mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
9690b0a7bc
commit
fcbddbccce
@ -52,21 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070108 magic photo storage website Remote File Inclusion",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/456264/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "3100",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3100"
|
||||
},
|
||||
{
|
||||
"name" : "21965",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21965"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0136",
|
||||
"refsource": "VUPEN",
|
||||
@ -77,6 +67,16 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23687"
|
||||
},
|
||||
{
|
||||
"name": "20070108 magic photo storage website Remote File Inclusion",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/456264/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "21965",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21965"
|
||||
},
|
||||
{
|
||||
"name": "magicphotostorage-config-file-include(31347)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,25 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070106 NNL-Labs & MNIN - F5 FirePass Security Advisory",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051651.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mnin.org/advisories/2007_firepass.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.mnin.org/advisories/2007_firepass.pdf"
|
||||
},
|
||||
{
|
||||
"name": "https://tech.f5.com/home/solutions/sol6923.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tech.f5.com/home/solutions/sol6923.html"
|
||||
},
|
||||
{
|
||||
"name" : "21957",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21957"
|
||||
"name": "http://www.mnin.org/advisories/2007_firepass.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.mnin.org/advisories/2007_firepass.pdf"
|
||||
},
|
||||
{
|
||||
"name": "32736",
|
||||
@ -81,6 +71,16 @@
|
||||
"name": "23627",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23627"
|
||||
},
|
||||
{
|
||||
"name": "20070106 NNL-Labs & MNIN - F5 FirePass Security Advisory",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051651.html"
|
||||
},
|
||||
{
|
||||
"name": "21957",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21957"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070204 Sql injection bugs in Joomla and Mambo",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/459203/100/0/threaded"
|
||||
"name": "32520",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/32520"
|
||||
},
|
||||
{
|
||||
"name": "20070118 The vulnerabilities festival !",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.hackers.ir/advisories/festival.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.hackers.ir/advisories/festival.txt"
|
||||
},
|
||||
{
|
||||
"name": "19734",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19734"
|
||||
},
|
||||
{
|
||||
"name" : "32520",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/32520"
|
||||
"name": "20070204 Sql injection bugs in Joomla and Mambo",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/459203/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.hackers.ir/advisories/festival.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.hackers.ir/advisories/festival.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070122 Check Point Connectra End Point security bypass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/457683/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070122 Re: [Full-disclosure] Check Point Connectra End Point security bypass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/457621/100/0/threaded"
|
||||
"name": "1017559",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017559"
|
||||
},
|
||||
{
|
||||
"name": "20070122 Check Point Connectra End Point security bypass",
|
||||
@ -68,19 +63,9 @@
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051920.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://secureknowledge.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?lid=sk32472",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secureknowledge.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?lid=sk32472"
|
||||
},
|
||||
{
|
||||
"name" : "http://updates.checkpoint.com/fileserver/ID/7126/FILE/VPN-1_Hotfix1.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://updates.checkpoint.com/fileserver/ID/7126/FILE/VPN-1_Hotfix1.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.checkpoint.com/downloads/latest/hfa/vpn1_security/vpn1_R62_Windows.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.checkpoint.com/downloads/latest/hfa/vpn1_security/vpn1_R62_Windows.html"
|
||||
"name": "20070122 Check Point Connectra End Point security bypass",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/457683/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.checkpoint.com/downloads/latest/hfa/connectra/security_r62.html",
|
||||
@ -88,39 +73,54 @@
|
||||
"url": "http://www.checkpoint.com/downloads/latest/hfa/connectra/security_r62.html"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-0276",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0276"
|
||||
},
|
||||
{
|
||||
"name" : "31655",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/31655"
|
||||
},
|
||||
{
|
||||
"name" : "1017559",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1017559"
|
||||
},
|
||||
{
|
||||
"name" : "1017560",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1017560"
|
||||
},
|
||||
{
|
||||
"name" : "23847",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23847"
|
||||
"name": "http://www.checkpoint.com/downloads/latest/hfa/vpn1_security/vpn1_R62_Windows.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.checkpoint.com/downloads/latest/hfa/vpn1_security/vpn1_R62_Windows.html"
|
||||
},
|
||||
{
|
||||
"name": "2179",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2179"
|
||||
},
|
||||
{
|
||||
"name": "23847",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23847"
|
||||
},
|
||||
{
|
||||
"name": "20070122 Re: [Full-disclosure] Check Point Connectra End Point security bypass",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/457621/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "checkpoint-params-security-bypass(31646)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31646"
|
||||
},
|
||||
{
|
||||
"name": "http://secureknowledge.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?lid=sk32472",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secureknowledge.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?lid=sk32472"
|
||||
},
|
||||
{
|
||||
"name": "31655",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/31655"
|
||||
},
|
||||
{
|
||||
"name": "1017560",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017560"
|
||||
},
|
||||
{
|
||||
