"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:31:10 +00:00
parent 7ab8da1f20
commit 0be39d3afc
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
51 changed files with 2985 additions and 2985 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2007-0213",
"STATE": "PUBLIC"
},
@ -58,20 +58,50 @@
"url": "http://www.securityfocus.com/archive/1/468871/100/200/threaded"
},
{
"name" : "SSRT071422",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/468871/100/200/threaded"
"name": "34391",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/34391"
},
{
"name": "1018015",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018015"
},
{
"name": "MS07-026",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026"
},
{
"name": "SSRT071422",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/468871/100/200/threaded"
},
{
"name": "oval:org.mitre.oval:def:1890",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1890"
},
{
"name": "25183",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25183"
},
{
"name": "TA07-128A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-128A.html"
},
{
"name": "ADV-2007-1711",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1711"
},
{
"name": "exchange-mime-base64-code-execution(33889)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33889"
},
{
"name": "VU#343145",
"refsource": "CERT-VN",
@ -81,36 +111,6 @@
"name": "23809",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23809"
},
{
"name" : "ADV-2007-1711",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1711"
},
{
"name" : "34391",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/34391"
},
{
"name" : "oval:org.mitre.oval:def:1890",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1890"
},
{
"name" : "1018015",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018015"
},
{
"name" : "25183",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25183"
},
{
"name" : "exchange-mime-base64-code-execution(33889)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33889"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "3271",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3271"
"name": "ADV-2007-0492",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0492"
},
{
"name": "ggcms-subpages-code-execution(32211)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32211"
},
{
"name": "22412",
@ -63,19 +68,14 @@
"url": "http://www.securityfocus.com/bid/22412"
},
{
"name" : "ADV-2007-0492",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0492"
"name": "3271",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3271"
},
{
"name": "35849",
"refsource": "OSVDB",
"url": "http://osvdb.org/35849"
},
{
"name" : "ggcms-subpages-code-execution(32211)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32211"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070221 Multiple Vulnerabilities in 802.1X Supplicant",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20070221-supplicant.shtml"
},
{
"name" : "22648",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22648"
"name": "24258",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24258"
},
{
"name": "ADV-2007-0690",
@ -68,29 +63,34 @@
"url": "http://www.vupen.com/english/advisories/2007/0690"
},
{
"name" : "33047",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33047"
"name": "22648",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22648"
},
{
"name": "20070221 Multiple Vulnerabilities in 802.1X Supplicant",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070221-supplicant.shtml"
},
{
"name": "1017683",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017683"
},
{
"name" : "1017684",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017684"
},
{
"name" : "24258",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24258"
},
{
"name": "cisco-cssc-dacl-privilege-escalation(32625)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32625"
},
{
"name": "33047",
"refsource": "OSVDB",
"url": "http://osvdb.org/33047"
},
{
"name": "1017684",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017684"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-1353",
"STATE": "PUBLIC"
},
@ -52,86 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.3",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.3"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm"
},
{
"name" : "DSA-1356",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1356"
},
{
"name" : "DSA-1503",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1503"
},
{
"name" : "DSA-1504",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1504"
},
{
"name" : "RHSA-2007:0376",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2007-0376.html"
},
{
"name" : "RHSA-2007:0488",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0488.html"
},
{
"name" : "RHSA-2007:0673",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0673.html"
},
{
"name" : "RHSA-2007:0672",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0672.html"
},
{
"name" : "RHSA-2007:0671",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0671.html"
},
{
"name" : "SUSE-SA:2007:035",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_35_kernel.html"
},
{
"name" : "USN-470-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-470-1"
},
{
"name" : "USN-486-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-486-1"
},
{
"name" : "USN-489-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-489-1"
},
{
"name" : "23594",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23594"
},
{
"name": "oval:org.mitre.oval:def:10626",
"refsource": "OVAL",
@ -143,69 +63,149 @@
"url": "http://www.vupen.com/english/advisories/2007/1495"
},
{
"name" : "24976",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24976"
"name": "USN-470-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-470-1"
},
{
"name" : "25596",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25596"
},
{
"name" : "25700",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25700"
},
{
"name" : "25683",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25683"
},
{
"name" : "25838",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25838"
},
{
"name" : "26133",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26133"
},
{
"name" : "26139",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26139"
"name": "RHSA-2007:0673",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0673.html"
},
{
"name": "26289",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26289"
},
{
"name": "27528",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27528"
},
