"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:58:48 +00:00
parent 24f6c16565
commit c745401edf
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 3064 additions and 3064 deletions

View File

@ -52,31 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "25520",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25520"
},
{ {
"name": "http://www-1.ibm.com/support/docview.wss?uid=swg21258784", "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21258784",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21258784" "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21258784"
}, },
{
"name" : "24322",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24322"
},
{ {
"name": "ADV-2007-2063", "name": "ADV-2007-2063",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2063" "url": "http://www.vupen.com/english/advisories/2007/2063"
}, },
{
"name": "24322",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24322"
},
{ {
"name": "35765", "name": "35765",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/35765" "url": "http://osvdb.org/35765"
}, },
{
"name" : "25520",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25520"
},
{ {
"name": "domino-signature-privilege-escalation(34718)", "name": "domino-signature-privilege-escalation(34718)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070209 XSS in Rainbow with Rainbow.Zen",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/459590/100/0/threaded"
},
{ {
"name": "22503", "name": "22503",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22503" "url": "http://www.securityfocus.com/bid/22503"
}, },
{
"name" : "33683",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33683"
},
{ {
"name": "rainbow-browseproject-xss(32418)", "name": "rainbow-browseproject-xss(32418)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32418" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32418"
},
{
"name": "20070209 XSS in Rainbow with Rainbow.Zen",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459590/100/0/threaded"
},
{
"name": "33683",
"refsource": "OSVDB",
"url": "http://osvdb.org/33683"
} }
] ]
} }

View File

@ -52,56 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://bugs.php.net/bug.php?id=41492",
"refsource" : "CONFIRM",
"url" : "http://bugs.php.net/bug.php?id=41492"
},
{
"name" : "http://www.php.net/releases/5_2_3.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/releases/5_2_3.php"
},
{
"name" : "FEDORA-2007-2215",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"
},
{
"name" : "GLSA-200710-02",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
},
{
"name" : "SUSE-SA:2007:044",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"
},
{
"name" : "2007-0023",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2007/0023/"
},
{
"name" : "24259",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24259"
},
{
"name" : "36084",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36084"
},
{
"name" : "25456",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25456"
},
{
"name" : "26048",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26048"
},
{ {
"name": "26231", "name": "26231",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -112,10 +62,60 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27110" "url": "http://secunia.com/advisories/27110"
}, },
{
"name": "26048",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26048"
},
{
"name": "GLSA-200710-02",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
},
{
"name": "FEDORA-2007-2215",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"
},
{
"name": "25456",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25456"
},
{
"name": "2007-0023",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0023/"
},
{
"name": "http://www.php.net/releases/5_2_3.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/releases/5_2_3.php"
},
{
"name": "24259",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24259"
},
{ {
"name": "27102", "name": "27102",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27102" "url": "http://secunia.com/advisories/27102"
},
{
"name": "36084",
"refsource": "OSVDB",
"url": "http://osvdb.org/36084"
},
{
"name": "http://bugs.php.net/bug.php?id=41492",
"refsource": "CONFIRM",
"url": "http://bugs.php.net/bug.php?id=41492"
},
{
"name": "SUSE-SA:2007:044",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS07-030_e/index-e.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS07-030_e/index-e.html"
},
{
"name" : "25520",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25520"
},
{ {
"name": "ADV-2007-3035", "name": "ADV-2007-3035",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -77,6 +67,16 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26668" "url": "http://secunia.com/advisories/26668"
}, },
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-030_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-030_e/index-e.html"
},
{
"name": "25520",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25520"
},
{ {
