"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:52:44 +00:00
parent e8845940a9
commit e399c857d4
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 3397 additions and 3397 deletions

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html"
},
{
"name" : "TA07-017A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-017A.html"
"name": "23794",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23794"
},
{
"name": "22083",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22083"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html"
},
{
"name": "32880",
"refsource": "OSVDB",
"url": "http://osvdb.org/32880"
},
{
"name" : "1017522",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017522"
},
{
"name" : "23794",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23794"
"name": "TA07-017A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-017A.html"
},
{
"name": "oracle-cpu-jan2007(31541)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31541"
},
{
"name": "1017522",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017522"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20070125 high5 Review script Security Risk",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/458122/100/0/threaded"
"name": "32974",
"refsource": "OSVDB",
"url": "http://osvdb.org/32974"
},
{
"name": "high5review-search-xss(31797)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31797"
},
{
"name": "ADV-2007-0363",
@ -63,19 +68,14 @@
"url": "http://www.vupen.com/english/advisories/2007/0363"
},
{
"name" : "32974",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/32974"
"name": "20070125 high5 Review script Security Risk",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/458122/100/0/threaded"
},
{
"name": "23905",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23905"
},
{
"name" : "high5review-search-xss(31797)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31797"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070222 Microsoft Windows 2000/XP/2003/Vista ReadDirectoryChangesW informaton leak",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/460899/100/0/threaded"
},
{
"name" : "20070222 Re[2]: [Full-disclosure] Microsoft Windows 2000/XP/2003/Vista ReadDirectoryChangesW informaton leak",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/460887/100/0/threaded"
},
{
"name" : "20070222 Microsoft Windows 2000/XP/2003/Vista ReadDirectoryChangesW informaton leak",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052613.html"
"name": "22664",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22664"
},
{
"name": "http://securityvulns.com/advisories/readdirectorychanges.asp",
@ -73,9 +63,19 @@
"url": "http://securityvulns.com/advisories/readdirectorychanges.asp"
},
{
"name" : "22664",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22664"
"name": "20070222 Microsoft Windows 2000/XP/2003/Vista ReadDirectoryChangesW informaton leak",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052613.html"
},
{
"name": "24245",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24245"
},
{
"name": "20070222 Microsoft Windows 2000/XP/2003/Vista ReadDirectoryChangesW informaton leak",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460899/100/0/threaded"
},
{
"name": "ADV-2007-0701",
@ -88,19 +88,19 @@
"url": "http://osvdb.org/33474"
},
{
"name" : "24245",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24245"
"name": "win-readdirectory-information-disclosure(32644)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32644"
},
{
"name": "20070222 Re[2]: [Full-disclosure] Microsoft Windows 2000/XP/2003/Vista ReadDirectoryChangesW informaton leak",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460887/100/0/threaded"
},
{
"name": "2282",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2282"
},
{
"name" : "win-readdirectory-information-disclosure(32644)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32644"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "20070214 Multiple Vulnerabilities in Firewall Services Module",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name" : "22561",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22561"
"name": "cisco-fwsm-http-dos(32497)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32497"
},
{
"name": "ADV-2007-0609",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0609"
},
{
"name": "cisco-fwsm-https-server-dos(32513)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32513"
},
{
"name": "22561",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "24172",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24172"
},
{
"name" : "cisco-fwsm-http-dos(32497)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32497"
},
{
"name" : "cisco-fwsm-https-server-dos(32513)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32513"
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460544/100/0/threaded"
},
{
"name" : "22615",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22615"
},
{
"name": "33742",
"refsource": "OSVDB",
@ -72,6 +67,11 @@
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16978"
},
{
"name": "22615",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22615"
},
{
"name": "2278",
"refsource": "SREASON",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "37012",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37012"
},
{
"name": "ADV-2007-2323",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2323"
},
{
"name": "37012",
"refsource": "OSVDB",
"url": "http://osvdb.org/37012"
}
]
}

View File

@ -52,16 +52,31 @@
},
"references": {
"reference_data": [
{
"name" : "20071010 Kaspersky Web Scanner ActiveX Format String Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=606"
},
{
"name": "http://www.kaspersky.com/news?id=207575572",
"refsource": "CONFIRM",
"url": "http://www.kaspersky.com/news?id=207575572"
},
{
"name": "1018800",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018800"
},
{
"name": "kaspersky-online-activex-format-string(37057)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37057"
},
{
"name": "27187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27187"
},
{
"name": "20071010 Kaspersky Web Scanner ActiveX Format String Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=606"
},
{
"name": "26004",
"refsource": "BID",
@ -71,21 +86,6 @@
"name": "ADV-2007-3455",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3455"
},
{
"name" : "1018800",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1018800"
},
{
"name" : "27187",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27187"
},
{
"name" : "kaspersky-online-activex-format-string(37057)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37057"
}
]
}

