"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:46:23 +00:00
parent 41e047bbdd
commit ef64427d16
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 3984 additions and 3984 deletions

View File

@ -52,35 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "2529",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/2529"
},
{
"name": "20503",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20503"
},
{
"name" : "ADV-2006-4047",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4047"
},
{
"name" : "29725",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/29725"
},
{
"name": "29726",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29726"
},
{
"name" : "29727",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/29727"
"name": "2529",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2529"
},
{
"name": "afgbguestbook-htmls-file-include(29511)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29511"
},
{
"name": "29728",
@ -93,9 +83,19 @@
"url": "http://secunia.com/advisories/22363"
},
{
"name" : "afgbguestbook-htmls-file-include(29511)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29511"
"name": "29727",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29727"
},
{
"name": "29725",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29725"
},
{
"name": "ADV-2006-4047",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4047"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "1774",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1774"
},
{
"name": "ADV-2006-4062",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4062"
},
{
"name": "20061016 :ShAnKaR: WoltLab Burning Book <=1.1.2 multiple vulnerabilities",
"refsource": "BUGTRAQ",
@ -62,20 +72,10 @@
"refsource": "MISC",
"url": "http://www.security.nnov.ru/Odocument711.html"
},
{
"name" : "ADV-2006-4062",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4062"
},
{
"name": "22442",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22442"
},
{
"name" : "1774",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1774"
}
]
}

View File

@ -53,39 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20061102 Multiple vulnerabilities in SAP Web Application Server 6.40 and7.00",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/450394/100/0/threaded"
},
{
"name" : "20070208 Multiple vulnerabilities in SAP WebAS 6.40 and 7.00 (technicaldetails)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/459499/100/0/threaded"
},
{
"name" : "3291",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3291"
},
{
"name" : "20877",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20877"
},
{
"name" : "ADV-2006-4318",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4318"
},
{
"name" : "1017628",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017628"
},
{
"name" : "22677",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22677"
"name": "sap-pipe-privilege-escalation(29982)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29982"
},
{
"name": "1828",
@ -93,9 +63,39 @@
"url": "http://securityreason.com/securityalert/1828"
},
{
"name" : "sap-pipe-privilege-escalation(29982)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29982"
"name": "ADV-2006-4318",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4318"
},
{
"name": "20877",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20877"
},
{
"name": "20070208 Multiple vulnerabilities in SAP WebAS 6.40 and 7.00 (technicaldetails)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459499/100/0/threaded"
},
{
"name": "20061102 Multiple vulnerabilities in SAP Web Application Server 6.40 and7.00",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/450394/100/0/threaded"
},
{
"name": "3291",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3291"
},
{
"name": "22677",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22677"
},
{
"name": "1017628",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017628"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://code.campware.org/projects/campsite/changeset/6118",
"refsource" : "CONFIRM",
"url" : "http://code.campware.org/projects/campsite/changeset/6118"
"name": "ADV-2006-4776",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4776"
},
{
"name": "20519",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20519"
},
{
"name": "http://code.campware.org/projects/campsite/changeset/6119",
@ -68,14 +73,9 @@
"url": "http://code.campware.org/projects/campsite/ticket/2363"
},
{
"name" : "20519",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/20519"
},
{
"name" : "ADV-2006-4776",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4776"
"name": "http://code.campware.org/projects/campsite/changeset/6118",
"refsource": "CONFIRM",
"url": "http://code.campware.org/projects/campsite/changeset/6118"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.matasano.com/log/806/hot-off-the-matasano-sms-queue-cansec-macbook-challenge-won/",
"refsource" : "MISC",
"url" : "http://www.matasano.com/log/806/hot-off-the-matasano-sms-queue-cansec-macbook-challenge-won/"
},
{
"name": "38857",
"refsource": "OSVDB",
"url": "http://osvdb.org/38857"
},
{
"name": "http://www.matasano.com/log/806/hot-off-the-matasano-sms-queue-cansec-macbook-challenge-won/",
"refsource": "MISC",
"url": "http://www.matasano.com/log/806/hot-off-the-matasano-sms-queue-cansec-macbook-challenge-won/"
}
]
}