"name": "hitachi-nnm-shared-code-execution(36374)", "name": "hitachi-nnm-shared-code-execution(36374)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070911 NuclearBB Alpha 2 Remote File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/479086/100/0/threaded"
},
{ {
"name": "4395", "name": "4395",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4395" "url": "https://www.exploit-db.com/exploits/4395"
}, },
{
"name" : "38978",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/38978"
},
{ {
"name": "3142", "name": "3142",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3142" "url": "http://securityreason.com/securityalert/3142"
}, },
{
"name": "38978",
"refsource": "OSVDB",
"url": "http://osvdb.org/38978"
},
{ {
"name": "nuclearbb-sendqueuedemails-file-include(36556)", "name": "nuclearbb-sendqueuedemails-file-include(36556)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36556" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36556"
},
{
"name": "20070911 NuclearBB Alpha 2 Remote File Inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/479086/100/0/threaded"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "43179",
"refsource": "OSVDB",
"url": "http://osvdb.org/43179"
},
{
"name": "ADV-2008-0560",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0560/references"
},
{ {
"name": "http://bugs.mysql.com/31611", "name": "http://bugs.mysql.com/31611",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,16 +76,6 @@
"name": "1019083", "name": "1019083",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019083" "url": "http://www.securitytracker.com/id?1019083"
},
{
"name" : "ADV-2008-0560",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0560/references"
},
{
"name" : "43179",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/43179"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "4782",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4782"
},
{ {
"name": "http://forums.agaresmedia.com/viewtopic.php?f=13&t=407", "name": "http://forums.agaresmedia.com/viewtopic.php?f=13&t=407",
"refsource": "MISC", "refsource": "MISC",
"url": "http://forums.agaresmedia.com/viewtopic.php?f=13&t=407" "url": "http://forums.agaresmedia.com/viewtopic.php?f=13&t=407"
}, },
{
"name" : "27023",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27023"
},
{
"name" : "ADV-2007-4319",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/4319"
},
{ {
"name": "39618", "name": "39618",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/39618" "url": "http://osvdb.org/39618"
}, },
{
"name": "27023",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27023"
},
{ {
"name": "28230", "name": "28230",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28230" "url": "http://secunia.com/advisories/28230"
},
{
"name": "4782",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4782"
},
{
"name": "ADV-2007-4319",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4319"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.org/1009-exploits/yloader-dllhijack.txt", "name": "41578",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://packetstormsecurity.org/1009-exploits/yloader-dllhijack.txt" "url": "http://secunia.com/advisories/41578"
}, },
{ {
"name": "http://www.prof-uis.com/prof-uis/version-history/version-291.aspx", "name": "http://www.prof-uis.com/prof-uis/version-history/version-291.aspx",
@ -63,9 +63,9 @@
"url": "http://www.prof-uis.com/prof-uis/version-history/version-291.aspx" "url": "http://www.prof-uis.com/prof-uis/version-history/version-291.aspx"
}, },
{ {
"name" : "41578", "name": "http://packetstormsecurity.org/1009-exploits/yloader-dllhijack.txt",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/41578" "url": "http://packetstormsecurity.org/1009-exploits/yloader-dllhijack.txt"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1333", "ID": "CVE-2014-1333",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT6254",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6254"
},
{ {
"name": "https://support.apple.com/kb/HT6537", "name": "https://support.apple.com/kb/HT6537",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6537" "url": "https://support.apple.com/kb/HT6537"
}, },
{
"name" : "APPLE-SA-2014-05-21-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html"
},
{
"name" : "APPLE-SA-2014-06-30-3",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
},
{ {
"name": "APPLE-SA-2014-06-30-4", "name": "APPLE-SA-2014-06-30-4",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html"
}, },
{
"name": "http://support.apple.com/kb/HT6254",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6254"
},
{
"name": "APPLE-SA-2014-06-30-3",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
},
{ {
"name": "67553", "name": "67553",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/67553" "url": "http://www.securityfocus.com/bid/67553"
},
{
"name": "APPLE-SA-2014-05-21-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20140707 Vulnerability Report for Ruby Gem lawn-login-0.0.7",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/07/07/20"
},
{ {