{
"name": "26379",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26379"
},
{
"name": "25838",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25838"
},
{
"name": "DSA-1504",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1504"
},
{
"name": "DSA-1356",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1356"
},
{
"name": "25683",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25683"
},
{
"name": "RHSA-2007:0672",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0672.html"
},
{
"name": "USN-489-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-489-1"
},
{
"name": "26478",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26478"
},
{
"name" : "26450",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26450"
"name": "DSA-1503",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1503"
},
{
"name" : "27528",
"name": "24976",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/27528"
"url": "http://secunia.com/advisories/24976"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"
},
{
"name": "RHSA-2007:0671",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0671.html"
},
{
"name": "29058",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29058"
},
{
"name": "25596",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25596"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.3",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.3"
},
{
"name": "RHSA-2007:0376",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2007-0376.html"
},
{
"name": "USN-486-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-486-1"
},
{
"name": "26450",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26450"
},
{
"name": "SUSE-SA:2007:035",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_35_kernel.html"
},
{
"name": "25700",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25700"
},
{
"name": "26139",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26139"
},
{
"name": "23594",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23594"
},
{
"name": "RHSA-2007:0488",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0488.html"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm"
},
{
"name": "26133",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26133"
}
]
}

View File

@ -52,21 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.cynops.de/advisories/CVE-2007-1363.txt",
"refsource" : "MISC",
"url" : "https://www.cynops.de/advisories/CVE-2007-1363.txt"
},
{
"name": "http://www.dropafew.com/sphpblog/comments.php?y=07&m=04&entry=entry070403-224437",
"refsource": "CONFIRM",
"url": "http://www.dropafew.com/sphpblog/comments.php?y=07&m=04&entry=entry070403-224437"
},
{
"name" : "23400",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23400"
},
{
"name": "24861",
"refsource": "SECUNIA",
@ -76,6 +66,16 @@
"name": "dropafew-editlogcal-information-disclosure(33561)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33561"
},
{
"name": "23400",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23400"
},
{
"name": "https://www.cynops.de/advisories/CVE-2007-1363.txt",
"refsource": "MISC",
"url": "https://www.cynops.de/advisories/CVE-2007-1363.txt"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-1863",
"STATE": "PUBLIC"
},
@ -53,230 +53,45 @@
"references": {
"reference_data": [
{
"name" : "20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/505990/100/0/threaded"
},
{
"name" : "[security-announce] 20090820 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server",
"refsource" : "MLIST",
"url" : "http://lists.vmware.com/pipermail/security-announce/2009/000062.html"
},
{
"name" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=244658",
"refsource" : "MISC",
"url" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=244658"
},
{
"name" : "http://svn.apache.org/viewvc?view=rev&revision=535617",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=rev&revision=535617"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1500",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1500"
},
{
"name" : "http://httpd.apache.org/security/vulnerabilities_20.html",
"refsource" : "CONFIRM",
"url" : "http://httpd.apache.org/security/vulnerabilities_20.html"
},
{
"name" : "http://httpd.apache.org/security/vulnerabilities_22.html",
"refsource" : "CONFIRM",
"url" : "http://httpd.apache.org/security/vulnerabilities_22.html"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=186219",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=186219"
},
{
"name" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html",
"refsource" : "CONFIRM",
"url" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html"
},
{
"name" : "PK49355",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1PK49355"
},
{
"name" : "PK52702",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702"
},
{
"name" : "APPLE-SA-2008-05-28",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html"
},
{
"name" : "FEDORA-2007-2214",
"refsource" : "FEDORA",
"url" : "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html"
},
{
"name" : "GLSA-200711-06",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200711-06.xml"
},
{
"name" : "HPSBUX02262",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name" : "SSRT071447",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name" : "MDKSA-2007:140",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:140"
},
{
"name" : "MDKSA-2007:141",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:141"
},
{
"name" : "RHSA-2007:0534",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0534.html"
},
{
"name" : "RHSA-2007:0556",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0556.html"
"name": "28606",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28606"
},
{
"name": "RHSA-2007:0533",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2007-0533.html"
},
{
"name": "26822",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26822"
},
{
"name": "RHSA-2007:0557",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0557.html"
},
{
"name" : "SUSE-SA:2007:061",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_61_apache2.html"
"name": "PK52702",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702"
},
{
"name" : "2007-0026",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2007/0026/"
},
{
"name" : "USN-499-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-499-1"
},
{
"name" : "TA08-150A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-150A.html"
},
{
"name" : "24649",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/24649"
},
{
