"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:30:31 +00:00
parent fa647f1506
commit cc78435c9e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 4256 additions and 4256 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2007-2240",
"STATE": "PUBLIC"
},
@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649",
"refsource" : "CONFIRM",
"url" : "http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649"
},
{
"name" : "MS07-045",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045"
},
{
"name" : "VU#570705",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/570705"
},
{
"name" : "25311",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25311"
},
{
"name": "ADV-2007-2882",
"refsource": "VUPEN",
@ -82,6 +62,16 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/39555"
},
{
"name": "http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649",
"refsource": "CONFIRM",
"url": "http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649"
},
{
"name": "MS07-045",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045"
},
{
"name": "26482",
"refsource": "SECUNIA",
@ -91,6 +81,16 @@
"name": "ibm-lenovo-acprunner-code-execution(36028)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36028"
},
{
"name": "25311",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25311"
},
{
"name": "VU#570705",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/570705"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070414 Pixaria Gallery 1.0 (class.Smarty.php) Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/465847/100/200/threaded"
"name": "http://www.pixaria.com/news/article/71/",
"refsource": "CONFIRM",
"url": "http://www.pixaria.com/news/article/71/"
},
{
"name": "3733",
@ -63,24 +63,9 @@
"url": "https://www.exploit-db.com/exploits/3733"
},
{
"name" : "http://pixaria.com/index.history.php",
"refsource" : "CONFIRM",
"url" : "http://pixaria.com/index.history.php"
},
{
"name" : "http://www.pixaria.com/news/article/70/",
"refsource" : "CONFIRM",
"url" : "http://www.pixaria.com/news/article/70/"
},
{
"name" : "http://www.pixaria.com/news/article/71/",
"refsource" : "CONFIRM",
"url" : "http://www.pixaria.com/news/article/71/"
},
{
"name" : "23489",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23489"
"name": "20070414 Pixaria Gallery 1.0 (class.Smarty.php) Remote File Include Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/465847/100/200/threaded"
},
{
"name": "ADV-2007-1390",
@ -88,9 +73,19 @@
"url": "http://www.vupen.com/english/advisories/2007/1390"
},
{
"name" : "34976",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34976"
"name": "pixaria-classsmarty-file-include(33662)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33662"
},
{
"name": "23489",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23489"
},
{
"name": "http://www.pixaria.com/news/article/70/",
"refsource": "CONFIRM",
"url": "http://www.pixaria.com/news/article/70/"
},
{
"name": "24821",
@ -98,9 +93,14 @@
"url": "http://secunia.com/advisories/24821"
},
{
"name" : "pixaria-classsmarty-file-include(33662)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33662"
"name": "http://pixaria.com/index.history.php",
"refsource": "CONFIRM",
"url": "http://pixaria.com/index.history.php"
},
{
"name": "34976",
"refsource": "OSVDB",
"url": "http://osvdb.org/34976"
}
]
}