"name": "http://updates.checkpoint.com/fileserver/ID/7126/FILE/VPN-1_Hotfix1.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://updates.checkpoint.com/fileserver/ID/7126/FILE/VPN-1_Hotfix1.pdf"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0276",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0276"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "22460",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22460"
|
||||
},
|
||||
{
|
||||
"name": "33122",
|
||||
"refsource": "OSVDB",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "23217",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23217"
|
||||
},
|
||||
{
|
||||
"name": "22460",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22460"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3409",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3409"
|
||||
},
|
||||
{
|
||||
"name" : "5593",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/5593"
|
||||
},
|
||||
{
|
||||
"name" : "22808",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22808"
|
||||
},
|
||||
{
|
||||
"name" : "29154",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29154"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-0821",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0821"
|
||||
},
|
||||
{
|
||||
"name" : "33828",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/33828"
|
||||
},
|
||||
{
|
||||
"name" : "24376",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24376"
|
||||
"name": "ajdating-userid-sql-injection(42326)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42326"
|
||||
},
|
||||
{
|
||||
"name": "ajdating-viewprofile-sql-injection(32788)",
|
||||
@ -93,9 +63,39 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32788"
|
||||
},
|
||||
{
|
||||
"name" : "ajdating-userid-sql-injection(42326)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42326"
|
||||
"name": "29154",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29154"
|
||||
},
|
||||
{
|
||||
"name": "3409",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3409"
|
||||
},
|
||||
{
|
||||
"name": "33828",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33828"
|
||||
},
|
||||
{
|
||||
"name": "22808",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22808"
|
||||
},
|
||||
{
|
||||
"name": "5593",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5593"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0821",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0821"
|
||||
},
|
||||
{
|
||||
"name": "24376",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24376"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,31 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/462263/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20070314 Re: Re: [Full-disclosure] PHP import_request_variables() arbitrary variable overwrite",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/462800/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "26048",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26048"
|
||||
},
|
||||
{
|
||||
"name": "22886",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22886"
|
||||
},
|
||||
{
|
||||
"name": "http://us2.php.net/releases/4_4_7.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://us2.php.net/releases/4_4_7.php"
|
||||
},
|
||||
{
|
||||
"name": "2406",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2406"
|
||||
},
|
||||
{
|
||||
"name": "20070310 Re: [Full-disclosure] PHP import_request_variables() arbitrary variable overwrite",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -67,16 +92,6 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/462658/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070314 Re: Re: [Full-disclosure] PHP import_request_variables() arbitrary variable overwrite",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/462800/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://us2.php.net/releases/4_4_7.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://us2.php.net/releases/4_4_7.php"
|
||||
},
|
||||
{
|
||||
"name": "http://us2.php.net/releases/5_2_2.php",
|
||||
"refsource": "CONFIRM",
|
||||
@ -86,21 +101,6 @@
|
||||
"name": "SUSE-SA:2007:044",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "22886",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22886"
|
||||
},
|
||||
{
|
||||
"name" : "26048",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26048"
|
||||
},
|
||||
{
|
||||
"name" : "2406",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/2406"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3568",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3568"
|
||||
},
|
||||
{
|
||||
"name": "37179",
|
||||
"refsource": "OSVDB",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "freeimagehosting-adbodytemp-file-include(33196)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33196"
|
||||
},
|
||||
{
|
||||
"name": "3568",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3568"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2007-1755",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "wengophone-sip-invite-dos(35967)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35967"
|
||||
},
|
||||
{
|
||||
"name": "20070812 WengoPhone SIP phone Remote Denial of Service vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "3015",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3015"
|
||||
},
|
||||
{
|
||||
"name" : "wengophone-sip-invite-dos(35967)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35967"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,14 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/478720/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://blog.hispasec.com/lab/advisories/adv_TotalCommander_7_01_Remote_Traversal.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blog.hispasec.com/lab/advisories/adv_TotalCommander_7_01_Remote_Traversal.txt"
|
||||
"name": "26734",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26734"
|
||||
},
|
||||
{
|
||||
"name": "39838",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/39838"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ghisler.com/whatsnew.htm",
|
||||
@ -72,36 +77,31 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25581"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3102",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3102"
|
||||
},
|
||||
{
|
||||
"name" : "39838",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/39838"
|
||||
},
|
||||
{
|
||||
"name" : "1018662",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018662"
|
||||
},
|
||||
{
|
||||
"name" : "26734",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26734"
|
||||
},
|
||||
{
|
||||
"name": "3106",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3106"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.hispasec.com/lab/advisories/adv_TotalCommander_7_01_Remote_Traversal.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.hispasec.com/lab/advisories/adv_TotalCommander_7_01_Remote_Traversal.txt"
|
||||
},
|
||||
{
|
||||
"name": "totalcommander-ftp-weak-security(36487)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36487"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3102",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3102"
