"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:20:31 +00:00
parent acdf06d6a8
commit f016a7f1ad
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3216 additions and 3216 deletions

View File

@ -58,24 +58,24 @@
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051859.html" "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051859.html"
}, },
{ {
"name" : "http://www.mbse.eu/mbse/mbsebbs/index.html", "name": "mbsebbs-mbuseradd-bo(31639)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://www.mbse.eu/mbse/mbsebbs/index.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31639"
}, },
{ {
"name": "3154", "name": "3154",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3154" "url": "https://www.exploit-db.com/exploits/3154"
}, },
{
"name": "http://www.mbse.eu/mbse/mbsebbs/index.html",
"refsource": "MISC",
"url": "http://www.mbse.eu/mbse/mbsebbs/index.html"
},
{ {
"name": "22112", "name": "22112",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22112" "url": "http://www.securityfocus.com/bid/22112"
},
{
"name" : "mbsebbs-mbuseradd-bo(31639)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31639"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "5032", "name": "totalvideoplayer-m3u-bo(32479)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/5032" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32479"
},
{
"name" : "5077",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5077"
},
{
"name" : "22553",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22553"
}, },
{ {
"name": "33187", "name": "33187",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/33187" "url": "http://osvdb.org/33187"
}, },
{
"name": "22553",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22553"
},
{
"name": "5032",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5032"
},
{ {
"name": "23999", "name": "23999",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23999" "url": "http://secunia.com/advisories/23999"
}, },
{ {
"name" : "totalvideoplayer-m3u-bo(32479)", "name": "5077",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32479" "url": "https://www.exploit-db.com/exploits/5077"
} }
] ]
} }

View File

@ -57,40 +57,40 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/460078/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/460078/100/0/threaded"
}, },
{
"name" : "22559",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22559"
},
{
"name" : "ADV-2007-0633",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0633"
},
{ {
"name": "33203", "name": "33203",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/33203" "url": "http://osvdb.org/33203"
}, },
{
"name" : "33204",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33204"
},
{ {
"name": "24157", "name": "24157",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24157" "url": "http://secunia.com/advisories/24157"
}, },
{ {
"name" : "2261", "name": "22559",
"refsource" : "SREASON", "refsource": "BID",
"url" : "http://securityreason.com/securityalert/2261" "url": "http://www.securityfocus.com/bid/22559"
},
{
"name": "33204",
"refsource": "OSVDB",
"url": "http://osvdb.org/33204"
}, },
{ {
"name": "webtester-directions-sql-injection(32490)", "name": "webtester-directions-sql-injection(32490)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32490" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32490"
},
{
"name": "ADV-2007-0633",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0633"
},
{
"name": "2261",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2261"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2007-1212", "ID": "CVE-2007-1212",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "HPSBST02206",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/466186/100/200/threaded"
},
{
"name" : "SSRT071354",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/466186/100/200/threaded"
},
{
"name" : "MS07-017",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017"
},
{
"name" : "23278",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23278"
},
{ {
"name": "ADV-2007-1215", "name": "ADV-2007-1215",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1215" "url": "http://www.vupen.com/english/advisories/2007/1215"
}, },
{
"name": "1017844",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017844"
},
{
"name": "HPSBST02206",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/466186/100/200/threaded"
},
{ {
"name": "oval:org.mitre.oval:def:1923", "name": "oval:org.mitre.oval:def:1923",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1923" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1923"
}, },
{ {
"name" : "1017844", "name": "23278",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id?1017844" "url": "http://www.securityfocus.com/bid/23278"
},
{
"name": "MS07-017",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017"
},
{
"name": "SSRT071354",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/466186/100/200/threaded"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070310 Remote File Include In Script SoftNews Media Group",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/462445/100/0/threaded"
},
{ {
"name": "22913", "name": "22913",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22913" "url": "http://www.securityfocus.com/bid/22913"
}, },
{
"name": "20070310 Remote File Include In Script SoftNews Media Group",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/462445/100/0/threaded"
},
{ {
"name": "35712", "name": "35712",
"refsource": "OSVDB", "refsource": "OSVDB",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[ISN] 20070326 Windows weakness can lead to network traffic hijacks", "name": "934864",
"refsource" : "MLIST", "refsource": "MSKB",
"url" : "http://archives.neohapsis.com/archives/isn/2007-q1/0418.html" "url": "http://support.microsoft.com/kb/934864"
}, },
{ {
"name": "http://isc.sans.org/diary.html?storyid=2517", "name": "http://isc.sans.org/diary.html?storyid=2517",
@ -63,14 +63,9 @@
"url": "http://isc.sans.org/diary.html?storyid=2517" "url": "http://isc.sans.org/diary.html?storyid=2517"
}, },
{ {
"name" : "http://news.com.com/Windows+weakness+can+lead+to+network+traffic+hijacks/2100-1002_3-6170229.html", "name": "[ISN] 20070326 Windows weakness can lead to network traffic hijacks",
"refsource" : "MISC", "refsource": "MLIST",
"url" : "http://news.com.com/Windows+weakness+can+lead+to+network+traffic+hijacks/2100-1002_3-6170229.html" "url": "http://archives.neohapsis.com/archives/isn/2007-q1/0418.html"
},
{
"name" : "934864",
"refsource" : "MSKB",
"url" : "http://support.microsoft.com/kb/934864"
}, },
{ {
"name": "ADV-2007-1115", "name": "ADV-2007-1115",
@ -81,6 +76,11 @@
"name": "win-wpad-information-disclosure(33244)", "name": "win-wpad-information-disclosure(33244)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33244" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33244"
},
{
"name": "http://news.com.com/Windows+weakness+can+lead+to+network+traffic+hijacks/2100-1002_3-6170229.html",
"refsource": "MISC",
"url": "http://news.com.com/Windows+weakness+can+lead+to+network+traffic+hijacks/2100-1002_3-6170229.html"
} }
] ]
} }