View File

@ -53,25 +53,25 @@
"references": {
"reference_data": [
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=516776",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=516776"
"name": "25709",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25709"
},
{
"name": "24508",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24508"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=516776",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=516776"
},
{
"name": "37514",
"refsource": "OSVDB",
"url": "http://osvdb.org/37514"
},
{
"name" : "25709",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25709"
},
{
"name": "wikindx-localization-security-bypass(34922)",
"refsource": "XF",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070907 FLEA-2007-0052-1 gd",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
},
{
"name" : "http://www.libgd.org/ReleaseNote020035",
"refsource" : "MISC",
"url" : "http://www.libgd.org/ReleaseNote020035"
"name": "37741",
"refsource": "OSVDB",
"url": "http://osvdb.org/37741"
},
{
"name": "http://bugs.libgd.org/?do=details&task_id=87",
@ -68,9 +63,39 @@
"url": "http://bugs.libgd.org/?do=details&task_id=87"
},
{
"name" : "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
"refsource" : "CONFIRM",
"url" : "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
"name": "2007-0024",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0024/"
},
{
"name": "MDKSA-2007:164",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"name": "29157",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29157"
},
{
"name": "DSA-1613",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1613"
},
{
"name": "oval:org.mitre.oval:def:10348",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348"
},
{
"name": "http://www.libgd.org/ReleaseNote020035",
"refsource": "MISC",
"url": "http://www.libgd.org/ReleaseNote020035"
},
{
"name": "26415",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26415"
},
{
"name": "https://issues.rpath.com/browse/RPL-1643",
@ -82,136 +107,21 @@
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
},
{
"name" : "DSA-1613",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1613"
},
{
"name" : "FEDORA-2007-2055",
"refsource" : "FEDORA",
"url" : "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
},
{
"name" : "FEDORA-2007-692",
"refsource" : "FEDORA",
"url" : "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
},
{
"name" : "FEDORA-2010-19022",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
},
{
"name" : "FEDORA-2010-19033",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
},
{
"name" : "GLSA-200708-05",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200708-05.xml"
},
{
"name" : "GLSA-200711-34",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"name": "GLSA-200805-13",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
},
{
"name" : "MDKSA-2007:153",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
},
{
"name" : "MDKSA-2007:164",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"name" : "RHSA-2008:0146",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
},
{
"name" : "SUSE-SR:2007:015",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"name" : "2007-0024",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2007/0024/"
},
{
"name" : "24651",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24651"
},
{
"name" : "37741",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37741"
},
{
"name" : "oval:org.mitre.oval:def:10348",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348"
},
{
"name" : "25860",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25860"
},
{
"name" : "26272",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26272"
},
{
"name" : "26390",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26390"
},
{
"name" : "26415",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26415"
"name": "20070907 FLEA-2007-0052-1 gd",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
},
{
"name": "26467",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26467"
},
{
"name" : "26663",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26663"
},
{
"name" : "26766",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26766"
},
{
"name" : "26856",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26856"
},
{
"name" : "29157",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29157"
},
{
"name" : "30168",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30168"
},
{
"name": "31168",
"refsource": "SECUNIA",
@ -222,10 +132,100 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42813"
},
{
"name": "GLSA-200708-05",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
},
{
"name": "30168",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30168"
},
{
"name": "FEDORA-2007-692",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
},
{
"name": "ADV-2011-0022",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0022"
},
{
"name": "25860",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25860"
},
{
"name": "26663",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26663"
},
{
"name": "FEDORA-2010-19033",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
},
{
"name": "26856",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26856"
},
{
"name": "26272",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26272"
},
{
"name": "GLSA-200711-34",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"name": "RHSA-2008:0146",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
},
{
"name": "FEDORA-2010-19022",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
},
{
"name": "24651",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24651"
},
{
"name": "MDKSA-2007:153",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
},
{
"name": "26766",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26766"
},
{
"name": "26390",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26390"
},
{
"name": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
"refsource": "CONFIRM",
"url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
},
{
"name": "SUSE-SR:2007:015",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"name": "FEDORA-2007-2055",
"refsource": "FEDORA",
"url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070702 High Risk Flaw in Sun's Java Web Start",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/472673/100/0/threaded"
"name": "ADV-2007-2384",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2384"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307177",
@ -63,19 +63,9 @@
"url": "http://docs.info.apple.com/article.html?artnum=307177"
},
{