View File

@ -52,40 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20070713 TPTI-07-12: Multiple Vendor Progress Server Heap Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/473623/100/0/threaded"
},
{
"name" : "http://dvlabs.tippingpoint.com/advisory/TPTI-07-12",
"refsource" : "MISC",
"url" : "http://dvlabs.tippingpoint.com/advisory/TPTI-07-12"
},
{
"name" : "24675",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24675"
},
{
"name" : "37934",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37934"
},
{
"name": "ADV-2007-2530",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2530"
},
{
"name": "20070713 TPTI-07-12: Multiple Vendor Progress Server Heap Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/473623/100/0/threaded"
},
{
"name": "ADV-2007-2531",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2531"
},
{
"name" : "1018389",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018389"
"name": "26067",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26067"
},
{
"name": "26058",
@ -93,14 +78,29 @@
"url": "http://secunia.com/advisories/26058"
},
{
"name" : "26067",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26067"
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-07-12",
"refsource": "MISC",
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-07-12"
},
{
"name": "multiple-progress-server-bo(35385)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35385"
},
{
"name": "1018389",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018389"
},
{
"name": "37934",
"refsource": "OSVDB",
"url": "http://osvdb.org/37934"
},
{
"name": "24675",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24675"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "https://www.exploit-db.com/exploits/3843"
},
{
"name" : "http://www.censura.info/forums/showthread.php?t=556",
"refsource" : "CONFIRM",
"url" : "http://www.censura.info/forums/showthread.php?t=556"
"name": "25141",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25141"
},
{
"name": "23796",
@ -72,15 +72,15 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/35598"
},
{
"name" : "25141",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25141"
},
{
"name": "censura-vendorid-sql-injection(34040)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34040"
},
{
"name": "http://www.censura.info/forums/showthread.php?t=556",
"refsource": "CONFIRM",
"url": "http://www.censura.info/forums/showthread.php?t=556"
}
]
}

View File

@ -53,14 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20070515 GS07-01 Full-Width and Half-Width Unicode Encoding IDS/IPS/WAF Bypass Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/468633/100/0/threaded"
"name": "VU#739224",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/739224"
},
{
"name" : "http://www.gamasec.net/english/gs07-01.html",
"refsource" : "MISC",
"url" : "http://www.gamasec.net/english/gs07-01.html"
"name": "2712",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2712"
},
{
"name": "http://www.3com.com/securityalert/alerts/3COM-07-001.html",
@ -68,14 +68,14 @@
"url": "http://www.3com.com/securityalert/alerts/3COM-07-001.html"
},
{
"name" : "VU#739224",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/739224"
"name": "25302",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25302"
},
{
"name" : "ADV-2007-1817",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1817"
"name": "http://www.gamasec.net/english/gs07-01.html",
"refsource": "MISC",
"url": "http://www.gamasec.net/english/gs07-01.html"
},
{
"name": "35968",
@ -83,14 +83,14 @@
"url": "http://osvdb.org/35968"
},
{
"name" : "25302",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25302"
"name": "ADV-2007-1817",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1817"
},
{
"name" : "2712",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2712"
"name": "20070515 GS07-01 Full-Width and Half-Width Unicode Encoding IDS/IPS/WAF Bypass Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/468633/100/0/threaded"
}
]
}

View File

@ -62,16 +62,16 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1841"
},
{
"name" : "36175",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36175"
},
{
"name": "25299",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25299"
},
{
"name": "36175",
"refsource": "OSVDB",
"url": "http://osvdb.org/36175"
},
{
"name": "aajax-unspecified(34497)",
"refsource": "XF",

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "20070608 SafeNET High Assurance Remote/SoftRemote (IPSecDrv.sys) remote DoS",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063859.html"
},
{
"name": "http://www.digit-labs.org/files/exploits/safenet-dos.c",
"refsource": "MISC",
"url": "http://www.digit-labs.org/files/exploits/safenet-dos.c"
},
{
"name" : "24385",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24385"
},
{
"name": "37137",
"refsource": "OSVDB",
"url": "http://osvdb.org/37137"
},
{
"name": "20070608 SafeNET High Assurance Remote/SoftRemote (IPSecDrv.sys) remote DoS",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063859.html"
},
{
"name": "25574",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25574"
},
{
"name": "safenet-ipsecdrv-dos(34775)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34775"
},
{
"name": "2803",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2803"
},
{
"name" : "safenet-ipsecdrv-dos(34775)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34775"
"name": "24385",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24385"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "http://infosecsellout.blogspot.com/2007/07/oh-look-apple-worm.html"
},
{
"name" : "24924",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24924"
},
{
"name": "1018399",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018399"
},
{
"name": "24924",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24924"
}
]
}