View File

@ -57,11 +57,21 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464287/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/464287/100/0/threaded"
}, },
{
"name": "http://research.eeye.com/html/alerts/zeroday/20070328.html",
"refsource": "MISC",
"url": "http://research.eeye.com/html/alerts/zeroday/20070328.html"
},
{ {
"name": "20070331 Windows .ANI Stack Overflow Exploit", "name": "20070331 Windows .ANI Stack Overflow Exploit",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464345/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/464345/100/0/threaded"
}, },
{
"name": "ADV-2007-1151",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1151"
},
{ {
"name": "http://vil.nai.com/vil/content/v_141860.htm", "name": "http://vil.nai.com/vil/content/v_141860.htm",
"refsource": "MISC", "refsource": "MISC",
@ -72,6 +82,21 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.avertlabs.com/research/blog/?p=230" "url": "http://www.avertlabs.com/research/blog/?p=230"
}, },
{
"name": "23194",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23194"
},
{
"name": "http://www.microsoft.com/technet/security/advisory/935423.mspx",
"refsource": "CONFIRM",
"url": "http://www.microsoft.com/technet/security/advisory/935423.mspx"
},
{
"name": "1017827",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017827"
},
{ {
"name": "http://www.avertlabs.com/research/blog/?p=233", "name": "http://www.avertlabs.com/research/blog/?p=233",
"refsource": "MISC", "refsource": "MISC",
@ -81,31 +106,6 @@
"name": "http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/", "name": "http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/" "url": "http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/"
},
{
"name" : "http://research.eeye.com/html/alerts/zeroday/20070328.html",
"refsource" : "MISC",
"url" : "http://research.eeye.com/html/alerts/zeroday/20070328.html"
},
{
"name" : "http://www.microsoft.com/technet/security/advisory/935423.mspx",
"refsource" : "CONFIRM",
"url" : "http://www.microsoft.com/technet/security/advisory/935423.mspx"
},
{
"name" : "23194",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23194"
},
{
"name" : "ADV-2007-1151",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1151"
},
{
"name" : "1017827",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017827"
} }
] ]
} }

View File

@ -52,11 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "24773",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24773"
},
{
"name": "34625",
"refsource": "OSVDB",
"url": "http://osvdb.org/34625"
},
{
"name": "34624",
"refsource": "OSVDB",
"url": "http://osvdb.org/34624"
},
{ {
"name": "3659", "name": "3659",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3659" "url": "https://www.exploit-db.com/exploits/3659"
}, },
{
"name": "34623",
"refsource": "OSVDB",
"url": "http://osvdb.org/34623"
},
{ {
"name": "23303", "name": "23303",
"refsource": "BID", "refsource": "BID",
@ -67,26 +87,6 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1262" "url": "http://www.vupen.com/english/advisories/2007/1262"
}, },
{
"name" : "34623",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34623"
},
{
"name" : "34624",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34624"
},
{
"name" : "34625",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/34625"
},
{
"name" : "24773",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24773"
},
{ {
"name": "aroundme-multiple-file-include(33427)", "name": "aroundme-multiple-file-include(33427)",
"refsource": "XF", "refsource": "XF",

