"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:50:36 +00:00
parent 43ada57ca9
commit cea7fd845b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
64 changed files with 3228 additions and 3228 deletions

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "22180",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22180"
"name": "enthusiast-show-xss(31667)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31667"
},
{
"name": "31608",
"refsource": "OSVDB",
"url": "http://osvdb.org/31608"
},
{
"name": "22180",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22180"
},
{
"name": "23865",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23865"
},
{
"name" : "enthusiast-show-xss(31667)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31667"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name": "24966",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24966"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305391",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305391"
},
{
"name" : "APPLE-SA-2007-04-19",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
},
{
"name" : "TA07-109A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
},
{
"name" : "23569",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23569"
},
{
"name" : "ADV-2007-1470",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1470"
},
{
"name": "34868",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/34868"
},
{
"name" : "24966",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24966"
"name": "23569",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23569"
},
{
"name": "TA07-109A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
},
{
"name": "APPLE-SA-2007-04-19",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
},
{
"name": "ADV-2007-1470",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1470"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "3252",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3252"
},
{
"name" : "20805",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20805"
},
{
"name" : "33112",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33112"
"name": "eqdkp-backup-information-disclosure(32152)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32152"
},
{
"name": "24038",
@ -73,9 +63,19 @@
"url": "http://secunia.com/advisories/24038"
},
{
"name" : "eqdkp-backup-information-disclosure(32152)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32152"
"name": "3252",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3252"
},
{
"name": "33112",
"refsource": "OSVDB",
"url": "http://osvdb.org/33112"
},
{
"name": "20805",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20805"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "22406",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22406"
},
{
"name" : "33093",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33093"
},
{
"name": "24019",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24019"
},
{
"name": "22406",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22406"
},
{
"name": "coppermine-admin-command-execution(32236)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32236"
},
{
"name": "33093",
"refsource": "OSVDB",
"url": "http://osvdb.org/33093"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070207 Ability to inject and execute any code as root in SysCP",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/459397/100/0/threaded"
},
{
"name" : "http://www.syscp.org/wiki/Security/SyscpOrgAbilityToInjectAndExecuteAnyCodeAsRootInSysCP",
"refsource" : "CONFIRM",
"url" : "http://www.syscp.org/wiki/Security/SyscpOrgAbilityToInjectAndExecuteAnyCodeAsRootInSysCP"
"name": "33127",
"refsource": "OSVDB",
"url": "http://osvdb.org/33127"
},
{
"name": "22454",
@ -68,19 +63,24 @@
"url": "http://www.securityfocus.com/bid/22454"
},
{
"name" : "33127",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33127"
},
{
"name" : "24102",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24102"
"name": "20070207 Ability to inject and execute any code as root in SysCP",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459397/100/0/threaded"
},
{
"name": "syscp-cronscript-code-execution(32330)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32330"
},
{
"name": "http://www.syscp.org/wiki/Security/SyscpOrgAbilityToInjectAndExecuteAnyCodeAsRootInSysCP",
"refsource": "CONFIRM",
"url": "http://www.syscp.org/wiki/Security/SyscpOrgAbilityToInjectAndExecuteAnyCodeAsRootInSysCP"
},
{
"name": "24102",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24102"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "3321",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3321"
},
{
"name": "22593",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22593"
},
{
"name" : "35131",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35131"
},
{
"name": "snitzforums-popprofile-sql-injection(32543)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32543"
},
{
"name": "3321",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3321"
},
{
"name": "35131",
"refsource": "OSVDB",
"url": "http://osvdb.org/35131"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "1017797",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017797"
},
{
"name": "20070320 Cisco IP Phone 7940/7960 SIP INVITE Denial of Service",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_response09186a00808075ad.html"
},
{
"name" : "23047",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23047"
"name": "cisco-ipphone-sip-invite-dos(33098)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33098"
},
{
"name": "ADV-2007-1023",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1023"
},
{
"name" : "1017797",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017797"
},
{
"name": "24600",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24600"
},
{
"name" : "cisco-ipphone-sip-invite-dos(33098)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33098"
"name": "23047",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23047"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "3552",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3552"
},
{
"name": "23111",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23111"
},
{