View File

@ -57,16 +57,36 @@
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103159-1"
},
{
"name" : "201333",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201333-1"
},
{
"name": "26712",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26712"
},
{
"name": "1019048",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019048"
},
{
"name": "sparc-enterprise-xcp-firmware-dos(38860)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38860"
},
{
"name": "40843",
"refsource": "OSVDB",
"url": "http://osvdb.org/40843"
},
{
"name": "27926",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27926"
},
{
"name": "40844",
"refsource": "OSVDB",
"url": "http://osvdb.org/40844"
},
{
"name": "ADV-2007-4098",
"refsource": "VUPEN",
@ -78,29 +98,9 @@
"url": "http://osvdb.org/40842"
},
{
"name" : "40843",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/40843"
},
{
"name" : "40844",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/40844"
},
{
"name" : "1019048",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019048"
},
{
"name" : "27926",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27926"
},
{
"name" : "sparc-enterprise-xcp-firmware-dos(38860)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38860"
"name": "201333",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201333-1"
}
]
}

View File

@ -58,34 +58,34 @@
"url": "http://tikiwiki.org/ReleaseProcess199"
},
{
"name" : "GLSA-200801-10",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200801-10.xml"
},
{
"name" : "41175",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/41175"
},
{
"name" : "41176",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/41176"
"name": "28225",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28225"
},
{
"name": "41177",
"refsource": "OSVDB",
"url": "http://osvdb.org/41177"
},
{
"name" : "28225",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28225"
},
{
"name": "28602",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28602"
},
{
"name": "GLSA-200801-10",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200801-10.xml"
},
{
"name": "41176",
"refsource": "OSVDB",
"url": "http://osvdb.org/41176"
},
{
"name": "41175",
"refsource": "OSVDB",
"url": "http://osvdb.org/41175"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-0017",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MS10-006",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-006"
"name": "oval:org.mitre.oval:def:8298",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8298"
},
{
"name": "TA10-040A",
@ -63,9 +63,9 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA10-040A.html"
},
{
"name" : "oval:org.mitre.oval:def:8298",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8298"
"name": "MS10-006",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-006"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2010-0193",
"STATE": "PUBLIC"
},
@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-09.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-09.html"
"name": "adobe-acrobat-unspec-code-exec(57701)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57701"
},
{
"name": "ADV-2010-0873",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0873"
},
{
"name": "TA10-103C",
@ -67,20 +72,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39329"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-09.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-09.html"
},
{
"name": "oval:org.mitre.oval:def:7352",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7352"
},
{
"name" : "ADV-2010-0873",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/0873"
},
{
"name" : "adobe-acrobat-unspec-code-exec(57701)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57701"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-0249",
"STATE": "PUBLIC"
},
@ -52,50 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "11167",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/11167"
},
{
"name" : "http://news.cnet.com/8301-27080_3-10435232-245.html",
"refsource" : "MISC",
"url" : "http://news.cnet.com/8301-27080_3-10435232-245.html"
},
{
"name" : "http://blogs.technet.com/msrc/archive/2010/01/14/security-advisory-979352.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.technet.com/msrc/archive/2010/01/14/security-advisory-979352.aspx"
},
{
"name": "http://www.microsoft.com/technet/security/advisory/979352.mspx",
"refsource": "CONFIRM",
"url": "http://www.microsoft.com/technet/security/advisory/979352.mspx"
},
{
"name" : "MS10-002",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002"
},
{
"name" : "979352",
"refsource" : "MSKB",
"url" : "http://support.microsoft.com/kb/979352"
},
{
"name" : "TA10-055A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-055A.html"
},
{
"name" : "VU#492515",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/492515"
},
{
"name" : "37815",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37815"
"name": "oval:org.mitre.oval:def:6835",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6835"
},
{
"name": "61697",
@ -103,9 +68,49 @@
"url": "http://osvdb.org/61697"
},
{
"name" : "oval:org.mitre.oval:def:6835",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6835"
"name": "37815",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37815"
},
{
"name": "VU#492515",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/492515"
},
{
"name": "11167",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11167"
},
{
"name": "979352",
"refsource": "MSKB",
"url": "http://support.microsoft.com/kb/979352"
},
{
"name": "http://blogs.technet.com/msrc/archive/2010/01/14/security-advisory-979352.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/msrc/archive/2010/01/14/security-advisory-979352.aspx"
},
{
"name": "ie-freed-object-code-execution(55642)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55642"
},
{
"name": "TA10-055A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-055A.html"
},
{
"name": "MS10-002",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002"
},
{
"name": "http://news.cnet.com/8301-27080_3-10435232-245.html",
"refsource": "MISC",
"url": "http://news.cnet.com/8301-27080_3-10435232-245.html"
},
{
"name": "1023462",
@ -116,11 +121,6 @@
"name": "ADV-2010-0135",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0135"
},
{
"name" : "ie-freed-object-code-execution(55642)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55642"
}
]
}