"name" : "APPLE-SA-2007-12-14",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
},
{
"name" : "102957",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102957-1"
},
{
"name" : "24695",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24695"
"name": "1018328",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018328"
},
{
"name": "37755",
@ -83,34 +73,44 @@
"url": "http://osvdb.org/37755"
},
{
"name" : "ADV-2007-2384",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2384"
"name": "javaweb-javapolicy-code-execution(35169)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35169"
},
{
"name": "APPLE-SA-2007-12-14",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
},
{
"name": "ADV-2007-4224",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4224"
},
{
"name" : "1018328",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018328"
},
{
"name": "25823",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25823"
},
{
"name": "102957",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102957-1"
},
{
"name": "28115",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28115"
},
{
"name" : "javaweb-javapolicy-code-execution(35169)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35169"
"name": "20070702 High Risk Flaw in Sun's Java Web Start",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/472673/100/0/threaded"
},
{
"name": "24695",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24695"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MA28921",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=nas2742405285431729b86256e620067dc17"
},
{
"name" : "24706",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24706"
"name": "25885",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25885"
},
{
"name": "37792",
@ -68,14 +63,19 @@
"url": "http://osvdb.org/37792"
},
{
"name" : "25885",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25885"
"name": "MA28921",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=nas2742405285431729b86256e620067dc17"
},
{
"name": "os400-tcpsyn-security-bypass(35173)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35173"
},
{
"name": "24706",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24706"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2007-3893",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:2284",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2284"
},
{
"name": "HPSBST02280",
"refsource": "HP",
@ -62,6 +67,21 @@
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
},
{
"name": "ADV-2007-3437",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3437"
},
{
"name": "1018788",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018788"
},
{
"name": "23469",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23469"
},
{
"name": "MS07-057",
"refsource": "MS",
@ -76,26 +96,6 @@
"name": "25916",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25916"
},
{
"name" : "ADV-2007-3437",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3437"
},
{
"name" : "oval:org.mitre.oval:def:2284",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2284"
},
{
"name" : "1018788",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1018788"
},
{
"name" : "23469",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23469"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "26214",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26214"
},
{
"name": "http://www.justinsamuel.com/2007/06/10/awbs-dedicated-server-info-visible-to-all-users-vulnerability/",
"refsource": "MISC",
@ -66,11 +71,6 @@
"name": "38690",
"refsource": "OSVDB",
"url": "http://osvdb.org/38690"
},
{
"name" : "26214",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26214"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070730 Security Testing Enterprise Messaging Systems",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0620.html"
},
{
"name" : "http://www.irmplc.com/content/pdfs/Security_Testing_Enterprise_Messaging_Systems.pdf",
"refsource" : "MISC",
"url" : "http://www.irmplc.com/content/pdfs/Security_Testing_Enterprise_Messaging_Systems.pdf"
},
{
"name" : "http://www.irmplc.com/index.php/111-Vendor-Alerts",
"refsource" : "MISC",
"url" : "http://www.irmplc.com/index.php/111-Vendor-Alerts"
},
{
"name" : "http://www.irmplc.com/index.php/160-Advisory-025",
"refsource" : "MISC",
"url" : "http://www.irmplc.com/index.php/160-Advisory-025"
"name": "37680",
"refsource": "OSVDB",
"url": "http://osvdb.org/37680"
},
{
"name": "20071203 CVE-2007-4158 == CVE-2007-5553?",
@ -78,29 +63,44 @@
"url": "http://www.attrition.org/pipermail/vim/2007-December/001855.html"
},
{
"name" : "25132",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25132"
},
{
"name" : "ADV-2007-2814",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2814"
},
{
"name" : "37680",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37680"
"name": "http://www.irmplc.com/index.php/111-Vendor-Alerts",
"refsource": "MISC",
"url": "http://www.irmplc.com/index.php/111-Vendor-Alerts"
},
{
"name": "1018512",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018512"
},
{
"name": "20070730 Security Testing Enterprise Messaging Systems",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0620.html"
},
{
"name": "25132",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25132"
},
{
"name": "http://www.irmplc.com/content/pdfs/Security_Testing_Enterprise_Messaging_Systems.pdf",
"refsource": "MISC",
"url": "http://www.irmplc.com/content/pdfs/Security_Testing_Enterprise_Messaging_Systems.pdf"
},
{
"name": "http://www.irmplc.com/index.php/160-Advisory-025",
"refsource": "MISC",
"url": "http://www.irmplc.com/index.php/160-Advisory-025"
},
{
"name": "26337",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26337"
},
{
"name": "ADV-2007-2814",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2814"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/476274/100/0/threaded"
},
{
"name": "phpcentrallogin-include-file-include(35980)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35980"
},
{
"name": "20070814 Re: PHPCentral Login Script Remote Command Execution Vulnerability",
"refsource": "BUGTRAQ",
@ -76,11 +81,6 @@
"name": "3005",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3005"
},
{
"name" : "phpcentrallogin-include-file-include(35980)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35980"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "4637",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4637"
},
{
"name": "26505",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26505"
},
{
"name": "4637",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4637"
},
{
"name": "ADV-2007-3962",
"refsource": "VUPEN",