"name": "[oss-security] 20140717 Re: Vulnerability Report for Ruby Gem codders-dataset-1.3.2.1 (etc.)", "name": "[oss-security] 20140717 Re: Vulnerability Report for Ruby Gem codders-dataset-1.3.2.1 (etc.)",
"refsource": "MLIST", "refsource": "MLIST",
@ -66,6 +61,11 @@
"name": "http://www.vapid.dhs.org/advisories/lawn-login-0.0.7.html", "name": "http://www.vapid.dhs.org/advisories/lawn-login-0.0.7.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.vapid.dhs.org/advisories/lawn-login-0.0.7.html" "url": "http://www.vapid.dhs.org/advisories/lawn-login-0.0.7.html"
},
{
"name": "[oss-security] 20140707 Vulnerability Report for Ruby Gem lawn-login-0.0.7",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/07/07/20"
} }
] ]
} }

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20140818 CVE request / advisory: Monkey web server <= v1.5.2", "name": "monkey-webserver-dos(95336)",
"refsource" : "MLIST", "refsource": "XF",
"url" : "http://seclists.org/oss-sec/2014/q3/397" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95336"
},
{
"name" : "[oss-security] 20140819 Re: CVE request / advisory: Monkey web server <= v1.5.2",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q3/412"
},
{
"name" : "http://monkey-project.com/Announcements/v1.5.3",
"refsource" : "CONFIRM",
"url" : "http://monkey-project.com/Announcements/v1.5.3"
},
{
"name" : "https://github.com/monkey/monkey/commit/b2d0e6f92310bb14a15aa2f8e96e1fb5379776dd",
"refsource" : "CONFIRM",
"url" : "https://github.com/monkey/monkey/commit/b2d0e6f92310bb14a15aa2f8e96e1fb5379776dd"
}, },
{ {
"name": "69279", "name": "69279",
@ -83,9 +68,24 @@
"url": "http://secunia.com/advisories/60783" "url": "http://secunia.com/advisories/60783"
}, },
{ {
"name" : "monkey-webserver-dos(95336)", "name": "http://monkey-project.com/Announcements/v1.5.3",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95336" "url": "http://monkey-project.com/Announcements/v1.5.3"
},
{
"name": "https://github.com/monkey/monkey/commit/b2d0e6f92310bb14a15aa2f8e96e1fb5379776dd",
"refsource": "CONFIRM",
"url": "https://github.com/monkey/monkey/commit/b2d0e6f92310bb14a15aa2f8e96e1fb5379776dd"
},
{
"name": "[oss-security] 20140818 CVE request / advisory: Monkey web server <= v1.5.2",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q3/397"
},
{
"name": "[oss-security] 20140819 Re: CVE request / advisory: Monkey web server <= v1.5.2",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q3/412"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5690", "ID": "CVE-2014-5690",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{ {
"name": "VU#518785", "name": "VU#518785",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497", "name": "VU#582497",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2426", "ID": "CVE-2015-2426",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "38222", "name": "1032991",
"refsource" : "EXPLOIT-DB", "refsource": "SECTRACK",
"url" : "https://www.exploit-db.com/exploits/38222/" "url": "http://www.securitytracker.com/id/1032991"
},
{
"name": "VU#103336",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/103336"
}, },
{ {
"name": "http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/", "name": "http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/",
@ -68,19 +73,14 @@
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-078" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-078"
}, },
{ {
"name" : "VU#103336", "name": "38222",
"refsource" : "CERT-VN", "refsource": "EXPLOIT-DB",
"url" : "http://www.kb.cert.org/vuls/id/103336" "url": "https://www.exploit-db.com/exploits/38222/"
}, },
{ {
"name": "75951", "name": "75951",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75951" "url": "http://www.securityfocus.com/bid/75951"
},
{
"name" : "1032991",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032991"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2655", "ID": "CVE-2015-2655",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
}, },
{
"name" : "75864",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75864"
},
{ {
"name": "1032903", "name": "1032903",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032903" "url": "http://www.securitytracker.com/id/1032903"
},
{
"name": "75864",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75864"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6194", "ID": "CVE-2015-6194",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-6690", "ID": "CVE-2015-6690",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-474",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-474"
},
{ {
"name": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html", "name": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "1033796", "name": "1033796",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033796" "url": "http://www.securitytracker.com/id/1033796"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-474",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-474"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0067", "ID": "CVE-2016-0067",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS16-009",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-009"