View File

@ -52,16 +52,26 @@
},
"references": {
"reference_data": [
{
"name" : "20100216 Pogodny CMS SQL vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/509554/100/0/threaded"
},
{
"name": "http://ariko-security.com/feb2010/ad439.html",
"refsource": "MISC",
"url": "http://ariko-security.com/feb2010/ad439.html"
},
{
"name": "62343",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/62343"
},
{
"name": "38571",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38571"
},
{
"name": "38253",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38253"
},
{
"name": "http://packetstormsecurity.org/1002-exploits/pogodnycms-sql.txt",
"refsource": "MISC",
@ -73,19 +83,9 @@
"url": "http://www.exploit-db.com/exploits/11473"
},
{
"name" : "38253",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/38253"
},
{
"name" : "62343",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/62343"
},
{
"name" : "38571",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38571"
"name": "20100216 Pogodny CMS SQL vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/509554/100/0/threaded"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "11998",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/11998"
},
{
"name": "39174",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39174"
},
{
"name": "11998",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11998"
},
{
"name": "userstatus-controller-file-include(57483)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2010-1550",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "SSRT010098",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=127360750704351&w=2"
},
{
"name": "HPSBMA02527",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=127360750704351&w=2"
},
{
"name": "20100511 ZDI-10-081: HP OpenView NNM ovet_demandpoll sel CGI Variable Format String Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
@ -62,16 +72,6 @@
"refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-10-081/"
},
{
"name" : "HPSBMA02527",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=127360750704351&w=2"
},
{
"name" : "SSRT010098",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=127360750704351&w=2"
},
{
"name": "SSRT090225",
"refsource": "HP",

View File

@ -52,15 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "38622",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38622"
},
{
"name": "https://forum.immunityinc.com/board/thread/1161/vulndisco-9-0/",
"refsource": "MISC",
"url": "https://forum.immunityinc.com/board/thread/1161/vulndisco-9-0/"
},
{
"name" : "38300",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/38300"
"name": "lotusnotes-unspec-bo(58322)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58322"
},
{
"name": "oval:org.mitre.oval:def:14489",
@ -68,14 +73,9 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14489"
},
{
"name" : "38622",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38622"
},
{
"name" : "lotusnotes-unspec-bo(58322)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58322"
"name": "38300",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38300"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "39576",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39576"
},
{
"name": "gbufacebook-index-sql-injection(57946)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57946"
},
{
"name": "ADV-2010-0944",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0944"
},
{
"name": "http://packetstormsecurity.org/1004-exploits/joomlagbufacebook-sql.txt",
"refsource": "MISC",
@ -62,25 +77,10 @@
"refsource": "MISC",
"url": "http://www.exploit-db.com/exploits/12299"
},
{
"name" : "39576",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/39576"
},
{
"name": "39487",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39487"
},
{
"name" : "ADV-2010-0944",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/0944"
},
{
"name" : "gbufacebook-index-sql-injection(57946)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57946"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1265",
"STATE": "PUBLIC"
},