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20071217 Uber Uploader <= 5.3.6 Remote File Upload Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/485235/100/100/threaded"
},
{
"name": "20071218 Re: Uber Uploader <= 5.3.6 Remote File Upload Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485290/100/100/threaded"
},
{
"name" : "43535",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/43535"
"name": "20071217 Uber Uploader <= 5.3.6 Remote File Upload Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485235/100/100/threaded"
},
{
"name": "3519",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3519"
},
{
"name": "43535",
"refsource": "OSVDB",
"url": "http://osvdb.org/43535"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "IZ12119",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=isg1IZ12119"
},
{
"name": "27177",
"refsource": "BID",
@ -76,6 +71,11 @@
"name": "28257",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28257"
},
{
"name": "IZ12119",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IZ12119"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20100323 Safari browser port blocking bypassed by integer overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/510283/100/0/threaded"
},
{
"name": "omniweb-tcp-security-bypass(57236)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57236"
},
{
"name": "20100323 Safari browser port blocking bypassed by integer overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/510283/100/0/threaded"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "comnewsfeeds-feedid-sql-injection(58263)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58263"
},
{
"name": "http://packetstormsecurity.org/1004-exploits/joomlanewsfeeds-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1004-exploits/joomlanewsfeeds-sql.txt"
},
{
"name" : "12465",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/12465"
},
{
"name": "39834",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39834"
},
{
"name" : "comnewsfeeds-feedid-sql-injection(58263)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58263"
"name": "12465",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/12465"
}
]
}