"name": "philex-download-file-disclosure(33181)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33181"
},
{
"name": "ADV-2007-1099",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1099"
},
{
"name" : "philex-download-file-disclosure(33181)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33181"
"name": "3552",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3552"
}
]
}

View File

@ -53,54 +53,54 @@
"references": {
"reference_data": [
{
"name" : "20070404 Kaspersky Internet Security Suite klif.sys Heap Overflow Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=505"
},
{
"name" : "http://www.kaspersky.com/technews?id=203038693",
"refsource" : "CONFIRM",
"url" : "http://www.kaspersky.com/technews?id=203038693"
},
{
"name" : "http://www.kaspersky.com/technews?id=203038694",
"refsource" : "CONFIRM",
"url" : "http://www.kaspersky.com/technews?id=203038694"
"name": "33851",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/33851"
},
{
"name": "23326",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23326"
},
{
"name": "24778",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24778"
},
{
"name": "20070404 Kaspersky Internet Security Suite klif.sys Heap Overflow Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=505"
},
{
"name": "http://www.kaspersky.com/technews?id=203038694",
"refsource": "CONFIRM",
"url": "http://www.kaspersky.com/technews?id=203038694"
},
{
"name": "ADV-2007-1268",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1268"
},
{
"name" : "33851",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/33851"
},
{
"name": "1017873",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017873"
},
{
"name": "kaspersky-klif-bo(33460)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33460"
},
{
"name": "1017872",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017872"
},
{
"name" : "24778",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24778"
},
{
"name" : "kaspersky-klif-bo(33460)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33460"
"name": "http://www.kaspersky.com/technews?id=203038693",
"refsource": "CONFIRM",
"url": "http://www.kaspersky.com/technews?id=203038693"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20070331 Remot File Include In SLAED_CMS_2",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/464349/100/0/threaded"
},
{
"name" : "35220",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35220"
},
{
"name": "35221",
"refsource": "OSVDB",
@ -72,6 +62,16 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2567"
},
{
"name": "35220",
"refsource": "OSVDB",
"url": "http://osvdb.org/35220"
},
{
"name": "20070331 Remot File Include In SLAED_CMS_2",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464349/100/0/threaded"
},
{
"name": "slaed-index-admin-file-include(33343)",
"refsource": "XF",

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071009",
"refsource" : "MISC",
"url" : "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071009"
},
{
"name": "http://www.powerarchiver.com/news/",
"refsource": "CONFIRM",
"url": "http://www.powerarchiver.com/news/"
},
{
"name" : "JVN#61323184",
"refsource" : "JVN",
"url" : "http://jvn.jp/jp/JVN%2361323184/index.html"
},
{
"name" : "25938",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25938"
},
{
"name": "ADV-2007-3378",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3378"
},
{
"name" : "41552",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/41552"
"name": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071009",
"refsource": "MISC",
"url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071009"
},
{
"name": "25938",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25938"
},
{
"name": "27000",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27000"
},
{
"name": "JVN#61323184",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2361323184/index.html"
},
{
"name": "powerarchiver-blackhole-bo(36969)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36969"
},
{
"name": "41552",
"refsource": "OSVDB",
"url": "http://osvdb.org/41552"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "3212",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3212"
},
{
"name": "20071005 [Aria-Security] Stuffed Tracker Multiple Cross-Site Scripting VULN",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/481658/100/0/threaded"
},
{
"name" : "20071009 Viart Shopping Cart Directory Transversal",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/481848"
},
{
"name": "25998",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25998"
},
{
"name" : "3212",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3212"
"name": "20071009 Viart Shopping Cart Directory Transversal",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/481848"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-3060",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-208",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-208"
"name": "74604",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74604"
},
{
"name": "https://helpx.adobe.com/security/products/reader/apsb15-10.html",
@ -63,9 +63,9 @@
"url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html"
},
{
"name" : "74604",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/74604"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-208",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-208"
},
{
"name": "1032284",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3702",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT204942",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT204942"
},
{
"name": "APPLE-SA-2015-06-30-2",
"refsource": "APPLE",
@ -71,6 +66,11 @@
"name": "1032760",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032760"
},
{
"name": "http://support.apple.com/kb/HT204942",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT204942"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20150610 Arbitrary File Disclosure and Open Redirect in Bonita BPM",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/535733/100/0/threaded"
},
{
"name": "http://packetstormsecurity.com/files/132237/Bonita-BPM-6.5.1-Directory-Traversal-Open-Redirect.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132237/Bonita-BPM-6.5.1-Directory-Traversal-Open-Redirect.html"
