mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
acdf06d6a8
commit
f016a7f1ad
@ -58,24 +58,24 @@
|
|||||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051859.html"
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051859.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.mbse.eu/mbse/mbsebbs/index.html",
|
"name": "mbsebbs-mbuseradd-bo(31639)",
|
||||||
"refsource" : "MISC",
|
"refsource": "XF",
|
||||||
"url" : "http://www.mbse.eu/mbse/mbsebbs/index.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31639"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "3154",
|
"name": "3154",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/3154"
|
"url": "https://www.exploit-db.com/exploits/3154"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.mbse.eu/mbse/mbsebbs/index.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.mbse.eu/mbse/mbsebbs/index.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "22112",
|
"name": "22112",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/22112"
|
"url": "http://www.securityfocus.com/bid/22112"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "mbsebbs-mbuseradd-bo(31639)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31639"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,34 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "5032",
|
"name": "totalvideoplayer-m3u-bo(32479)",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "XF",
|
||||||
"url" : "https://www.exploit-db.com/exploits/5032"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32479"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "5077",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/5077"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "22553",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/22553"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "33187",
|
"name": "33187",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/33187"
|
"url": "http://osvdb.org/33187"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "22553",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/22553"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "5032",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/5032"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "23999",
|
"name": "23999",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/23999"
|
"url": "http://secunia.com/advisories/23999"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "totalvideoplayer-m3u-bo(32479)",
|
"name": "5077",
|
||||||
"refsource" : "XF",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32479"
|
"url": "https://www.exploit-db.com/exploits/5077"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,40 +57,40 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/460078/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/460078/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "22559",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/22559"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-0633",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/0633"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "33203",
|
"name": "33203",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/33203"
|
"url": "http://osvdb.org/33203"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "33204",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/33204"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "24157",
|
"name": "24157",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/24157"
|
"url": "http://secunia.com/advisories/24157"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "2261",
|
"name": "22559",
|
||||||
"refsource" : "SREASON",
|
"refsource": "BID",
|
||||||
"url" : "http://securityreason.com/securityalert/2261"
|
"url": "http://www.securityfocus.com/bid/22559"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33204",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/33204"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "webtester-directions-sql-injection(32490)",
|
"name": "webtester-directions-sql-injection(32490)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32490"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32490"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-0633",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/0633"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "2261",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/2261"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2007-1212",
|
"ID": "CVE-2007-1212",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "HPSBST02206",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/466186/100/200/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT071354",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/466186/100/200/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MS07-017",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "23278",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/23278"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-1215",
|
"name": "ADV-2007-1215",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/1215"
|
"url": "http://www.vupen.com/english/advisories/2007/1215"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1017844",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1017844"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBST02206",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/466186/100/200/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:1923",
|
"name": "oval:org.mitre.oval:def:1923",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1923"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1923"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1017844",
|
"name": "23278",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securitytracker.com/id?1017844"
|
"url": "http://www.securityfocus.com/bid/23278"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS07-017",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT071354",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/466186/100/200/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20070310 Remote File Include In Script SoftNews Media Group",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/462445/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "22913",
|
"name": "22913",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/22913"
|
"url": "http://www.securityfocus.com/bid/22913"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20070310 Remote File Include In Script SoftNews Media Group",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/462445/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "35712",
|
"name": "35712",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[ISN] 20070326 Windows weakness can lead to network traffic hijacks",
|
"name": "934864",
|
||||||
"refsource" : "MLIST",
|
"refsource": "MSKB",
|
||||||
"url" : "http://archives.neohapsis.com/archives/isn/2007-q1/0418.html"
|
"url": "http://support.microsoft.com/kb/934864"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://isc.sans.org/diary.html?storyid=2517",
|
"name": "http://isc.sans.org/diary.html?storyid=2517",
|
||||||
@ -63,14 +63,9 @@
|
|||||||
"url": "http://isc.sans.org/diary.html?storyid=2517"
|