View File

@ -57,45 +57,45 @@
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html"
},
{
"name" : "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
},
{
"name": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/",
"refsource": "MISC",
"url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/"
},
{
"name" : "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource" : "MISC",
"url" : "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name" : "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource" : "MISC",
"url" : "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name" : "http://www.f-secure.com/weblog/archives/00001949.html",
"refsource" : "MISC",
"url" : "http://www.f-secure.com/weblog/archives/00001949.html"
},
{
"name" : "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/",
"refsource" : "MISC",
"url" : "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
},
{
"name": "39924",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39924"
},
{
"name": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource": "MISC",
"url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
},
{
"name": "67660",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/67660"
},
{
"name": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/",
"refsource": "MISC",
"url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
},
{
"name": "http://www.f-secure.com/weblog/archives/00001949.html",
"refsource": "MISC",
"url": "http://www.f-secure.com/weblog/archives/00001949.html"
},
{
"name": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource": "MISC",
"url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
}
]
}

View File

@ -57,40 +57,40 @@
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html"
},
{
"name" : "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
},
{
"name": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/",
"refsource": "MISC",
"url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/"
},
{
"name" : "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource" : "MISC",
"url" : "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name" : "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource" : "MISC",
"url" : "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name": "http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-earth-shaker/",
"refsource": "MISC",
"url": "http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-earth-shaker/"
},
{
"name": "39924",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39924"
},
{
"name": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource": "MISC",
"url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
},
{
"name": "http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-game-security-software/",
"refsource": "MISC",
"url": "http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-game-security-software/"
},
{
"name" : "http://www.f-secure.com/weblog/archives/00001949.html",
"refsource" : "MISC",
"url" : "http://www.f-secure.com/weblog/archives/00001949.html"
"name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
},
{
"name": "67660",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/67660"
},
{
"name": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/",
@ -98,14 +98,14 @@
"url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
},
{
"name" : "39924",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39924"
"name": "http://www.f-secure.com/weblog/archives/00001949.html",
"refsource": "MISC",
"url": "http://www.f-secure.com/weblog/archives/00001949.html"
},
{
"name" : "67660",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/67660"
"name": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
"refsource": "MISC",
"url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-0025",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-0740",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1242",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT6001",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6001"
},
{
"name": "65088",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65088"
},
{
"name": "1029671",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029671"
},
{
"name": "102410",
"refsource": "OSVDB",
"url": "http://osvdb.org/102410"
},
{
"name" : "1029671",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029671"
"name": "http://support.apple.com/kb/HT6001",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6001"
},
{
"name": "apple-itunes-cve20141242-mitm(90653)",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1319",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-1431",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1567",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2015:0138",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"
},
{
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-72.html",
"refsource": "CONFIRM",
@ -62,6 +67,21 @@
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1037641"
},
{
"name": "SUSE-SU-2014:1112",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html"
},
{
"name": "69520",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69520"
},
{
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
@ -73,84 +93,64 @@
"url": "http://www.debian.org/security/2014/dsa-3018"
},
{
"name" : "DSA-3028",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-3028"
},
{
"name" : "GLSA-201504-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-01"
},
{
"name" : "SUSE-SU-2014:1107",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html"
},
{
"name" : "SUSE-SU-2014:1112",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html"
"name": "1030794",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030794"
},
{
"name": "SUSE-SU-2014:1120",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html"
},
{
"name" : "openSUSE-SU-2014:1098",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"
},
{
"name" : "openSUSE-SU-2014:1099",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"
},
{
"name" : "openSUSE-SU-2015:0138",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"
},
{
"name": "openSUSE-SU-2015:1266",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
},
{
"name" : "69520",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69520"
},
{
"name" : "1030793",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030793"
},
{
"name" : "1030794",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030794"
},
{
"name" : "60148",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60148"
},
{
"name": "60186",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60186"
},
{
"name": "61390",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61390"
},
{
"name": "openSUSE-SU-2014:1098",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"
},
{
"name": "60148",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60148"
},
{
"name": "openSUSE-SU-2014:1099",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"
},
{
"name": "61114",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61114"
},
{
"name" : "61390",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/61390"
"name": "DSA-3028",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3028"
},
{
"name": "SUSE-SU-2014:1107",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html"
},
{
"name": "1030793",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030793"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "69091",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69091"
},
{
"name": "https://www.drupal.org/node/2316717",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2316717"
},
{
"name" : "https://www.drupal.org/node/2316023",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/node/2316023"
},
{
"name": "https://www.drupal.org/node/2316025",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2316025"
},
{
"name" : "69091",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69091"
"name": "https://www.drupal.org/node/2316023",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2316023"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533576/100/0/threaded"
},
{
"name" : "http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html"
},
{
"name": "http://www.adaptivecomputing.com/security-advisory/",
"refsource": "CONFIRM",
@ -72,6 +67,11 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70174"
},
{
"name": "http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html"
},
{
"name": "moab-cve20145375-sec-bypass(96698)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-5424",
"STATE": "PUBLIC"
},

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=713247",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=713247"
},
{
"name": "https://git.gnome.org/browse/geary/commit/?h=geary-0.6&id=55f06a7bdcedb7efde6a516bde626ea28793ca7e",
"refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "openSUSE-SU-2014:1225",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00035.html"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=713247",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=713247"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5731",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#151121",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5915",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#179897",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-2002",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://alephsecurity.com/vulns/aleph-2015003",
"refsource" : "MISC",
"url" : "https://alephsecurity.com/vulns/aleph-2015003"
},
{
"name": "https://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdf",
"refsource": "MISC",
"url": "https://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdf"
},
{
"name": "https://alephsecurity.com/vulns/aleph-2015003",
"refsource": "MISC",
"url": "https://alephsecurity.com/vulns/aleph-2015003"
}
]
}