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.netinvoicing.com/downloads/ChangeLog" "url": "http://www.netinvoicing.com/downloads/ChangeLog"
}, },
{
"name" : "25661",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25661"
},
{ {
"name": "26730", "name": "26730",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26730" "url": "http://secunia.com/advisories/26730"
},
{
"name": "25661",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25661"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4426" "url": "https://www.exploit-db.com/exploits/4426"
}, },
{
"name" : "http://www.sybsecurity.com/advisors/SYBSEC-ADV01-Airsensor_M520_HTTPD_Remote_Preauth_Denial_Of_Service_and_Buffer_Overflow_PoC",
"refsource" : "MISC",
"url" : "http://www.sybsecurity.com/advisors/SYBSEC-ADV01-Airsensor_M520_HTTPD_Remote_Preauth_Denial_Of_Service_and_Buffer_Overflow_PoC"
},
{ {
"name": "25715", "name": "25715",
"refsource": "BID", "refsource": "BID",
@ -73,14 +68,19 @@
"url": "http://www.vupen.com/english/advisories/2007/3226" "url": "http://www.vupen.com/english/advisories/2007/3226"
}, },
{ {
"name" : "26869", "name": "http://www.sybsecurity.com/advisors/SYBSEC-ADV01-Airsensor_M520_HTTPD_Remote_Preauth_Denial_Of_Service_and_Buffer_Overflow_PoC",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/26869" "url": "http://www.sybsecurity.com/advisors/SYBSEC-ADV01-Airsensor_M520_HTTPD_Remote_Preauth_Denial_Of_Service_and_Buffer_Overflow_PoC"
}, },
{ {
"name": "airdefense-https-dos(36691)", "name": "airdefense-https-dos(36691)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36691" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36691"
},
{
"name": "26869",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26869"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "reloadcms-index-file-include(37343)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37343"
},
{ {
"name": "20071020 ReloadCMS Vulnerable", "name": "20071020 ReloadCMS Vulnerable",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482573/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/482573/100/0/threaded"
}, },
{
"name" : "26143",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26143"
},
{ {
"name": "3285", "name": "3285",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3285" "url": "http://securityreason.com/securityalert/3285"
}, },
{ {
"name" : "reloadcms-index-file-include(37343)", "name": "26143",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37343" "url": "http://www.securityfocus.com/bid/26143"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2619", "ID": "CVE-2015-2619",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,25 +58,35 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
}, },
{ {
"name" : "GLSA-201603-11", "name": "75881",
"refsource" : "GENTOO", "refsource": "BID",
"url" : "https://security.gentoo.org/glsa/201603-11" "url": "http://www.securityfocus.com/bid/75881"
}, },
{ {
"name" : "RHSA-2015:1241", "name": "1032910",
"refsource" : "REDHAT", "refsource": "SECTRACK",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1241.html" "url": "http://www.securitytracker.com/id/1032910"
},
{
"name" : "RHSA-2015:1242",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1242.html"
}, },
{ {
"name": "RHSA-2015:1485", "name": "RHSA-2015:1485",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1485.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1485.html"
}, },
{
"name": "openSUSE-SU-2015:1289",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
},
{
"name": "GLSA-201603-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-11"
},
{
"name": "RHSA-2015:1242",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html"
},
{ {
"name": "RHSA-2015:1488", "name": "RHSA-2015:1488",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -98,19 +108,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"
}, },
{ {
"name" : "openSUSE-SU-2015:1289", "name": "RHSA-2015:1241",
"refsource" : "SUSE", "refsource": "REDHAT",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html"
},
{
"name" : "75881",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75881"
},
{
"name" : "1032910",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032910"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-2640", "ID": "CVE-2015-2640",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2015-3439", "ID": "CVE-2015-3439",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,19 +58,9 @@
"url": "http://zoczus.blogspot.com/2015/04/plupload-same-origin-method-execution.html" "url": "http://zoczus.blogspot.com/2015/04/plupload-same-origin-method-execution.html"
}, },
{ {
"name" : "https://wpvulndb.com/vulnerabilities/7933", "name": "FEDORA-2015-6778",
"refsource" : "MISC", "refsource": "FEDORA",
"url" : "https://wpvulndb.com/vulnerabilities/7933" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157391.html"
},
{
"name" : "http://codex.wordpress.org/Version_4.1.2",
"refsource" : "CONFIRM",
"url" : "http://codex.wordpress.org/Version_4.1.2"
},
{
"name" : "https://core.trac.wordpress.org/changeset/32168",
"refsource" : "CONFIRM",
"url" : "https://core.trac.wordpress.org/changeset/32168"
}, },
{ {
"name": "https://wordpress.org/news/2015/04/wordpress-4-1-2/", "name": "https://wordpress.org/news/2015/04/wordpress-4-1-2/",