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20140124 Security Vulnerabilities in Apache Cordova / PhoneGap",
"refsource" : "BUGTRAQ",
"url" : "http://seclists.org/bugtraq/2014/Jan/96"
},
{
"name" : "[oss-security] 20140207 Re: CVE request: multiple issues in Apache Cordova/PhoneGap",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2014/02/07/9"
},
{
"name" : "http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt"
},
{
"name": "http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf",
"refsource": "MISC",
@ -77,10 +62,25 @@
"refsource": "MISC",
"url": "http://www.internetsociety.org/ndss2014/programme#session3"
},
{
"name": "20140124 Security Vulnerabilities in Apache Cordova / PhoneGap",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2014/Jan/96"
},
{
"name": "[oss-security] 20140207 Re: CVE request: multiple issues in Apache Cordova/PhoneGap",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/02/07/9"
},
{
"name": "https://github.com/phonegap/phonegap/blob/2.6.0/changelog",
"refsource": "MISC",
"url": "https://github.com/phonegap/phonegap/blob/2.6.0/changelog"
},
{
"name": "http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt"
}
]
}

View File

@ -57,16 +57,6 @@
"refsource": "MISC",
"url": "http://www.opendocman.com/opendocman-v1-2-7-1-release"
},
{
"name" : "http://www.opendocman.com/opendocman-v1-2-7-2-released",
"refsource" : "MISC",
"url" : "http://www.opendocman.com/opendocman-v1-2-7-2-released"
},
{
"name" : "https://www.htbridge.com/advisory/HTB23202",
"refsource" : "MISC",
"url" : "https://www.htbridge.com/advisory/HTB23202"
},
{
"name": "65775",
"refsource": "BID",
@ -76,6 +66,16 @@
"name": "56189",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56189"
},
{
"name": "http://www.opendocman.com/opendocman-v1-2-7-2-released",
"refsource": "MISC",
"url": "http://www.opendocman.com/opendocman-v1-2-7-2-released"
},
{
"name": "https://www.htbridge.com/advisory/HTB23202",
"refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23202"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-4408",
"STATE": "PUBLIC"
},
@ -52,40 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/kb/HT6535",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT6535"
},
{
"name": "http://support.apple.com/kb/HT6441",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6441"
},
{
"name" : "http://support.apple.com/kb/HT6442",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6442"
},
{
"name" : "APPLE-SA-2014-09-17-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"name" : "APPLE-SA-2014-09-17-2",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"name" : "APPLE-SA-2014-10-16-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{
"name" : "69882",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69882"
"name": "1030866",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030866"
},
{
"name": "69939",
@ -93,9 +68,34 @@
"url": "http://www.securityfocus.com/bid/69939"
},
{
"name" : "1030866",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030866"
"name": "http://support.apple.com/kb/HT6442",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6442"
},
{
"name": "APPLE-SA-2014-10-16-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{
"name": "APPLE-SA-2014-09-17-2",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"name": "69882",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69882"
},
{
"name": "https://support.apple.com/kb/HT6535",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6535"
},
{
"name": "APPLE-SA-2014-09-17-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"name": "appleios-cve20144408-priv-esc(96086)",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-4487",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/HT204244",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/HT204244"
},
{
"name": "http://support.apple.com/HT204245",
"refsource": "CONFIRM",
@ -68,24 +63,29 @@
"url": "http://support.apple.com/HT204246"
},
{
"name" : "APPLE-SA-2015-01-27-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html"
"name": "1031650",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031650"
},
{
"name": "APPLE-SA-2015-01-27-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html"
},
{
"name": "http://support.apple.com/HT204244",
"refsource": "CONFIRM",
"url": "http://support.apple.com/HT204244"
},
{
"name": "APPLE-SA-2015-01-27-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html"
},
{
"name": "APPLE-SA-2015-01-27-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html"
},
{
"name" : "1031650",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031650"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://xenbits.xenproject.org/xsa/advisory-103.html",
"refsource" : "CONFIRM",
"url" : "http://xenbits.xenproject.org/xsa/advisory-103.html"
},
{
"name" : "69189",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69189"
},
{
"name" : "1030725",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030725"
},
{
"name": "59934",
"refsource": "SECUNIA",
@ -76,6 +61,21 @@
"name": "xen-cve20145148-dos(95233)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95233"
},
{
"name": "http://xenbits.xenproject.org/xsa/advisory-103.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xenproject.org/xsa/advisory-103.html"
},
{
"name": "1030725",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030725"
},
{
"name": "69189",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69189"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140815 [OSSA 2014-026] Multiple vulnerabilities in Keystone revocation events (CVE-2014-5251, CVE-2014-5252, CVE-2014-5253)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/08/15/6"
},
{
"name" : "https://bugs.launchpad.net/keystone/+bug/1347961",
"refsource" : "MISC",
"url" : "https://bugs.launchpad.net/keystone/+bug/1347961"
},
{
"name": "RHSA-2014:1121",
"refsource": "REDHAT",
@ -72,10 +62,20 @@
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1122.html"
},
{
"name": "https://bugs.launchpad.net/keystone/+bug/1347961",
"refsource": "MISC",
"url": "https://bugs.launchpad.net/keystone/+bug/1347961"
},
{
"name": "USN-2324-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2324-1"
},
{
"name": "[oss-security] 20140815 [OSSA 2014-026] Multiple vulnerabilities in Keystone revocation events (CVE-2014-5251, CVE-2014-5252, CVE-2014-5253)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/08/15/6"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5537",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "MISC",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
"name": "VU#736145",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/736145"
},
{
"name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name" : "VU#736145",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/736145"
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20161221 Re: CVE request: ikiwiki: authorization bypass when reverting changes",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/12/21/3"
},
{
"name" : "[oss-security] 20161229 ikiwiki: CVE-2016-9645 (incomplete fix for CVE-2016-10026), CVE-2016-9646 (commit metadata forgery)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/12/29/3"
},
{
"name": "http://ikiwiki.info/bugs/rcs_revert_can_bypass_authorization_if_affected_files_were_renamed/",
"refsource": "CONFIRM",
@ -76,6 +66,16 @@
"name": "DSA-3760",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3760"
},
{
"name": "[oss-security] 20161221 Re: CVE request: ikiwiki: authorization bypass when reverting changes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/12/21/3"
},
{
"name": "[oss-security] 20161229 ikiwiki: CVE-2016-9645 (incomplete fix for CVE-2016-10026), CVE-2016-9646 (commit metadata forgery)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/12/29/3"
}
]
}