|
||||
},
|
||||
{
|
||||
"name": "1018662",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018662"
|
||||
},
|
||||
{
|
||||
"name": "totalcommander-ftp-directory-traversal(36486)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070906 [HISPASEC] 2K7SEPT6 Magellan Explorer 3.32 build 2305 Remote FTP Client Directory Traversal",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/478755/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://blog.hispasec.com/lab/advisories/adv_MagellanExplorer_3_32_Remote_Traversal.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blog.hispasec.com/lab/advisories/adv_MagellanExplorer_3_32_Remote_Traversal.txt"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3103",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3103"
|
||||
},
|
||||
{
|
||||
"name": "40501",
|
||||
"refsource": "OSVDB",
|
||||
@ -78,9 +63,19 @@
|
||||
"url": "http://www.securitytracker.com/id?1018661"
|
||||
},
|
||||
{
|
||||
"name" : "26737",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26737"
|
||||
"name": "ADV-2007-3103",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3103"
|
||||
},
|
||||
{
|
||||
"name": "20070906 [HISPASEC] 2K7SEPT6 Magellan Explorer 3.32 build 2305 Remote FTP Client Directory Traversal",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/478755/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "magellan-ftp-directory-traversal(36499)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36499"
|
||||
},
|
||||
{
|
||||
"name": "3123",
|
||||
@ -88,9 +83,14 @@
|
||||
"url": "http://securityreason.com/securityalert/3123"
|
||||
},
|
||||
{
|
||||
"name" : "magellan-ftp-directory-traversal(36499)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36499"
|
||||
"name": "http://blog.hispasec.com/lab/advisories/adv_MagellanExplorer_3_32_Remote_Traversal.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.hispasec.com/lab/advisories/adv_MagellanExplorer_3_32_Remote_Traversal.txt"
|
||||
},
|
||||
{
|
||||
"name": "26737",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26737"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mwrinfosecurity.com/publications/mwri_merak-webmail-xss-advisory_2008-09-17.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.mwrinfosecurity.com/publications/mwri_merak-webmail-xss-advisory_2008-09-17.pdf"
|
||||
},
|
||||
{
|
||||
"name": "25708",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25708"
|
||||
},
|
||||
{
|
||||
"name": "26877",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26877"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mwrinfosecurity.com/publications/mwri_merak-webmail-xss-advisory_2008-09-17.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.mwrinfosecurity.com/publications/mwri_merak-webmail-xss-advisory_2008-09-17.pdf"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3225",
|
||||
"refsource": "VUPEN",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "37428",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37428"
|
||||
},
|
||||
{
|
||||
"name" : "26877",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26877"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150316 Moodle security issues are now public",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2015/03/16/1"
|
||||
},
|
||||
{
|
||||
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-49087",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "https://moodle.org/mod/forum/discuss.php?d=307381",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=307381"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150316 Moodle security issues are now public",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2015/03/16/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150316 Moodle security issues are now public",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2015/03/16/1"
|
||||
},
|
||||
{
|
||||
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-49364",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "https://moodle.org/mod/forum/discuss.php?d=307387",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=307387"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150316 Moodle security issues are now public",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2015/03/16/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2015-2643",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,25 +58,60 @@
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
"name": "1032911",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032911"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1646",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1646.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3308",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3308"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1629",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3311",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3311"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1647",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1647.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1628",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2674-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2674-1"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201610-06",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201610-06"
|
||||
},
|
||||
{
|
||||
"name": "75830",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75830"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1630",
|
||||
"refsource": "REDHAT",
|
||||
@ -87,45 +122,10 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:1628",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:1646",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1646.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:1647",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1647.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1665",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1629",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2674-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2674-1"
|
||||
},
|
||||
{
|
||||
"name" : "75830",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/75830"
|
||||
},
|
||||
{
|
||||
"name" : "1032911",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032911"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-6230",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-6297",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-6424",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2015-6600",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-6978",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-533",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-533"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205370",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205370"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205375",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205375"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205641",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205641"