"url": "http://isc.sans.org/diary.html?storyid=2517"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://news.com.com/Windows+weakness+can+lead+to+network+traffic+hijacks/2100-1002_3-6170229.html",
|
"name": "[ISN] 20070326 Windows weakness can lead to network traffic hijacks",
|
||||||
"refsource" : "MISC",
|
"refsource": "MLIST",
|
||||||
"url" : "http://news.com.com/Windows+weakness+can+lead+to+network+traffic+hijacks/2100-1002_3-6170229.html"
|
"url": "http://archives.neohapsis.com/archives/isn/2007-q1/0418.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "934864",
|
|
||||||
"refsource" : "MSKB",
|
|
||||||
"url" : "http://support.microsoft.com/kb/934864"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-1115",
|
"name": "ADV-2007-1115",
|
||||||
@ -81,6 +76,11 @@
|
|||||||
"name": "win-wpad-information-disclosure(33244)",
|
"name": "win-wpad-information-disclosure(33244)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33244"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33244"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://news.com.com/Windows+weakness+can+lead+to+network+traffic+hijacks/2100-1002_3-6170229.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://news.com.com/Windows+weakness+can+lead+to+network+traffic+hijacks/2100-1002_3-6170229.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,11 +57,21 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/464287/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/464287/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://research.eeye.com/html/alerts/zeroday/20070328.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://research.eeye.com/html/alerts/zeroday/20070328.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070331 Windows .ANI Stack Overflow Exploit",
|
"name": "20070331 Windows .ANI Stack Overflow Exploit",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/464345/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/464345/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-1151",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/1151"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://vil.nai.com/vil/content/v_141860.htm",
|
"name": "http://vil.nai.com/vil/content/v_141860.htm",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -72,6 +82,21 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.avertlabs.com/research/blog/?p=230"
|
"url": "http://www.avertlabs.com/research/blog/?p=230"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "23194",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/23194"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.microsoft.com/technet/security/advisory/935423.mspx",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.microsoft.com/technet/security/advisory/935423.mspx"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1017827",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1017827"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.avertlabs.com/research/blog/?p=233",
|
"name": "http://www.avertlabs.com/research/blog/?p=233",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -81,31 +106,6 @@
|
|||||||
"name": "http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/",
|
"name": "http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/"
|
"url": "http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://research.eeye.com/html/alerts/zeroday/20070328.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://research.eeye.com/html/alerts/zeroday/20070328.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.microsoft.com/technet/security/advisory/935423.mspx",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.microsoft.com/technet/security/advisory/935423.mspx"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "23194",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/23194"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-1151",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/1151"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1017827",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1017827"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,31 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "24773",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24773"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34625",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/34625"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34624",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/34624"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "3659",
|
"name": "3659",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/3659"
|
"url": "https://www.exploit-db.com/exploits/3659"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "34623",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/34623"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "23303",
|
"name": "23303",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -67,26 +87,6 @@
|
|||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/1262"
|
"url": "http://www.vupen.com/english/advisories/2007/1262"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "34623",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/34623"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34624",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/34624"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34625",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/34625"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24773",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24773"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "aroundme-multiple-file-include(33427)",
|
"name": "aroundme-multiple-file-include(33427)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.netinvoicing.com/downloads/ChangeLog"
|
"url": "http://www.netinvoicing.com/downloads/ChangeLog"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "25661",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/25661"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "26730",
|
"name": "26730",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/26730"
|
"url": "http://secunia.com/advisories/26730"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25661",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/25661"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/4426"
|
"url": "https://www.exploit-db.com/exploits/4426"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.sybsecurity.com/advisors/SYBSEC-ADV01-Airsensor_M520_HTTPD_Remote_Preauth_Denial_Of_Service_and_Buffer_Overflow_PoC",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.sybsecurity.com/advisors/SYBSEC-ADV01-Airsensor_M520_HTTPD_Remote_Preauth_Denial_Of_Service_and_Buffer_Overflow_PoC"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "25715",
|
"name": "25715",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -73,14 +68,19 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2007/3226"
|
"url": "http://www.vupen.com/english/advisories/2007/3226"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "26869",
|
"name": "http://www.sybsecurity.com/advisors/SYBSEC-ADV01-Airsensor_M520_HTTPD_Remote_Preauth_Denial_Of_Service_and_Buffer_Overflow_PoC",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url" : "http://secunia.com/advisories/26869"
|