View File

@ -58,19 +58,9 @@
"url": "http://vuln.sg/quarkxpress72-en.html"
},
{
"name" : "24872",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24872"
},
{
"name" : "ADV-2007-2504",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2504"
},
{
"name" : "37890",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37890"
"name": "25994",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25994"
},
{
"name": "1018385",
@ -78,14 +68,24 @@
"url": "http://www.securitytracker.com/id?1018385"
},
{
"name" : "25994",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25994"
"name": "37890",
"refsource": "OSVDB",
"url": "http://osvdb.org/37890"
},
{
"name": "ADV-2007-2504",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2504"
},
{
"name": "quarkxpress-msword-textimportext-bo(35369)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35369"
},
{
"name": "24872",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24872"
}
]
}

View File

@ -52,50 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "20071217 Apple Mac OS X mount_smbfs Stack Based Buffer Overflow Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=633"
},
{
"name" : "4759",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4759"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=307179",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=307179"
},
{
"name" : "APPLE-SA-2007-12-17",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
},
{
"name" : "TA07-352A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
},
{
"name" : "26926",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26926"
},
{
"name" : "26910",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26910"
},
{
"name": "ADV-2007-4238",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4238"
},
{
"name" : "1019106",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019106"
"name": "20071217 Apple Mac OS X mount_smbfs Stack Based Buffer Overflow Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=633"
},
{
"name": "TA07-352A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
},
{
"name": "28136",
@ -106,6 +76,36 @@
"name": "macos-smb-bo(39109)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39109"
},
{
"name": "26910",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26910"
},
{
"name": "26926",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26926"
},
{
"name": "1019106",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019106"
},
{
"name": "APPLE-SA-2007-12-17",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307179",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307179"
},
{
"name": "4759",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4759"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "20070720 Secure Computing - Security Reporter Auth Bypass and Directory Traversal Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=118522960430476&w=2"
},
{
"name" : "http://www.oliverkarow.de/research/securityreporter.txt",
"refsource" : "MISC",
"url" : "http://www.oliverkarow.de/research/securityreporter.txt"
"name": "securityreporter-name-security-bypass(35591)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35591"
},
{
"name": "http://www.securecomputing.com/index.cfm?skey=1429",
"refsource": "CONFIRM",
"url": "http://www.securecomputing.com/index.cfm?skey=1429"
},
{
"name" : "25027",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25027"
},
{
"name": "26167",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26167"
},
{
"name" : "securityreporter-name-security-bypass(35591)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35591"
"name": "25027",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25027"
},
{
"name": "http://www.oliverkarow.de/research/securityreporter.txt",
"refsource": "MISC",
"url": "http://www.oliverkarow.de/research/securityreporter.txt"
},
{
"name": "20070720 Secure Computing - Security Reporter Auth Bypass and Directory Traversal Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=118522960430476&w=2"
}
]
}

View File

@ -53,14 +53,19 @@
"references": {
"reference_data": [
{
"name" : "[dovecot-news] 20070801 v1.0.3 released",
"refsource" : "MLIST",
"url" : "http://www.dovecot.org/list/dovecot-news/2007-August/000048.html"
"name": "oval:org.mitre.oval:def:11558",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11558"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1621",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1621"
"name": "dovecot-aclplugin-security-bypass(35767)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35767"
},
{
"name": "30342",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30342"
},
{
"name": "RHSA-2008:0297",
@ -73,29 +78,24 @@
"url": "http://www.securityfocus.com/bid/25182"
},
{
"name" : "oval:org.mitre.oval:def:11558",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11558"
"name": "https://issues.rpath.com/browse/RPL-1621",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1621"
},
{
"name": "26320",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26320"
},
{
"name": "[dovecot-news] 20070801 v1.0.3 released",
"refsource": "MLIST",
"url": "http://www.dovecot.org/list/dovecot-news/2007-August/000048.html"
},
{
"name": "26475",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26475"
},
{
"name" : "30342",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30342"
},
{
"name" : "dovecot-aclplugin-security-bypass(35767)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35767"
}
]
}