"name" : "37079",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37079"
},
{
"name" : "oval:org.mitre.oval:def:9824",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9824"
},
{
"name" : "ADV-2007-2727",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2727"
},
{
"name" : "ADV-2007-3283",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3283"
},
{
"name" : "ADV-2007-3386",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3386"
},
{
"name" : "ADV-2008-1697",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1697"
},
{
"name" : "1018303",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018303"
},
{
"name" : "25830",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25830"
},
{
"name" : "25873",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25873"
"name": "MDKSA-2007:140",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:140"
},
{
"name": "25920",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25920"
},
{
"name" : "26273",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26273"
},
{
"name" : "26443",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26443"
},
{
"name" : "26508",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26508"
},
{
"name" : "26822",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26822"
},
{
"name" : "26842",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26842"
},
{
"name": "26993",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26993"
},
{
"name" : "27037",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27037"
},
{
"name": "27563",
"refsource": "SECUNIA",
@ -288,19 +103,204 @@
"url": "http://secunia.com/advisories/27732"
},
{
"name" : "28606",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28606"
"name": "PK49355",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK49355"
},
{
"name": "RHSA-2007:0556",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0556.html"
},
{
"name": "http://httpd.apache.org/security/vulnerabilities_20.html",
"refsource": "CONFIRM",
"url": "http://httpd.apache.org/security/vulnerabilities_20.html"
},
{
"name": "TA08-150A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html"
},
{
"name": "SUSE-SA:2007:061",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_61_apache2.html"
},
{
"name": "FEDORA-2007-2214",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html"
},
{
"name": "2007-0026",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0026/"
},
{
"name": "http://httpd.apache.org/security/vulnerabilities_22.html",
"refsource": "CONFIRM",
"url": "http://httpd.apache.org/security/vulnerabilities_22.html"
},
{
"name": "30430",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30430"
},
{
"name": "24649",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24649"
},
{
"name": "APPLE-SA-2008-05-28",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html"
},
{
"name": "ADV-2007-3386",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"name": "37079",
"refsource": "OSVDB",
"url": "http://osvdb.org/37079"
},
{
"name": "20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/505990/100/0/threaded"
},
{
"name": "MDKSA-2007:141",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:141"
},
{
"name": "ADV-2008-0233",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0233"
},
{
"name": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html",
"refsource": "CONFIRM",
"url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html"
},
{
"name": "1018303",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018303"
},
{
"name": "27037",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27037"
},
{
"name": "26443",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26443"
},
{
"name": "[security-announce] 20090820 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server",
"refsource": "MLIST",
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html"
},
{
"name": "GLSA-200711-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200711-06.xml"
},
{
"name": "https://issues.rpath.com/browse/RPL-1500",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1500"
},
{
"name": "oval:org.mitre.oval:def:9824",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9824"
},
{
"name": "SSRT071447",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "HPSBUX02262",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "25830",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25830"
},
{
"name": "ADV-2008-1697",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1697"
},
{
"name": "USN-499-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-499-1"
},
{
"name": "26508",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26508"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm"
},
{
"name": "26842",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26842"
},
{
"name": "ADV-2007-3283",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3283"
},
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=244658",
"refsource": "MISC",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=244658"
},
{
"name": "ADV-2007-2727",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2727"
},
{
"name": "http://svn.apache.org/viewvc?view=rev&revision=535617",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=rev&revision=535617"
},
{
"name": "RHSA-2007:0534",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0534.html"
},
{
"name": "26273",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26273"
},
{
"name": "25873",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25873"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=186219",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=186219"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://pridels-team.blogspot.com/2007/10/odysseysuite-internet-banking-vuln.html",
"refsource" : "MISC",
"url" : "http://pridels-team.blogspot.com/2007/10/odysseysuite-internet-banking-vuln.html"
},
{
"name" : "25891",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25891"
"name": "37418",
"refsource": "OSVDB",
"url": "http://osvdb.org/37418"
},
{
"name": "ADV-2007-3346",
@ -68,19 +63,24 @@
"url": "http://www.vupen.com/english/advisories/2007/3346"
},
{
"name" : "37418",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37418"
},
{
"name" : "27022",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27022"
"name": "25891",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25891"
},
{
"name": "odysseysuite-mailbox-xss(36878)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36878"
},
{
"name": "http://pridels-team.blogspot.com/2007/10/odysseysuite-internet-banking-vuln.html",