},
{ {
"name": "1034971", "name": "1034971",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034971" "url": "http://www.securitytracker.com/id/1034971"
},
{
"name": "MS16-009",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-009"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0449", "ID": "CVE-2016-0449",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0553", "ID": "CVE-2016-0553",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-0885", "ID": "CVE-2016-0885",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-10016", "ID": "CVE-2016-10016",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4",
"refsource" : "CONFIRM",
"url" : "http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4"
},
{ {
"name": "http://openwall.com/lists/oss-security/2017/07/10/6", "name": "http://openwall.com/lists/oss-security/2017/07/10/6",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,6 +62,21 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://php.net/ChangeLog-5.php" "url": "http://php.net/ChangeLog-5.php"
}, },
{
"name": "https://security.netapp.com/advisory/ntap-20180112-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180112-0001/"
},
{
"name": "http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4",
"refsource": "CONFIRM",
"url": "http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4"
},
{
"name": "99552",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99552"
},
{ {
"name": "http://php.net/ChangeLog-7.php", "name": "http://php.net/ChangeLog-7.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -76,16 +86,6 @@
"name": "https://bugs.php.net/bug.php?id=73192", "name": "https://bugs.php.net/bug.php?id=73192",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=73192" "url": "https://bugs.php.net/bug.php?id=73192"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20180112-0001/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20180112-0001/"
},
{
"name" : "99552",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99552"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20160622 Open-Xchange Security Advisory 2016-06-22",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/538732/100/0/threaded"
},
{ {
"name": "1036157", "name": "1036157",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036157" "url": "http://www.securitytracker.com/id/1036157"
},
{
"name": "20160622 Open-Xchange Security Advisory 2016-06-22",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/538732/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4235", "ID": "CVE-2016-4235",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,15 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html", "name": "SUSE-SU-2016:1826",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
}, },
{ {
"name": "GLSA-201607-03", "name": "GLSA-201607-03",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-03" "url": "https://security.gentoo.org/glsa/201607-03"
}, },
{
"name" : "RHSA-2016:1423",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
},
{
"name" : "SUSE-SU-2016:1826",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
},
{ {
"name": "openSUSE-SU-2016:1802", "name": "openSUSE-SU-2016:1802",
"refsource": "SUSE", "refsource": "SUSE",
@ -82,6 +72,16 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91725" "url": "http://www.securityfocus.com/bid/91725"
}, },
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
},
{
"name": "RHSA-2016:1423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
},
{ {
"name": "1036280", "name": "1036280",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4247", "ID": "CVE-2016-4247",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html", "name": "SUSE-SU-2016:1826",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
},
{
"name": "91720",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91720"
}, },
{ {
"name": "GLSA-201607-03", "name": "GLSA-201607-03",
@ -63,9 +68,14 @@
"url": "https://security.gentoo.org/glsa/201607-03" "url": "https://security.gentoo.org/glsa/201607-03"
}, },
{ {
"name" : "MS16-093", "name": "openSUSE-SU-2016:1802",
"refsource" : "MS", "refsource": "SUSE",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
}, },
{ {
"name": "RHSA-2016:1423", "name": "RHSA-2016:1423",
@ -73,19 +83,9 @@
"url": "https://access.redhat.com/errata/RHSA-2016:1423" "url": "https://access.redhat.com/errata/RHSA-2016:1423"
}, },
{ {
"name" : "SUSE-SU-2016:1826", "name": "MS16-093",
"refsource" : "SUSE", "refsource": "MS",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093"
},
{
"name" : "openSUSE-SU-2016:1802",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html"
},
{
"name" : "91720",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91720"
}, },
{ {
"name": "1036280", "name": "1036280",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4442", "ID": "CVE-2016-4442",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160610 Ruby gem rack-mini-profiler CVE-2016-4442",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/10/2"