|
||||
"name": "APPLE-SA-2015-10-21-4",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-10-21-1",
|
||||
@ -78,20 +63,35 @@
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-10-21-4",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
|
||||
"name": "https://support.apple.com/HT205375",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205375"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-12-08-4",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205370",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205370"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-533",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-533"
|
||||
},
|
||||
{
|
||||
"name": "77263",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/77263"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205641",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205641"
|
||||
},
|
||||
{
|
||||
"name": "1033929",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2015-7550",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,15 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b4a1b4f5047e4f54e194681125c74c0aa64d637d",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b4a1b4f5047e4f54e194681125c74c0aa64d637d"
|
||||
"name": "79903",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/79903"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4"
|
||||
},
|
||||
{
|
||||
"name": "USN-2911-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2911-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2890-3",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2890-3"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1102",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1291197",
|
||||
"refsource": "CONFIRM",
|
||||
@ -73,14 +88,9 @@
|
||||
"url": "https://github.com/torvalds/linux/commit/b4a1b4f5047e4f54e194681125c74c0aa64d637d"
|
||||
},
|
||||
{
|
||||
"name" : "https://security-tracker.debian.org/tracker/CVE-2015-7550",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security-tracker.debian.org/tracker/CVE-2015-7550"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3434",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3434"
|
||||
"name": "USN-2911-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2911-2"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:2074",
|
||||
@ -88,19 +98,19 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:0911",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1102",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2888-1",
|
||||
"name": "USN-2890-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2888-1"
|
||||
"url": "http://www.ubuntu.com/usn/USN-2890-2"
|
||||
},
|
||||
{
|
||||
"name": "https://security-tracker.debian.org/tracker/CVE-2015-7550",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security-tracker.debian.org/tracker/CVE-2015-7550"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b4a1b4f5047e4f54e194681125c74c0aa64d637d",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b4a1b4f5047e4f54e194681125c74c0aa64d637d"
|
||||
},
|
||||
{
|
||||
"name": "USN-2890-1",
|
||||
@ -108,29 +118,19 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-2890-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2890-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2890-2"
|
||||
"name": "DSA-3434",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3434"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2890-3",
|
||||
"name": "USN-2888-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2890-3"
|
||||
"url": "http://www.ubuntu.com/usn/USN-2888-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2911-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2911-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2911-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2911-2"
|
||||
},
|
||||
{
|
||||
"name" : "79903",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/79903"
|
||||
"name": "SUSE-SU-2016:0911",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.citrix.com/article/CTX202482",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.citrix.com/article/CTX202482"
|
||||
},
|
||||
{
|
||||
"name": "1034167",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034167"
|
||||
},
|
||||
{
|
||||
"name": "http://support.citrix.com/article/CTX202482",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.citrix.com/article/CTX202482"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -79,15 +79,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21997687",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21997687"
|
||||
},
|
||||
{
|
||||
"name": "ibm-openpages-cve20160234-info-disc(110303)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/110303"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21997687",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21997687"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983137",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21983137"
|
||||
},
|
||||
{
|
||||
"name": "92475",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92475"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21983137",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983137"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2016-1242",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.tryton.org/posts/security-release-for-issue5795-and-issue5808.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.tryton.org/issue5808",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.tryton.org/issue5808"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3656",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3656"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.tryton.org/issue5808",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.tryton.org/issue5808"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1396",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://xenbits.xen.org/xsa/advisory-168.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://xenbits.xen.org/xsa/advisory-168.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.citrix.com/article/CTX205496",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.citrix.com/article/CTX205496"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3519",
|
||||
"refsource": "DEBIAN",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "1034745",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034745"
|
||||
},
|
||||
{
|
||||
"name": "http://support.citrix.com/article/CTX205496",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.citrix.com/article/CTX205496"
|
||||
},
|
||||
{
|
||||