},
{
"name": "20150610 Arbitrary File Disclosure and Open Redirect in Bonita BPM",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/535733/100/0/threaded"
},
{
"name": "https://www.htbridge.com/advisory/HTB23259",
"refsource": "MISC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-3949",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-160-02",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-160-02"
},
{
"name": "75100",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75100"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-160-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-160-02"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6183",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6387",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-6486",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-6995",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT205370",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205370"
},
{
"name" : "https://support.apple.com/HT205375",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205375"
"name": "APPLE-SA-2015-10-21-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
},
{
"name": "APPLE-SA-2015-10-21-1",
@ -68,9 +63,14 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
},
{
"name" : "APPLE-SA-2015-10-21-4",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
"name": "https://support.apple.com/HT205375",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205375"
},
{
"name": "https://support.apple.com/HT205370",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205370"
},
{
"name": "77263",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-7148",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-7779",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -63,9 +63,14 @@
"url": "http://www.openwall.com/lists/oss-security/2016/06/06/2"
},
{
"name" : "http://trac.imagemagick.org/changeset/17845",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1195260",
"refsource": "CONFIRM",
"url" : "http://trac.imagemagick.org/changeset/17845"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195260"
},
{
"name": "https://github.com/ImageMagick/ImageMagick/commit/97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/commit/97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6"
},
{
"name": "http://trac.imagemagick.org/changeset/17846",
@ -78,14 +83,9 @@
"url": "http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26929"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1195260",
"name": "http://trac.imagemagick.org/changeset/17845",
"refsource": "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1195260"
},
{
"name" : "https://github.com/ImageMagick/ImageMagick/commit/97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6",
"refsource" : "CONFIRM",
"url" : "https://github.com/ImageMagick/ImageMagick/commit/97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6"
"url": "http://trac.imagemagick.org/changeset/17845"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0050",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "MS16-021",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-021"
},
{
"name": "1034986",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034986"
},
{
"name": "MS16-021",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-021"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0503",
"STATE": "PUBLIC"
},
@ -52,30 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name" : "RHSA-2016:0705",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
},
{
"name": "openSUSE-SU-2016:0367",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"
},
{
"name" : "openSUSE-SU-2016:0377",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"
"name": "1034708",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034708"
},
{
"name" : "USN-2881-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2881-1"
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "81126",
@ -83,9 +73,19 @@
"url": "http://www.securityfocus.com/bid/81126"
},
{
"name" : "1034708",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034708"
"name": "USN-2881-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2881-1"
},
{
"name": "openSUSE-SU-2016:0377",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"
},
{
"name": "RHSA-2016:0705",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-0971",
"STATE": "PUBLIC"
},
@ -52,15 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "SUSE-SU-2016:0400",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html"
},
{
"name": "39465",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39465/"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-04.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-04.html"
"name": "1034970",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034970"
},
{
"name": "GLSA-201603-07",
@ -73,14 +78,9 @@
"url": "http://rhn.redhat.com/errata/RHSA-2016-0166.html"
},
{
"name" : "SUSE-SU-2016:0398",
"name": "openSUSE-SU-2016:0415",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html"
},
{
"name" : "SUSE-SU-2016:0400",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html"
},
{
"name": "openSUSE-SU-2016:0412",
@ -88,14 +88,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html"
},
{
"name" : "openSUSE-SU-2016:0415",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html"
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-04.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-04.html"
},
{
"name" : "1034970",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034970"
"name": "SUSE-SU-2016:0398",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-0982",
"STATE": "PUBLIC"
},
@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-04.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-04.html"
"name": "SUSE-SU-2016:0400",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html"
},
{
"name": "1034970",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034970"
},
{
"name": "GLSA-201603-07",
@ -68,14 +73,9 @@
"url": "http://rhn.redhat.com/errata/RHSA-2016-0166.html"
},
{
"name" : "SUSE-SU-2016:0398",
"name": "openSUSE-SU-2016:0415",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html"
},
{