View File

@ -57,40 +57,40 @@
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=613"
},
{
"name" : "ftp://aix.software.ibm.com/aix/efixes/security/dig_ifix.tar",
"refsource" : "CONFIRM",
"url" : "ftp://aix.software.ibm.com/aix/efixes/security/dig_ifix.tar"
},
{
"name" : "IZ05017",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=isg1IZ05017"
},
{
"name": "26262",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26262"
},
{
"name" : "ADV-2007-3669",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3669"
},
{
"name" : "1018871",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1018871"
},
{
"name": "27437",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27437"
},
{
"name": "IZ05017",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ05017"
},
{
"name": "aix-dig-dnsnamefromtext-integer-underflow(38169)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38169"
},
{
"name": "1018871",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018871"
},
{
"name": "ftp://aix.software.ibm.com/aix/efixes/security/dig_ifix.tar",
"refsource": "CONFIRM",
"url": "ftp://aix.software.ibm.com/aix/efixes/security/dig_ifix.tar"
},
{
"name": "ADV-2007-3669",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3669"
}
]
}

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "4370",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4370"
},
{
"name": "25592",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25592"
},
{
"name" : "36940",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36940"
"name": "4370",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4370"
},
{
"name": "36945",
@ -73,15 +68,20 @@
"url": "http://osvdb.org/36945"
},
{
"name" : "37078",
"name": "36940",
"refsource": "OSVDB",
"url" : "http://osvdb.org/37078"
"url": "http://osvdb.org/36940"
},
{
"name": "26758",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26758"
},
{
"name": "37078",
"refsource": "OSVDB",
"url": "http://osvdb.org/37078"
},
{
"name": "webace-start-sql-injection(36493)",
"refsource": "XF",

View File

@ -52,11 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "70173",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70173"
},
{
"name": "20140929 Moab Authentication Bypass [CVE-2014-5300]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533574/100/0/threaded"
},
{
"name": "moab-cve20145300-sec-bypass(96699)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96699"
},
{
"name": "http://www.adaptivecomputing.com/security-advisory/",
"refsource": "CONFIRM",
"url": "http://www.adaptivecomputing.com/security-advisory/"
},
{
"name": "34865",
"refsource": "EXPLOIT-DB",
@ -66,21 +81,6 @@
"name": "http://packetstormsecurity.com/files/128483/Moab-Dynamic-Configuration-Authentication-Bypass.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128483/Moab-Dynamic-Configuration-Authentication-Bypass.html"
},
{
"name" : "http://www.adaptivecomputing.com/security-advisory/",
"refsource" : "CONFIRM",
"url" : "http://www.adaptivecomputing.com/security-advisory/"
},
{
"name" : "70173",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/70173"
},
{
"name" : "moab-cve20145300-sec-bypass(96699)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/96699"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-5397",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5730",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#972513",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/972513"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#972513",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/972513"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5898",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#236481",
"refsource": "CERT-VN",
@ -66,6 +61,11 @@
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6311",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2015-6642",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-01-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-01-01.html"
},
{
"name": "1034592",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034592"
},
{
"name": "http://source.android.com/security/bulletin/2016-01-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-01-01.html"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-244-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-244-01"
},
{
"name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-720081.pdf",
"refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "1033478",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033478"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-244-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-244-01"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-6703",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7104",
"STATE": "PUBLIC"
},
@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/kb/HT205636",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT205636"
},
{
"name": "openSUSE-SU-2016:0761",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html"
},
{
"name": "APPLE-SA-2015-12-08-5",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00003.html"
},
{
"name": "https://support.apple.com/HT205639",
"refsource": "CONFIRM",
@ -63,34 +78,19 @@
"url": "https://support.apple.com/HT205640"
},
{
"name" : "https://support.apple.com/kb/HT205636",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT205636"
"name": "1034341",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034341"
},
{
"name": "APPLE-SA-2015-12-08-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
},
{
"name" : "APPLE-SA-2015-12-08-5",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00003.html"
},
{
"name" : "openSUSE-SU-2016:0761",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html"
},
{
"name": "78726",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/78726"
},
{
"name" : "1034341",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034341"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-7207",
"STATE": "PUBLIC"
},
@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://github.com/w3c/resource-timing/issues/29",
"refsource" : "MISC",
"url" : "https://github.com/w3c/resource-timing/issues/29"
},
{
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-136.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-136.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1185256",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1185256"
},
{
"name" : "FEDORA-2015-51b1105902",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"
},
{
"name" : "FEDORA-2015-7ab3d3afcf",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"
"name": "openSUSE-SU-2016:0894",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html"
},
{
"name": "GLSA-201512-10",
@ -83,19 +63,9 @@
"url": "https://security.gentoo.org/glsa/201512-10"
},
{
"name" : "openSUSE-SU-2016:0894",
"name": "openSUSE-SU-2015:2353",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html"
},
{
"name" : "openSUSE-SU-2016:0307",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
},
{
"name" : "openSUSE-SU-2016:0308",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"
},
{
"name": "openSUSE-SU-2016:0876",
@ -103,9 +73,24 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html"
},
{
"name" : "openSUSE-SU-2015:2353",
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1185256",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1185256"
},
{
"name": "https://github.com/w3c/resource-timing/issues/29",
"refsource": "MISC",
"url": "https://github.com/w3c/resource-timing/issues/29"
},
{
"name": "openSUSE-SU-2016:0308",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
},
{
"name": "FEDORA-2015-7ab3d3afcf",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"
},
{
"name": "USN-2833-1",
@ -117,6 +102,21 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/79280"
},
{
"name": "openSUSE-SU-2016:0307",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
},
{
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-136.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-136.html"
},
{
"name": "FEDORA-2015-51b1105902",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"
},
{
"name": "1034426",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-7770",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0105",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MS16-023",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-023"
"name": "1035204",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035204"
},
{
"name": "MS16-024",
@ -73,9 +73,9 @@
"url": "http://www.securitytracker.com/id/1035203"
},
{
"name" : "1035204",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035204"
"name": "MS16-023",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-023"
}
]
}