"name": "http://xenbits.xen.org/xsa/advisory-168.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://xenbits.xen.org/xsa/advisory-168.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2016-1779",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160331 WebKitGTK+ Security Advisory WSA-2016-0003",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/537948/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206166",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206166"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206171",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206171"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-03-21-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-03-21-6",
|
||||
"refsource": "APPLE",
|
||||
@ -81,6 +61,26 @@
|
||||
"name": "1035353",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035353"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-03-21-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "20160331 WebKitGTK+ Security Advisory WSA-2016-0003",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/537948/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206171",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206171"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206166",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206166"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2016-1964",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-27.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-27.html"
|
||||
"name": "openSUSE-SU-2016:0894",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1243335",
|
||||
@ -63,80 +63,95 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1243335"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
||||
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-27.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3510",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3510"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3520",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3520"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201605-06",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201605-06"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:0894",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1767",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1769",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1778",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:0909",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:0727",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:0777",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:0731",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:0733",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html"
|
||||
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-27.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:0820",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1767",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0731",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:0727",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1778",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0876",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2917-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2917-1"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3520",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3520"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1769",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:0909",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3510",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3510"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0733",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name": "1035215",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035215"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:0777",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201605-06",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201605-06"
|
||||
},
|
||||
{
|
||||
"name": "USN-2934-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2934-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2917-2",
|
||||
"refsource": "UBUNTU",
|
||||
@ -146,21 +161,6 @@
|
||||
"name": "USN-2917-3",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2917-3"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2934-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2934-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2917-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2917-1"
|
||||
},
|
||||
{
|
||||
"name" : "1035215",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1035215"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-4347",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -58,19 +58,9 @@
|
||||
"url": "https://support.apple.com/HT207141"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207142",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207142"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207143",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207143"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207170",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207170"
|
||||
"name": "1036858",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036858"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-09-20",
|
||||
@ -98,9 +88,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/93054"
|
||||
},
|
||||
{
|
||||
"name" : "1036858",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036858"
|
||||
"name": "https://support.apple.com/HT207170",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207170"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207142",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207142"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207143",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207143"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -100,15 +100,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0645",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0645"
|
||||
},
|
||||
{
|
||||
"name": "106896",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106896"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0645",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0645"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2019-1000047",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "lpardo@redhat.com",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2019-3833",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -67,15 +67,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugzilla.suse.com/show_bug.cgi?id=1122623"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3833",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3833"
|
||||
},
|
||||
{
|
||||
"name": "107367",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/107367"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3833",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3833"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.libsdl.org/show_bug.cgi?id=4494",
|
||||
"refsource": "MISC",
|
||||
|
Loading…
x
Reference in New Issue
Block a user