name": "https://codereview.chromium.org/1672603002",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1672603002"
} }
] ]
} }

View File

@ -53,25 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases", "name": "USN-2952-1",
"refsource" : "MLIST", "refsource": "UBUNTU",
"url" : "http://www.openwall.com/lists/oss-security/2016/04/24/1" "url": "http://www.ubuntu.com/usn/USN-2952-1"
}, },
{ {
"name" : "http://www.php.net/ChangeLog-5.php", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149"
}, },
{ {
"name": "http://www.php.net/ChangeLog-7.php", "name": "http://www.php.net/ChangeLog-7.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-7.php" "url": "http://www.php.net/ChangeLog-7.php"
}, },
{
"name" : "https://bugs.php.net/bug.php?id=71798",
"refsource" : "CONFIRM",
"url" : "https://bugs.php.net/bug.php?id=71798"
},
{ {
"name": "https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451", "name": "https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -83,24 +78,9 @@
"url": "https://support.apple.com/HT206567" "url": "https://support.apple.com/HT206567"
}, },
{ {
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", "name": "RHSA-2016:2750",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731" "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name" : "APPLE-SA-2016-05-16-4",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
}, },
{ {
"name": "DSA-3560", "name": "DSA-3560",
@ -108,39 +88,59 @@
"url": "http://www.debian.org/security/2016/dsa-3560" "url": "http://www.debian.org/security/2016/dsa-3560"
}, },
{ {
"name" : "RHSA-2016:2750", "name": "USN-2952-2",
"refsource" : "REDHAT", "refsource": "UBUNTU",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2750.html" "url": "http://www.ubuntu.com/usn/USN-2952-2"
}, },
{ {
"name" : "SUSE-SU-2016:1277", "name": "APPLE-SA-2016-05-16-4",
"refsource" : "SUSE", "refsource": "APPLE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html" "url": "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
},
{
"name": "http://www.php.net/ChangeLog-5.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "https://bugs.php.net/bug.php?id=71798",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=71798"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
}, },
{ {
"name": "openSUSE-SU-2016:1274", "name": "openSUSE-SU-2016:1274",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html"
}, },
{
"name" : "openSUSE-SU-2016:1373",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html"
},
{
"name" : "USN-2952-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2952-1"
},
{
"name" : "USN-2952-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2952-2"
},
{ {
"name": "85801", "name": "85801",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/85801" "url": "http://www.securityfocus.com/bid/85801"
},
{
"name": "SUSE-SU-2016:1277",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html"
},
{
"name": "[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/24/1"
},
{
"name": "openSUSE-SU-2016:1373",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4432", "ID": "CVE-2016-4432",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,24 +58,9 @@
"url": "http://www.securityfocus.com/archive/1/538508/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/538508/100/0/threaded"
}, },
{ {
"name" : "[qpid-users] 20160527 [CVE-2016-4432] Apache Qpid Java Broker - authentication bypass", "name": "1035983",
"refsource" : "MLIST", "refsource": "SECTRACK",
"url" : "http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E" "url": "http://www.securitytracker.com/id/1035983"
},
{
"name" : "http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html"
},
{
"name" : "https://issues.apache.org/jira/browse/QPID-7257",
"refsource" : "CONFIRM",
"url" : "https://issues.apache.org/jira/browse/QPID-7257"
},
{
"name" : "https://svn.apache.org/viewvc?view=revision&revision=1743161",
"refsource" : "CONFIRM",
"url" : "https://svn.apache.org/viewvc?view=revision&revision=1743161"
}, },
{ {
"name": "https://svn.apache.org/viewvc?view=revision&revision=1743393", "name": "https://svn.apache.org/viewvc?view=revision&revision=1743393",
@ -83,9 +68,24 @@