View File

@ -65,16 +65,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/111895",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/111895"
},
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22006439",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22006439"
},
{
"name": "100599",
"refsource": "BID",
@ -84,6 +74,16 @@
"name": "1039231",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039231"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006439",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22006439"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/111895",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/111895"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0523",
"STATE": "PUBLIC"
},

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugs.debian.org/862098",
"refsource" : "MISC",
"url" : "https://bugs.debian.org/862098"
},
{
"name": "https://git.lxde.org/gitweb/?p=lxde/lxterminal.git;a=commit;h=f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648",
"refsource": "MISC",
@ -66,6 +61,11 @@
"name": "https://unix.stackexchange.com/questions/333539/lxterminal-in-the-netstat-output/333578",
"refsource": "MISC",
"url": "https://unix.stackexchange.com/questions/333539/lxterminal-in-the-netstat-output/333578"
},
{
"name": "https://bugs.debian.org/862098",
"refsource": "MISC",
"url": "https://bugs.debian.org/862098"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2016-1698",
"STATE": "PUBLIC"
},
@ -57,25 +57,35 @@
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html"
},
{
"name": "RHSA-2016:1201",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1201"
},
{
"name": "1036026",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036026"
},
{
"name": "openSUSE-SU-2016:1496",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
},
{
"name": "https://codereview.chromium.org/1912783002",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1912783002"
},
{
"name" : "https://crbug.com/603725",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/603725"
},
{
"name": "DSA-3594",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3594"
},
{
"name" : "RHSA-2016:1201",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1201"
"name": "https://crbug.com/603725",
"refsource": "CONFIRM",
"url": "https://crbug.com/603725"
},
{
"name": "SUSE-SU-2016:1490",
@ -86,16 +96,6 @@
"name": "openSUSE-SU-2016:1489",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html"
},
{
"name" : "openSUSE-SU-2016:1496",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
},
{
"name" : "1036026",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036026"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4103",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{
"name": "1035828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4125",
"STATE": "PUBLIC"
},
@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
"name": "1036117",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036117"
},
{
"name": "MS16-083",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
},
{
"name": "openSUSE-SU-2016:1625",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
},
{
"name": "RHSA-2016:1238",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1238"
},
{
"name" : "SUSE-SU-2016:1613",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{
"name": "openSUSE-SU-2016:1621",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
},
{
"name" : "openSUSE-SU-2016:1625",
"name": "SUSE-SU-2016:1613",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{
"name" : "1036117",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036117"
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4128",
"STATE": "PUBLIC"
},
@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
"name": "1036117",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036117"
},
{
"name": "MS16-083",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
},
{
"name": "openSUSE-SU-2016:1625",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
},
{
"name": "RHSA-2016:1238",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1238"
},
{
"name" : "SUSE-SU-2016:1613",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{
"name": "openSUSE-SU-2016:1621",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
},
{
"name" : "openSUSE-SU-2016:1625",
"name": "SUSE-SU-2016:1613",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{
"name" : "1036117",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036117"
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4143",
"STATE": "PUBLIC"
},
@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
"name": "1036117",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036117"
},
{
"name": "MS16-083",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
},
{
"name": "openSUSE-SU-2016:1625",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
},
{
"name": "RHSA-2016:1238",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1238"
},
{
"name" : "SUSE-SU-2016:1613",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{
"name": "openSUSE-SU-2016:1621",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
},
{
"name" : "openSUSE-SU-2016:1625",
"name": "SUSE-SU-2016:1613",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
},
{
"name" : "1036117",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036117"
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
}
]
}