"url": "http://www.sybsecurity.com/advisors/SYBSEC-ADV01-Airsensor_M520_HTTPD_Remote_Preauth_Denial_Of_Service_and_Buffer_Overflow_PoC"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "airdefense-https-dos(36691)",
|
"name": "airdefense-https-dos(36691)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36691"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36691"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "26869",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/26869"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "reloadcms-index-file-include(37343)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37343"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20071020 ReloadCMS Vulnerable",
|
"name": "20071020 ReloadCMS Vulnerable",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/482573/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/482573/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "26143",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/26143"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "3285",
|
"name": "3285",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/3285"
|
"url": "http://securityreason.com/securityalert/3285"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "reloadcms-index-file-include(37343)",
|
"name": "26143",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37343"
|
"url": "http://www.securityfocus.com/bid/26143"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2015-2619",
|
"ID": "CVE-2015-2619",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,25 +58,35 @@
|
|||||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201603-11",
|
"name": "75881",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "BID",
|
||||||
"url" : "https://security.gentoo.org/glsa/201603-11"
|
"url": "http://www.securityfocus.com/bid/75881"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2015:1241",
|
"name": "1032910",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1241.html"
|
"url": "http://www.securitytracker.com/id/1032910"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:1242",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1242.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2015:1485",
|
"name": "RHSA-2015:1485",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1485.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1485.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:1289",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201603-11",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201603-11"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:1242",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2015:1488",
|
"name": "RHSA-2015:1488",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
@ -98,19 +108,9 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2015:1289",
|
"name": "RHSA-2015:1241",
|
||||||
"refsource" : "SUSE",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "75881",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/75881"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1032910",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1032910"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2015-2640",
|
"ID": "CVE-2015-2640",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2015-3439",
|
"ID": "CVE-2015-3439",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,19 +58,9 @@
|
|||||||
"url": "http://zoczus.blogspot.com/2015/04/plupload-same-origin-method-execution.html"
|
"url": "http://zoczus.blogspot.com/2015/04/plupload-same-origin-method-execution.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://wpvulndb.com/vulnerabilities/7933",
|
"name": "FEDORA-2015-6778",
|
||||||
"refsource" : "MISC",
|
"refsource": "FEDORA",
|
||||||
"url" : "https://wpvulndb.com/vulnerabilities/7933"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157391.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://codex.wordpress.org/Version_4.1.2",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://codex.wordpress.org/Version_4.1.2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://core.trac.wordpress.org/changeset/32168",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://core.trac.wordpress.org/changeset/32168"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://wordpress.org/news/2015/04/wordpress-4-1-2/",
|
"name": "https://wordpress.org/news/2015/04/wordpress-4-1-2/",
|
||||||
@ -78,34 +68,44 @@
|
|||||||
"url": "https://wordpress.org/news/2015/04/wordpress-4-1-2/"
|
"url": "https://wordpress.org/news/2015/04/wordpress-4-1-2/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-3250",
|
"name": "https://wpvulndb.com/vulnerabilities/7933",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3250"
|
"url": "https://wpvulndb.com/vulnerabilities/7933"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-6778",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157391.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-6790",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158278.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-6808",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158271.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "74269",
|
"name": "74269",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/74269"
|
"url": "http://www.securityfocus.com/bid/74269"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-6790",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158278.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1032207",
|
"name": "1032207",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1032207"
|
"url": "http://www.securitytracker.com/id/1032207"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://core.trac.wordpress.org/changeset/32168",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://core.trac.wordpress.org/changeset/32168"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3250",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3250"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://codex.wordpress.org/Version_4.1.2",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://codex.wordpress.org/Version_4.1.2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-6808",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158271.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2015-6102",
|
"ID": "CVE-2015-6102",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "38794",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/38794/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "MS15-115",
|
"name": "MS15-115",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "38794",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/38794/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1034114",
|
"name": "1034114",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034114"
|
"url": "http://www.securitytracker.com/id/1034114"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-6295",
|
"ID": "CVE-2015-6295",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2015-6757",
|
"ID": "CVE-2015-6757",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://code.google.com/p/chromium/issues/detail?id=529520",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=529520",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -67,6 +62,16 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://codereview.chromium.org/1327723005"