},
{ {
"name": "https://github.com/MiniProfiler/rack-mini-profiler/blob/v0.10.1/CHANGELOG.md", "name": "https://github.com/MiniProfiler/rack-mini-profiler/blob/v0.10.1/CHANGELOG.md",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/MiniProfiler/rack-mini-profiler/blob/v0.10.1/CHANGELOG.md" "url": "https://github.com/MiniProfiler/rack-mini-profiler/blob/v0.10.1/CHANGELOG.md"
}, },
{
"name": "[oss-security] 20160610 Ruby gem rack-mini-profiler CVE-2016-4442",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/10/2"
},
{ {
"name": "https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c", "name": "https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT207142", "name": "APPLE-SA-2016-09-20-3",
"refsource" : "CONFIRM", "refsource": "APPLE",
"url" : "https://support.apple.com/HT207142" "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html"
},
{
"name" : "https://support.apple.com/HT207143",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207143"
}, },
{ {
"name": "https://support.apple.com/HT207157", "name": "https://support.apple.com/HT207157",
@ -72,25 +67,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT207158" "url": "https://support.apple.com/HT207158"
}, },
{
"name" : "APPLE-SA-2016-09-20-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Sep/msg00007.html"
},
{
"name" : "APPLE-SA-2016-09-20-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html"
},
{ {
"name": "APPLE-SA-2016-09-20-6", "name": "APPLE-SA-2016-09-20-6",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html" "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html"
}, },
{ {
"name" : "APPLE-SA-2016-09-20-7", "name": "1036854",
"refsource" : "APPLE", "refsource": "SECTRACK",
"url" : "http://lists.apple.com/archives/security-announce/2016/Sep/msg00012.html" "url": "http://www.securitytracker.com/id/1036854"
}, },
{ {
"name": "93064", "name": "93064",
@ -98,9 +83,24 @@
"url": "http://www.securityfocus.com/bid/93064" "url": "http://www.securityfocus.com/bid/93064"
}, },
{ {
"name" : "1036854", "name": "https://support.apple.com/HT207142",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1036854" "url": "https://support.apple.com/HT207142"
},
{
"name": "https://support.apple.com/HT207143",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207143"
},
{
"name": "APPLE-SA-2016-09-20-7",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00012.html"
},
{
"name": "APPLE-SA-2016-09-20-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00007.html"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-pca",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-pca"
},
{ {
"name": "94806", "name": "94806",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94806" "url": "http://www.securityfocus.com/bid/94806"
}, },
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-pca",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-pca"
},
{ {
"name": "1037414", "name": "1037414",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9240", "ID": "CVE-2016-9240",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1037385",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037385"
},
{ {
"name": "http://www.nes.fr/securitylab/index.php/2016/12/02/privilege-escalation-on-bmc-patrol", "name": "http://www.nes.fr/securitylab/index.php/2016/12/02/privilege-escalation-on-bmc-patrol",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "95009", "name": "95009",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/95009" "url": "http://www.securityfocus.com/bid/95009"
},
{
"name" : "1037385",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037385"
} }
] ]
} }

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "46469",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/46469/"
},
{ {
"name": "https://www.tenable.com/security/research/tra-2019-09", "name": "https://www.tenable.com/security/research/tra-2019-09",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2019-09" "url": "https://www.tenable.com/security/research/tra-2019-09"
},
{
"name": "46469",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/46469/"
} }
] ]
} }

View File

@ -86,20 +86,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/HT209443",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT209443"
},
{ {
"name": "https://support.apple.com/HT209446", "name": "https://support.apple.com/HT209446",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT209446" "url": "https://support.apple.com/HT209446"
}, },
{ {
"name" : "https://support.apple.com/HT209447", "name": "https://support.apple.com/HT209443",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT209447" "url": "https://support.apple.com/HT209443"
}, },
{ {
"name": "https://support.apple.com/HT209448", "name": "https://support.apple.com/HT209448",
@ -110,6 +105,11 @@
"name": "106739", "name": "106739",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106739" "url": "http://www.securityfocus.com/bid/106739"
},
{
"name": "https://support.apple.com/HT209447",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT209447"
} }
] ]
} }