"url": "https://svn.apache.org/viewvc?view=revision&revision=1743393" "url": "https://svn.apache.org/viewvc?view=revision&revision=1743393"
}, },
{ {
"name" : "1035983", "name": "https://svn.apache.org/viewvc?view=revision&revision=1743161",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1035983" "url": "https://svn.apache.org/viewvc?view=revision&revision=1743161"
},
{
"name": "http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html"
},
{
"name": "[qpid-users] 20160527 [CVE-2016-4432] Apache Qpid Java Broker - authentication bypass",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E"
},
{
"name": "https://issues.apache.org/jira/browse/QPID-7257",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/QPID-7257"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160505 Re: CVE request - samsumg android phone TvoutService_C binder service DoS",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/06/2"
},
{ {
"name": "http://security.samsungmobile.com/smrupdate.html#SMR-FEB-2016", "name": "http://security.samsungmobile.com/smrupdate.html#SMR-FEB-2016",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://security.samsungmobile.com/smrupdate.html#SMR-FEB-2016" "url": "http://security.samsungmobile.com/smrupdate.html#SMR-FEB-2016"
},
{
"name": "[oss-security] 20160505 Re: CVE request - samsumg android phone TvoutService_C binder service DoS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/06/2"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "94252",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94252"
},
{ {
"name": "[oss-security] 20161110 Re: libming: listmp3: divide-by-zero in printMP3Headers (listmp3.c)", "name": "[oss-security] 20161110 Re: libming: listmp3: divide-by-zero in printMP3Headers (listmp3.c)",
"refsource": "MLIST", "refsource": "MLIST",
@ -61,11 +66,6 @@
"name": "https://blogs.gentoo.org/ago/2016/11/09/libming-listmp3-divide-by-zero-in-printmp3headers-list", "name": "https://blogs.gentoo.org/ago/2016/11/09/libming-listmp3-divide-by-zero-in-printmp3headers-list",
"refsource": "MISC", "refsource": "MISC",
"url": "https://blogs.gentoo.org/ago/2016/11/09/libming-listmp3-divide-by-zero-in-printmp3headers-list" "url": "https://blogs.gentoo.org/ago/2016/11/09/libming-listmp3-divide-by-zero-in-printmp3headers-list"
},
{
"name" : "94252",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94252"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9458", "ID": "CVE-2016-9458",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://patchwork.ozlabs.org/patch/1042902/",
"refsource" : "MISC",
"url" : "http://patchwork.ozlabs.org/patch/1042902/"
},
{ {
"name": "107063", "name": "107063",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/107063" "url": "http://www.securityfocus.com/bid/107063"
},
{
"name": "http://patchwork.ozlabs.org/patch/1042902/",
"refsource": "MISC",
"url": "http://patchwork.ozlabs.org/patch/1042902/"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://blog.burghardt.pl/2019/02/dasan-h665-has-vendor-backdoor-built-into-busyboxs-bin-login/",
"refsource" : "MISC",
"url" : "https://blog.burghardt.pl/2019/02/dasan-h665-has-vendor-backdoor-built-into-busyboxs-bin-login/"
},
{ {
"name": "https://seclists.org/bugtraq/2019/Feb/32", "name": "https://seclists.org/bugtraq/2019/Feb/32",
"refsource": "MISC", "refsource": "MISC",
"url": "https://seclists.org/bugtraq/2019/Feb/32" "url": "https://seclists.org/bugtraq/2019/Feb/32"
},
{
"name": "https://blog.burghardt.pl/2019/02/dasan-h665-has-vendor-backdoor-built-into-busyboxs-bin-login/",
"refsource": "MISC",
"url": "https://blog.burghardt.pl/2019/02/dasan-h665-has-vendor-backdoor-built-into-busyboxs-bin-login/"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "46337",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/46337"
},
{ {
"name": "https://www.youtube.com/watch?v=0QDM224_6DM", "name": "https://www.youtube.com/watch?v=0QDM224_6DM",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.youtube.com/watch?v=0QDM224_6DM" "url": "https://www.youtube.com/watch?v=0QDM224_6DM"
},
{
"name": "46337",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/46337"
} }
] ]
} }