|
"url": "https://codereview.chromium.org/1327723005"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "77071",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/77071"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3376",
|
"name": "DSA-3376",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
@ -78,29 +83,24 @@
|
|||||||
"url": "https://security.gentoo.org/glsa/201603-09"
|
"url": "https://security.gentoo.org/glsa/201603-09"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2015:1912",
|
"name": "1033816",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1912.html"
|
"url": "http://www.securitytracker.com/id/1033816"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2770-1",
|
"name": "USN-2770-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2770-1"
|
"url": "http://www.ubuntu.com/usn/USN-2770-1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:1912",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1912.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2770-2",
|
"name": "USN-2770-2",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2770-2"
|
"url": "http://www.ubuntu.com/usn/USN-2770-2"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "77071",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/77071"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1033816",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1033816"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2015-6788",
|
"ID": "CVE-2015-6788",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,20 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
|
"url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:2618",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://code.google.com/p/chromium/issues/detail?id=548273",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=548273",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://code.google.com/p/chromium/issues/detail?id=548273"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=548273"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://codereview.chromium.org/1422383003/",
|
"name": "openSUSE-SU-2015:2290",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "https://codereview.chromium.org/1422383003/"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3418",
|
"name": "DSA-3418",
|
||||||
@ -78,14 +83,9 @@
|
|||||||
"url": "https://security.gentoo.org/glsa/201603-09"
|
"url": "https://security.gentoo.org/glsa/201603-09"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2015:2618",
|
"name": "78734",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "BID",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
|
"url": "http://www.securityfocus.com/bid/78734"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:2290",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:2291",
|
"name": "openSUSE-SU-2015:2291",
|
||||||
@ -93,9 +93,9 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "78734",
|
"name": "https://codereview.chromium.org/1422383003/",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/78734"
|
"url": "https://codereview.chromium.org/1422383003/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-7160",
|
"ID": "CVE-2015-7160",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@mozilla.org",
|
||||||
"ID": "CVE-2015-7213",
|
"ID": "CVE-2015-7213",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,69 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-146.html",
|
"name": "SUSE-SU-2015:2334",
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-146.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1206211",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1206211"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3422",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3422"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3432",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3432"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-51b1105902",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-7ab3d3afcf",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201512-10",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201512-10"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:2657",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2657.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:0307",
|
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:0308",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:2353",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:2380",
|
"name": "openSUSE-SU-2015:2380",
|
||||||
@ -123,44 +63,104 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2015:2406",
|
"name": "DSA-3432",
|
||||||
"refsource" : "SUSE",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html"
|
"url": "http://www.debian.org/security/2016/dsa-3432"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:2334",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:2335",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:2336",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2859-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2859-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2833-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2833-1"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "79279",
|
"name": "79279",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/79279"
|
"url": "http://www.securityfocus.com/bid/79279"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:2335",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201512-10",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201512-10"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206211",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206211"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:2353",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:2406",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:0308",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-7ab3d3afcf",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2859-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2859-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-146.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-146.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2833-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2833-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:2657",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:2336",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:0307",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-51b1105902",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1034426",
|
"name": "1034426",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034426"
|
"url": "http://www.securitytracker.com/id/1034426"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3422",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3422"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@suse.com",
|
||||||
"ID": "CVE-2015-7236",
|