@ -78,34 +68,44 @@
"url": "https://wordpress.org/news/2015/04/wordpress-4-1-2/" "url": "https://wordpress.org/news/2015/04/wordpress-4-1-2/"
}, },
{ {
"name" : "DSA-3250", "name": "https://wpvulndb.com/vulnerabilities/7933",
"refsource" : "DEBIAN", "refsource": "MISC",
"url" : "http://www.debian.org/security/2015/dsa-3250" "url": "https://wpvulndb.com/vulnerabilities/7933"
},
{
"name" : "FEDORA-2015-6778",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157391.html"
},
{
"name" : "FEDORA-2015-6790",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158278.html"
},
{
"name" : "FEDORA-2015-6808",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158271.html"
}, },
{ {
"name": "74269", "name": "74269",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/74269" "url": "http://www.securityfocus.com/bid/74269"
}, },
{
"name": "FEDORA-2015-6790",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158278.html"
},
{ {
"name": "1032207", "name": "1032207",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032207" "url": "http://www.securitytracker.com/id/1032207"
},
{
"name": "https://core.trac.wordpress.org/changeset/32168",
"refsource": "CONFIRM",
"url": "https://core.trac.wordpress.org/changeset/32168"
},
{
"name": "DSA-3250",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3250"
},
{
"name": "http://codex.wordpress.org/Version_4.1.2",
"refsource": "CONFIRM",
"url": "http://codex.wordpress.org/Version_4.1.2"
},
{
"name": "FEDORA-2015-6808",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158271.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6102", "ID": "CVE-2015-6102",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "38794",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/38794/"
},
{
"name" : "http://packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.html"
},
{ {
"name": "MS15-115", "name": "MS15-115",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115"
}, },
{
"name": "38794",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38794/"
},
{ {
"name": "1034114", "name": "1034114",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034114" "url": "http://www.securitytracker.com/id/1034114"
},
{
"name": "http://packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6295", "ID": "CVE-2015-6295",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2015-6757", "ID": "CVE-2015-6757",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
},
{ {
"name": "https://code.google.com/p/chromium/issues/detail?id=529520", "name": "https://code.google.com/p/chromium/issues/detail?id=529520",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,6 +62,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1327723005" "url": "https://codereview.chromium.org/1327723005"
}, },
{
"name": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
},
{
"name": "77071",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77071"
},
{ {
"name": "DSA-3376", "name": "DSA-3376",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -78,29 +83,24 @@
"url": "https://security.gentoo.org/glsa/201603-09" "url": "https://security.gentoo.org/glsa/201603-09"
}, },
{ {
"name" : "RHSA-2015:1912", "name": "1033816",
"refsource" : "REDHAT", "refsource": "SECTRACK",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1912.html" "url": "http://www.securitytracker.com/id/1033816"
}, },
{ {
"name": "USN-2770-1", "name": "USN-2770-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2770-1" "url": "http://www.ubuntu.com/usn/USN-2770-1"
}, },
{
"name": "RHSA-2015:1912",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1912.html"
},
{ {
"name": "USN-2770-2", "name": "USN-2770-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2770-2" "url": "http://www.ubuntu.com/usn/USN-2770-2"
},
{
"name" : "77071",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/77071"
},
{
"name" : "1033816",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033816"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2015-6788", "ID": "CVE-2015-6788",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,20 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html" "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
}, },
{
"name": "RHSA-2015:2618",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
},
{ {
"name": "https://code.google.com/p/chromium/issues/detail?id=548273", "name": "https://code.google.com/p/chromium/issues/detail?id=548273",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=548273" "url": "https://code.google.com/p/chromium/issues/detail?id=548273"
}, },
{ {
"name" : "https://codereview.chromium.org/1422383003/", "name": "openSUSE-SU-2015:2290",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://codereview.chromium.org/1422383003/" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html"
}, },
{ {
"name": "DSA-3418", "name": "DSA-3418",
@ -78,14 +83,9 @@
"url": "https://security.gentoo.org/glsa/201603-09" "url": "https://security.gentoo.org/glsa/201603-09"
}, },
{ {
"name" : "RHSA-2015:2618", "name": "78734",
"refsource" : "REDHAT", "refsource": "BID",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2618.html" "url": "http://www.securityfocus.com/bid/78734"
},
{
"name" : "openSUSE-SU-2015:2290",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html"