"name" : "SUSE-SU-2016:0400",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html"
},
{
"name": "openSUSE-SU-2016:0412",
@ -83,14 +83,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html"
},
{
"name" : "openSUSE-SU-2016:0415",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html"
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-04.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-04.html"
},
{
"name" : "1034970",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034970"
"name": "SUSE-SU-2016:0398",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1193",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.cybozu.com/ja-jp/article/8919",
"refsource" : "CONFIRM",
"url" : "https://support.cybozu.com/ja-jp/article/8919"
},
{
"name": "JVN#25765762",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN25765762/index.html"
},
{
"name": "https://support.cybozu.com/ja-jp/article/8919",
"refsource": "CONFIRM",
"url": "https://support.cybozu.com/ja-jp/article/8919"
},
{
"name": "JVNDB-2016-000079",
"refsource": "JVNDB",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1289",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20160629 Cisco Prime Infrastructure and Evolved Programmable Network Manager Authentication Bypass API Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-piauthbypass"
},
{
"name": "91504",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1036195",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036195"
},
{
"name": "20160629 Cisco Prime Infrastructure and Evolved Programmable Network Manager Authentication Bypass API Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-piauthbypass"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "GLSA-201606-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201606-07"
},
{
"name": "https://android.googlesource.com/platform/external/dhcpcd/+/1390ace71179f04a09c300ee8d0300aa69d9db09",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/external/dhcpcd/+/1390ace71179f04a09c300ee8d0300aa69d9db09"
},
{
"name": "http://roy.marples.name/projects/dhcpcd/info/76a1609352263bd9def1300d7ba990679571fa30",
"refsource": "CONFIRM",
@ -62,16 +72,6 @@
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-04-02.html"
},
{
"name" : "https://android.googlesource.com/platform/external/dhcpcd/+/1390ace71179f04a09c300ee8d0300aa69d9db09",
"refsource" : "CONFIRM",
"url" : "https://android.googlesource.com/platform/external/dhcpcd/+/1390ace71179f04a09c300ee8d0300aa69d9db09"
},
{
"name" : "GLSA-201606-07",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201606-07"
},
{
"name": "HPSBPI03554",
"refsource": "HP",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2016-1546",
"STATE": "PUBLIC"
},
@ -52,36 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "92331",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92331"
},
{
"name": "http://httpd.apache.org/security/vulnerabilities_24.html",
"refsource": "CONFIRM",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1733727",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1733727"
},
{
"name" : "http://www.apache.org/dist/httpd/CHANGES_2.4",
"refsource" : "CONFIRM",
"url" : "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20180601-0001/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20180601-0001/"
},
{
"name": "GLSA-201610-02",
"refsource": "GENTOO",
@ -93,9 +73,29 @@
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"name" : "92331",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92331"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"refsource": "CONFIRM",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1733727",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1733727"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180601-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180601-0001/"
}
]
}

View File

@ -57,16 +57,6 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/09/3"
},
{
"name" : "https://github.com/wireshark/wireshark/commit/b4d16b4495b732888e12baf5b8a7e9bf2665e22b",
"refsource" : "CONFIRM",
"url" : "https://github.com/wireshark/wireshark/commit/b4d16b4495b732888e12baf5b8a7e9bf2665e22b"
},
{
"name" : "https://www.wireshark.org/security/wnpa-sec-2016-29.html",
"refsource" : "CONFIRM",
"url" : "https://www.wireshark.org/security/wnpa-sec-2016-29.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
@ -77,10 +67,20 @@
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3615"
},
{
"name": "https://github.com/wireshark/wireshark/commit/b4d16b4495b732888e12baf5b8a7e9bf2665e22b",
"refsource": "CONFIRM",
"url": "https://github.com/wireshark/wireshark/commit/b4d16b4495b732888e12baf5b8a7e9bf2665e22b"
},
{
"name": "91140",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91140"
},
{
"name": "https://www.wireshark.org/security/wnpa-sec-2016-29.html",
"refsource": "CONFIRM",
"url": "https://www.wireshark.org/security/wnpa-sec-2016-29.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5533",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "93676",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93676"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1036441",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036441"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
"refsource": "MISC",
@ -66,11 +71,6 @@
"name": "92112",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92112"
},
{
"name" : "1036441",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036441"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-182-02"
},
{
"name" : "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-444217.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-444217.pdf"
},
{
"name": "91525",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91525"
},
{
"name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-444217.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-444217.pdf"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2019-0557",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0557",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0557"
},
{
"name": "106388",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106388"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0557",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0557"
}
]
}