"ID": "CVE-2015-7236",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,61 +52,46 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[linux-nfs] 20150810 [PATCH] Fix memory corruption in PMAP_CALLIT code",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.spinics.net/lists/linux-nfs/msg53045.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20150917 CVE Request: remote triggerable use-after-free in rpcbind",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2015/09/17/1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20150917 Re: CVE Request: remote triggerable use-after-free in rpcbind",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2015/09/17/6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-3366",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3366"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-36b145bd37",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171030.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-9eee2fbc78",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172152.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FreeBSD-SA-15:24",
|
|
||||||
"refsource" : "FREEBSD",
|
|
||||||
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-15:24.rpcbind.asc"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201611-17",
|
"name": "GLSA-201611-17",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201611-17"
|
"url": "https://security.gentoo.org/glsa/201611-17"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[linux-nfs] 20150810 [PATCH] Fix memory corruption in PMAP_CALLIT code",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.spinics.net/lists/linux-nfs/msg53045.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-9eee2fbc78",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172152.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20150917 Re: CVE Request: remote triggerable use-after-free in rpcbind",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2015/09/17/6"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2756-1",
|
"name": "USN-2756-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2756-1"
|
"url": "http://www.ubuntu.com/usn/USN-2756-1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20150917 CVE Request: remote triggerable use-after-free in rpcbind",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2015/09/17/1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "76771",
|
"name": "76771",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -116,6 +101,21 @@
|
|||||||
"name": "1033673",
|
"name": "1033673",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1033673"
|
"url": "http://www.securitytracker.com/id/1033673"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FreeBSD-SA-15:24",
|
||||||
|
"refsource": "FREEBSD",
|
||||||
|
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-15:24.rpcbind.asc"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-36b145bd37",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171030.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3366",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3366"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2015-7780",
|
"ID": "CVE-2015-7780",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2016-0834",
|
"ID": "CVE-2016-0834",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://source.android.com/security/bulletin/2016-04-02.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://source.android.com/security/bulletin/2016-04-02.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
|
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
|
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://source.android.com/security/bulletin/2016-04-02.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://source.android.com/security/bulletin/2016-04-02.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2016-0934",
|
"ID": "CVE-2016-0934",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://zerodayinitiative.com/advisories/ZDI-16-016"
|
"url": "http://zerodayinitiative.com/advisories/ZDI-16-016"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1034646",
|
"name": "1034646",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034646"
|
"url": "http://www.securitytracker.com/id/1034646"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2016-1141",
|
"ID": "CVE-2016-1141",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.au.kddi.com/mobile/service/smartphone/wifi/homespot/#anc06"
|
"url": "http://www.au.kddi.com/mobile/service/smartphone/wifi/homespot/#anc06"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "JVN#54686544",
|
|
||||||
"refsource" : "JVN",
|
|
||||||
"url" : "http://jvn.jp/en/jp/JVN54686544/index.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "JVNDB-2016-000012",
|
"name": "JVNDB-2016-000012",
|
||||||
"refsource": "JVNDB",
|
"refsource": "JVNDB",
|
||||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000012"
|
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000012"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "JVN#54686544",
|
||||||
|
"refsource": "JVN",
|
||||||
|
"url": "http://jvn.jp/en/jp/JVN54686544/index.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-4757",
|
"ID": "CVE-2016-4757",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2016-4850",
|
"ID": "CVE-2016-4850",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,16 +57,16 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://linecorp.com/ja/security/article/65"
|
"url": "https://linecorp.com/ja/security/article/65"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "JVN#05924524",
|
|
||||||
"refsource" : "JVN",
|
|
||||||
"url" : "http://jvn.jp/en/jp/JVN05924524/index.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "JVNDB-2016-000153",
|
"name": "JVNDB-2016-000153",
|
||||||
"refsource": "JVNDB",
|
"refsource": "JVNDB",
|
||||||
"url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000153.html"
|
"url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000153.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "JVN#05924524",
|
||||||
|
"refsource": "JVN",
|
||||||
|
"url": "http://jvn.jp/en/jp/JVN05924524/index.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "92644",
|
"name": "92644",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-5449",
|
"ID": "CVE-2016-5449",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "91787",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/91787"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "91986",
|
"name": "91986",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -71,6 +61,16 @@
|
|||||||
"name": "1036408",
|
"name": "1036408",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1036408"
|
"url": "http://www.securitytracker.com/id/1036408"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "91787",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/91787"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,10 +1,10 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "secure@dell.com",
|
"ASSIGNER": "security_alert@emc.com",
|
||||||
"DATE_PUBLIC": "2019-02-28T05:00:00.000Z",
|
"DATE_PUBLIC": "2019-02-28T05:00:00.000Z",
|
||||||
"ID": "CVE-2019-3711",
|
"ID": "CVE-2019-3711",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
"TITLE" : "DSA-2019-038: RSA® Authentication Manager Insecure Credential Management Vulnerability"
|
"TITLE": "DSA-2019-038: RSA\u00ae Authentication Manager Insecure Credential Management Vulnerability"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
|
Loading…
x
Reference in New Issue
Block a user