View File

@ -52,80 +52,80 @@
},
"references": {
"reference_data": [
{
"name" : "20161228 PHPMailer < 5.2.20 Remote Code Execution PoC 0day Exploit (CVE-2016-10045) (Bypass of the CVE-2016-1033 patch)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/539967/100/0/threaded"
},
{
"name" : "40969",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40969/"
},
{
"name" : "42221",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/42221/"
},
{
"name" : "40986",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40986/"
},
{
"name" : "20161227 PHPMailer < 5.2.20 Remote Code Execution PoC 0day Exploit (CVE-2016-10045) (Bypass of the CVE-2016-1033 patch)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Dec/81"
},
{
"name" : "[oss-security] 20161228 Re: PHPMailer < 5.2.18 Remote Code Execution [updated advisory] [CVE-2016-10033]",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2016/12/28/1"
},
{
"name": "http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html"
},
{
"name" : "https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html",
"refsource" : "MISC",
"url" : "https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html"
},
{
"name": "http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html"
},
{
"name" : "http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection",
"refsource" : "MISC",
"url" : "http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection"
"name": "42221",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42221/"
},
{
"name" : "https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html",
"refsource" : "CONFIRM",
"url" : "https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html"
"name": "40969",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40969/"
},
{
"name" : "https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20",
"refsource" : "CONFIRM",
"url" : "https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20"
"name": "20161228 PHPMailer < 5.2.20 Remote Code Execution PoC 0day Exploit (CVE-2016-10045) (Bypass of the CVE-2016-1033 patch)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/539967/100/0/threaded"
},
{
"name": "[oss-security] 20161228 Re: PHPMailer < 5.2.18 Remote Code Execution [updated advisory] [CVE-2016-10033]",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2016/12/28/1"
},
{
"name": "https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities",
"refsource": "CONFIRM",
"url": "https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities"
},
{
"name": "https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20",
"refsource": "CONFIRM",
"url": "https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20"
},
{
"name": "40986",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40986/"
},
{
"name": "http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection",
"refsource": "MISC",
"url": "http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection"
},
{
"name": "95130",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95130"
},
{
"name": "https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html",
"refsource": "MISC",
"url": "https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html"
},
{
"name": "20161227 PHPMailer < 5.2.20 Remote Code Execution PoC 0day Exploit (CVE-2016-10045) (Bypass of the CVE-2016-1033 patch)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Dec/81"
},
{
"name": "1037533",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037533"
},
{
"name": "https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html",
"refsource": "CONFIRM",
"url": "https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@suse.com",
"ID": "CVE-2016-3140",
"STATE": "PUBLIC"
},
@ -52,15 +52,105 @@
},
"references": {
"reference_data": [
{
"name": "USN-2971-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2971-2"
},
{
"name": "SUSE-SU-2016:1690",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"
},
{
"name": "39537",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39537/"
},
{
"name" : "[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (digi_acceleport driver)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/03/14/6"
"name": "SUSE-SU-2016:1696",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html"
},
{
"name": "USN-2970-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2970-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1316995",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316995"
},
{
"name": "USN-2968-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2968-1"
},
{
"name": "USN-2971-3",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2971-3"
},
{
"name": "USN-2997-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2997-1"
},
{
"name": "SUSE-SU-2016:1764",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"
},
{
"name": "USN-3000-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3000-1"
},
{
"name": "DSA-3607",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3607"