}, },
{ {
"name": "openSUSE-SU-2015:2291", "name": "openSUSE-SU-2015:2291",
@ -93,9 +93,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html"
}, },
{ {
"name" : "78734", "name": "https://codereview.chromium.org/1422383003/",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/78734" "url": "https://codereview.chromium.org/1422383003/"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-7160", "ID": "CVE-2015-7160",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-7213", "ID": "CVE-2015-7213",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,69 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-146.html", "name": "SUSE-SU-2015:2334",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-146.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1206211",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1206211"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "DSA-3422",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3422"
},
{
"name" : "DSA-3432",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3432"
},
{
"name" : "FEDORA-2015-51b1105902",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"
},
{
"name" : "FEDORA-2015-7ab3d3afcf",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"
},
{
"name" : "GLSA-201512-10",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201512-10"
},
{
"name" : "RHSA-2015:2657",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2657.html"
},
{
"name" : "openSUSE-SU-2016:0307",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html"
},
{
"name" : "openSUSE-SU-2016:0308",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
},
{
"name" : "openSUSE-SU-2015:2353",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"
}, },
{ {
"name": "openSUSE-SU-2015:2380", "name": "openSUSE-SU-2015:2380",
@ -123,44 +63,104 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html"
}, },
{ {
"name" : "openSUSE-SU-2015:2406", "name": "DSA-3432",
"refsource" : "SUSE", "refsource": "DEBIAN",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" "url": "http://www.debian.org/security/2016/dsa-3432"
},
{
"name" : "SUSE-SU-2015:2334",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html"
},
{
"name" : "SUSE-SU-2015:2335",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html"
},
{
"name" : "SUSE-SU-2015:2336",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html"
},
{
"name" : "USN-2859-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2859-1"
},
{
"name" : "USN-2833-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2833-1"
}, },
{ {
"name": "79279", "name": "79279",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/79279" "url": "http://www.securityfocus.com/bid/79279"
}, },
{
"name": "SUSE-SU-2015:2335",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html"
},
{
"name": "GLSA-201512-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201512-10"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206211",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206211"
},
{
"name": "openSUSE-SU-2015:2353",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "openSUSE-SU-2015:2406",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name": "openSUSE-SU-2016:0308",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
},
{
"name": "FEDORA-2015-7ab3d3afcf",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"
},
{
"name": "USN-2859-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2859-1"
},
{
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-146.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-146.html"
},
{
"name": "USN-2833-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2833-1"
},
{
"name": "RHSA-2015:2657",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html"
},
{
"name": "SUSE-SU-2015:2336",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html"
},
{
"name": "openSUSE-SU-2016:0307",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
},
{
"name": "FEDORA-2015-51b1105902",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"
},
{ {
"name": "1034426", "name": "1034426",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034426" "url": "http://www.securitytracker.com/id/1034426"
},
{
"name": "DSA-3422",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3422"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@suse.com",
"ID": "CVE-2015-7236", "ID": "CVE-2015-7236",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,61 +52,46 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[linux-nfs] 20150810 [PATCH] Fix memory corruption in PMAP_CALLIT code",
"refsource" : "MLIST",
"url" : "http://www.spinics.net/lists/linux-nfs/msg53045.html"
},
{
"name" : "[oss-security] 20150917 CVE Request: remote triggerable use-after-free in rpcbind",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/09/17/1"
},
{
"name" : "[oss-security] 20150917 Re: CVE Request: remote triggerable use-after-free in rpcbind",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/09/17/6"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
}, },
{
"name" : "DSA-3366",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3366"
},
{
"name" : "FEDORA-2015-36b145bd37",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171030.html"
},
{