View File

@ -52,31 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150314 CVE Request for python-requests session fixation vulnerability",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/03/14/4"
},
{
"name": "[oss-security] 20150314 Re: CVE Request for python-requests session fixation vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/03/15/1"
},
{
"name" : "https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc",
"refsource" : "CONFIRM",
"url" : "https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc"
},
{
"name" : "https://warehouse.python.org/project/requests/2.6.0/",
"refsource" : "CONFIRM",
"url" : "https://warehouse.python.org/project/requests/2.6.0/"
},
{
"name" : "http://advisories.mageia.org/MGASA-2015-0120.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2015-0120.html"
},
{
"name": "FEDORA-2015-4084",
"refsource": "FEDORA",
@ -87,10 +67,30 @@
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:133"
},
{
"name": "[oss-security] 20150314 CVE Request for python-requests session fixation vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/03/14/4"
},
{
"name": "USN-2531-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2531-1"
},
{
"name": "https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc",
"refsource": "CONFIRM",
"url": "https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc"
},
{
"name": "http://advisories.mageia.org/MGASA-2015-0120.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2015-0120.html"
},
{
"name": "https://warehouse.python.org/project/requests/2.6.0/",
"refsource": "CONFIRM",
"url": "https://warehouse.python.org/project/requests/2.6.0/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-2526",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MS15-101",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-101"
"name": "1033493",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033493"
},
{
"name": "76567",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/76567"
},
{
"name" : "1033493",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033493"
"name": "MS15-101",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-101"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-2878",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20150724 Hawkeye-G v3 CSRF Vulnerability ***[UPDATED CORRECTED]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/536076/100/0/threaded"
"name": "37686",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37686/"
},
{
"name": "20150724 Hawkeye-G v3.0.1.4912 CSRF Vulnerability CVE-2015-2878",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/archive/1/536074/100/0/threaded"
},
{
"name" : "37686",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/37686/"
"name": "20150724 Hawkeye-G v3 CSRF Vulnerability ***[UPDATED CORRECTED]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/536076/100/0/threaded"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00015.html"
},
{
"name" : "https://www.checkmarx.com/advisories/cross-site-scripting-xss-vulnerability-in-kohana/",
"refsource" : "MISC",
"url" : "https://www.checkmarx.com/advisories/cross-site-scripting-xss-vulnerability-in-kohana/"
"name": "https://github.com/kohana/kohana/releases/tag/v3.3.6",
"refsource": "CONFIRM",
"url": "https://github.com/kohana/kohana/releases/tag/v3.3.6"
},
{
"name": "https://github.com/kohana/kohana/issues/107",
@ -68,9 +68,9 @@
"url": "https://github.com/kohana/kohana/issues/107"
},
{
"name" : "https://github.com/kohana/kohana/releases/tag/v3.3.6",
"refsource" : "CONFIRM",
"url" : "https://github.com/kohana/kohana/releases/tag/v3.3.6"
"name": "https://www.checkmarx.com/advisories/cross-site-scripting-xss-vulnerability-in-kohana/",
"refsource": "MISC",
"url": "https://www.checkmarx.com/advisories/cross-site-scripting-xss-vulnerability-in-kohana/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-3833",
"STATE": "PUBLIC"
},

View File

@ -70,11 +70,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
},
{
"name": "95595",
"refsource": "BID",
@ -84,6 +79,11 @@
"name": "1037639",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037639"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-8398",
"STATE": "PUBLIC"
},

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.talosintelligence.com/reports/TALOS-2016-0248/",
"refsource" : "MISC",
"url" : "http://www.talosintelligence.com/reports/TALOS-2016-0248/"
},
{
"name": "94920",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94920"
},
{
"name": "http://www.talosintelligence.com/reports/TALOS-2016-0248/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0248/"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "http://nwtime.org/ntp428p9_release/",
"refsource" : "CONFIRM",
"url" : "http://nwtime.org/ntp428p9_release/"
},
{
"name" : "http://support.ntp.org/bin/view/Main/NtpBug3110",
"refsource" : "CONFIRM",
"url" : "http://support.ntp.org/bin/view/Main/NtpBug3110"
},
{
"name": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities",
"refsource": "CONFIRM",
"url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
},
{
"name" : "https://bto.bluecoat.com/security-advisory/sa139",
"name": "http://nwtime.org/ntp428p9_release/",
"refsource": "CONFIRM",
"url" : "https://bto.bluecoat.com/security-advisory/sa139"
"url": "http://nwtime.org/ntp428p9_release/"
},
{
"name": "VU#633847",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/633847"
},
{
"name": "1037354",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037354"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa139",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa139"
},
{
"name": "94450",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94450"
},
{
"name" : "1037354",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037354"
"name": "http://support.ntp.org/bin/view/Main/NtpBug3110",
"refsource": "CONFIRM",
"url": "http://support.ntp.org/bin/view/Main/NtpBug3110"
}
]
}

View File

@ -58,24 +58,24 @@
"url": "http://www.openwall.com/lists/oss-security/2016/07/22/1"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb",
"name": "https://github.com/torvalds/linux/commit/7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb",
"refsource": "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb"
"url": "https://github.com/torvalds/linux/commit/7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.7",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.7"
},
{
"name" : "https://github.com/torvalds/linux/commit/7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb"
},
{
"name": "94546",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94546"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb"
}
]
}