},
{
"name": "USN-2971-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2971-1"
},
{
"name": "https://github.com/torvalds/linux/commit/5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f"
},
{
"name": "SUSE-SU-2016:1707",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html"
},
{
"name": "USN-2996-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2996-1"
},
{
"name": "SUSE-SU-2016:1672",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
},
{
"name": "USN-2968-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2968-2"
},
{
"name": "openSUSE-SU-2016:1382",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html"
},
{
"name": "SUSE-SU-2016:2074",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f",
@ -72,105 +162,15 @@
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1316995",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1316995"
},
{
"name" : "https://github.com/torvalds/linux/commit/5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f"
},
{
"name" : "DSA-3607",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3607"
},
{
"name" : "SUSE-SU-2016:1672",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
},
{
"name" : "SUSE-SU-2016:1690",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"
},
{
"name" : "SUSE-SU-2016:1696",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html"
},
{
"name" : "SUSE-SU-2016:1707",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html"
},
{
"name" : "SUSE-SU-2016:1764",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"
},
{
"name" : "SUSE-SU-2016:2074",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
},
{
"name" : "openSUSE-SU-2016:1382",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html"
},
{
"name" : "USN-2996-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2996-1"
},
{
"name" : "USN-2997-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2997-1"
},
{
"name" : "USN-3000-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3000-1"
},
{
"name" : "USN-2968-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2968-1"
},
{
"name" : "USN-2968-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2968-2"
},
{
"name" : "USN-2970-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2970-1"
},
{
"name" : "USN-2971-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2971-1"
},
{
"name" : "USN-2971-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2971-2"
},
{
"name" : "USN-2971-3",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2971-3"
},
{
"name": "84304",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84304"
},
{
"name": "[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (digi_acceleport driver)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/03/14/6"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-3235",
"STATE": "PUBLIC"
},
@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20160615 Microsoft Visio multiple DLL side loading vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/538685/100/0/threaded"
},
{
"name" : "20160615 Microsoft Visio multiple DLL side loading vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Jun/32"
},
{
"name" : "http://packetstormsecurity.com/files/137490/Microsoft-Visio-DLL-Hijacking.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/137490/Microsoft-Visio-DLL-Hijacking.html"
},
{
"name": "https://www.securify.nl/advisory/SFY20150804/microsoft_visio_multiple_dll_side_loading_vulnerabilities.html",
"refsource": "MISC",
@ -77,10 +62,25 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-070"
},
{
"name": "20160615 Microsoft Visio multiple DLL side loading vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/538685/100/0/threaded"
},
{
"name": "1036093",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036093"
},
{
"name": "http://packetstormsecurity.com/files/137490/Microsoft-Visio-DLL-Hijacking.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/137490/Microsoft-Visio-DLL-Hijacking.html"
},
{
"name": "20160615 Microsoft Visio multiple DLL side loading vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Jun/32"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-3578",
"STATE": "PUBLIC"
},
@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988009",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988009"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988718",
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988718"
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "91925",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91925"
},
{
"name": "91787",
@ -73,9 +73,9 @@
"url": "http://www.securityfocus.com/bid/91787"
},
{
"name" : "91925",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91925"
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988718",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988718"
},
{
"name": "1036370",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-3862",
"STATE": "PUBLIC"
},