"name" : "FEDORA-2015-9eee2fbc78",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172152.html"
},
{
"name" : "FreeBSD-SA-15:24",
"refsource" : "FREEBSD",
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-15:24.rpcbind.asc"
},
{ {
"name": "GLSA-201611-17", "name": "GLSA-201611-17",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201611-17" "url": "https://security.gentoo.org/glsa/201611-17"
}, },
{
"name": "[linux-nfs] 20150810 [PATCH] Fix memory corruption in PMAP_CALLIT code",
"refsource": "MLIST",
"url": "http://www.spinics.net/lists/linux-nfs/msg53045.html"
},
{
"name": "FEDORA-2015-9eee2fbc78",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172152.html"
},
{
"name": "[oss-security] 20150917 Re: CVE Request: remote triggerable use-after-free in rpcbind",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/09/17/6"
},
{ {
"name": "USN-2756-1", "name": "USN-2756-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2756-1" "url": "http://www.ubuntu.com/usn/USN-2756-1"
}, },
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name": "[oss-security] 20150917 CVE Request: remote triggerable use-after-free in rpcbind",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/09/17/1"
},
{ {
"name": "76771", "name": "76771",
"refsource": "BID", "refsource": "BID",
@ -116,6 +101,21 @@
"name": "1033673", "name": "1033673",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033673" "url": "http://www.securitytracker.com/id/1033673"
},
{
"name": "FreeBSD-SA-15:24",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-15:24.rpcbind.asc"
},
{
"name": "FEDORA-2015-36b145bd37",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171030.html"
},
{
"name": "DSA-3366",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3366"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-7780", "ID": "CVE-2015-7780",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2016-0834", "ID": "CVE-2016-0834",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-04-02.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-04-02.html"
},
{ {
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
},
{
"name": "http://source.android.com/security/bulletin/2016-04-02.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-04-02.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-0934", "ID": "CVE-2016-0934",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-16-016" "url": "http://zerodayinitiative.com/advisories/ZDI-16-016"
}, },
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html"
},
{ {
"name": "1034646", "name": "1034646",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034646" "url": "http://www.securitytracker.com/id/1034646"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1141", "ID": "CVE-2016-1141",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.au.kddi.com/mobile/service/smartphone/wifi/homespot/#anc06" "url": "http://www.au.kddi.com/mobile/service/smartphone/wifi/homespot/#anc06"
}, },
{
"name" : "JVN#54686544",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN54686544/index.html"
},
{ {
"name": "JVNDB-2016-000012", "name": "JVNDB-2016-000012",
"refsource": "JVNDB", "refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000012" "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000012"
},
{
"name": "JVN#54686544",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN54686544/index.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-4757", "ID": "CVE-2016-4757",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-4850", "ID": "CVE-2016-4850",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,16 +57,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://linecorp.com/ja/security/article/65" "url": "https://linecorp.com/ja/security/article/65"
}, },
{
"name" : "JVN#05924524",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN05924524/index.html"
},
{ {
"name": "JVNDB-2016-000153", "name": "JVNDB-2016-000153",
"refsource": "JVNDB", "refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000153.html" "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000153.html"
}, },
{
"name": "JVN#05924524",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN05924524/index.html"
},
{ {
"name": "92644", "name": "92644",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5449", "ID": "CVE-2016-5449",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name" : "91787",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91787"
},
{ {
"name": "91986", "name": "91986",
"refsource": "BID", "refsource": "BID",
@ -71,6 +61,16 @@
"name": "1036408", "name": "1036408",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036408" "url": "http://www.securitytracker.com/id/1036408"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
} }
] ]
} }

View File

@ -1,10 +1,10 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "secure@dell.com", "ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2019-02-28T05:00:00.000Z", "DATE_PUBLIC": "2019-02-28T05:00:00.000Z",
"ID": "CVE-2019-3711", "ID": "CVE-2019-3711",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE" : "DSA-2019-038: RSA® Authentication Manager Insecure Credential Management Vulnerability" "TITLE": "DSA-2019-038: RSA\u00ae Authentication Manager Insecure Credential Management Vulnerability"
}, },
"affects": { "affects": {
"vendor": { "vendor": {