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "[oss-security] 20160408 CVE-2016-3945 libtiff: Out-of-bounds Write in the tiff2rgba tool",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/08/6"
},
{
"name" : "http://bugzilla.maptools.org/show_bug.cgi?id=2545",
"refsource" : "CONFIRM",
"url" : "http://bugzilla.maptools.org/show_bug.cgi?id=2545"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
"name": "RHSA-2016:1547",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1325093",
@ -77,35 +77,35 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name" : "DSA-3762",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3762"
},
{
"name": "GLSA-201701-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"name" : "RHSA-2016:1546",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1546.html"
},
{
"name" : "RHSA-2016:1547",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1547.html"
},
{
"name": "openSUSE-SU-2016:2275",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html"
},
{
"name": "RHSA-2016:1546",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html"
},
{
"name": "85960",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85960"
},
{
"name": "DSA-3762",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3762"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2545",
"refsource": "CONFIRM",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2545"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8067",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8083",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8248",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,36 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20161020 imagemagick: memory allocation failure in AcquireMagickMemory (memory.c) (incomplete fix for CVE-2016-8862)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/10/20/3"
},
{
"name": "[oss-security] 20161021 Re: imagemagick: memory allocation failure in AcquireMagickMemory (memory.c) (incomplete fix for CVE-2016-8862)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/21/5"
},
{
"name" : "https://blogs.gentoo.org/ago/2016/10/20/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862/",
"refsource" : "MISC",
"url" : "https://blogs.gentoo.org/ago/2016/10/20/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1388816",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388816"
},
{
"name" : "https://github.com/ImageMagick/ImageMagick/issues/271",
"refsource" : "CONFIRM",
"url" : "https://github.com/ImageMagick/ImageMagick/issues/271"
},
{
"name" : "openSUSE-SU-2016:3233",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00085.html"
},
{
"name": "openSUSE-SU-2016:3238",
"refsource": "SUSE",
@ -91,6 +71,26 @@
"name": "openSUSE-SU-2017:0023",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html"
},
{
"name": "[oss-security] 20161020 imagemagick: memory allocation failure in AcquireMagickMemory (memory.c) (incomplete fix for CVE-2016-8862)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/20/3"
},
{
"name": "https://blogs.gentoo.org/ago/2016/10/20/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862/",
"refsource": "MISC",
"url": "https://blogs.gentoo.org/ago/2016/10/20/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862/"
},
{
"name": "https://github.com/ImageMagick/ImageMagick/issues/271",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/issues/271"
},
{
"name": "openSUSE-SU-2016:3233",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00085.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2016-9955",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20180302 [SECURITY] [DLA 1297-1] simplesamlphp security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/03/msg00001.html"
},
{
"name": "https://simplesamlphp.org/security/201612-02",
"refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "94946",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94946"
},
{
"name": "[debian-lts-announce] 20180302 [SECURITY] [DLA 1297-1] simplesamlphp security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00001.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.phpmyadmin.net/security/PMASA-2019-2/",
"refsource" : "CONFIRM",
"url" : "https://www.phpmyadmin.net/security/PMASA-2019-2/"
},
{
"name": "106727",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106727"
},
{
"name": "https://www.phpmyadmin.net/security/PMASA-2019-2/",
"refsource": "CONFIRM",
"url": "https://www.phpmyadmin.net/security/PMASA-2019-2/"
}
]
}