"refsource": "MISC",
"url": "http://pridels-team.blogspot.com/2007/10/odysseysuite-internet-banking-vuln.html"
},
{
"name": "27022",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27022"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4513"
},
{
"name" : "26022",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26022"
},
{
"name": "40608",
"refsource": "OSVDB",
"url": "http://osvdb.org/40608"
},
{
"name": "26022",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26022"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "4528",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4528"
"name": "ADV-2007-3496",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3496"
},
{
"name": "26083",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/26083"
},
{
"name" : "ADV-2007-3496",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3496"
"name": "4528",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4528"
},
{
"name": "kwsphp-mg2-sql-injection(37196)",

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/535205/100/0/threaded"
},
{
"name" : "http://packetstormsecurity.com/files/131330/Security-Notice-For-CA-Spectrum.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/131330/Security-Notice-For-CA-Spectrum.html"
},
{
"name": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20150407-01-security-notice-for-ca-spectrum.aspx",
"refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "73963",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/73963"
},
{
"name": "http://packetstormsecurity.com/files/131330/Security-Notice-For-CA-Spectrum.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/131330/Security-Notice-For-CA-Spectrum.html"
}
]
}

View File

@ -63,9 +63,9 @@
"url": "http://packetstormsecurity.com/files/131685/Foxit-Reader-7.1.3.320-Memory-Corruption.html"
},
{
"name" : "http://protekresearchlab.com/PRL-2015-05/",
"refsource" : "MISC",
"url" : "http://protekresearchlab.com/PRL-2015-05/"
"name": "1032229",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032229"
},
{
"name": "http://www.foxitsoftware.com/support/security_bulletins.php#FRD-27",
@ -78,9 +78,9 @@
"url": "http://www.securityfocus.com/bid/74418"
},
{
"name" : "1032229",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032229"
"name": "http://protekresearchlab.com/PRL-2015-05/",
"refsource": "MISC",
"url": "http://protekresearchlab.com/PRL-2015-05/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3767",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/kb/HT205031",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT205031"
"name": "76340",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76340"
},
{
"name": "APPLE-SA-2015-08-13-2",
@ -63,9 +63,9 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
},
{
"name" : "76340",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/76340"
"name": "https://support.apple.com/kb/HT205031",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT205031"
},
{
"name": "1033276",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3790",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/kb/HT205031",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT205031"
},
{
"name": "https://support.apple.com/HT205046",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205046"
},
{
"name": "76340",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76340"
},
{
"name": "APPLE-SA-2015-08-13-2",
"refsource": "APPLE",
@ -73,9 +73,9 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00004.html"
},
{
"name" : "76340",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/76340"
"name": "https://support.apple.com/kb/HT205031",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT205031"
},
{
"name": "1033276",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6063",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6265",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1033381",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033381"
},
{
"name": "20150826 Cisco ACE 4710 Application Control Engine CLI Privilege Escalation Vulnerability",
"refsource": "CISCO",
@ -61,11 +66,6 @@
"name": "76491",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76491"
},
{
"name" : "1033381",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033381"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-6894",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7032",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT205373",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205373"
},
{
"name" : "APPLE-SA-2015-10-15-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00000.html"
},
{
"name": "1033823",
"refsource": "SECTRACK",
@ -76,6 +66,16 @@
"name": "1033826",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033826"
},
{
"name": "APPLE-SA-2015-10-15-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00000.html"
},
{
"name": "https://support.apple.com/HT205373",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205373"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-7067",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205637"
},
{
"name" : "APPLE-SA-2015-12-08-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{
"name": "1034344",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034344"
},
{
"name": "APPLE-SA-2015-12-08-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2016-0010",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1131",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://homepage2.nifty.com/natupaji/DxLib/dxvulnerability.html",
"refsource" : "CONFIRM",
"url" : "http://homepage2.nifty.com/natupaji/DxLib/dxvulnerability.html"
"name": "JVNDB-2016-000001",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000001"
},
{
"name": "JVN#49476817",
@ -63,9 +63,9 @@
"url": "http://jvn.jp/en/jp/JVN49476817/index.html"
},
{
"name" : "JVNDB-2016-000001",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000001"
"name": "http://homepage2.nifty.com/natupaji/DxLib/dxvulnerability.html",
"refsource": "CONFIRM",
"url": "http://homepage2.nifty.com/natupaji/DxLib/dxvulnerability.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1154",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ec-cube.net/products/detail.php?product_id=279",
"refsource" : "CONFIRM",
"url" : "http://www.ec-cube.net/products/detail.php?product_id=279"
},
{
"name": "JVN#31524757",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN31524757/index.html"
},
{
"name": "http://www.ec-cube.net/products/detail.php?product_id=279",
"refsource": "CONFIRM",
"url": "http://www.ec-cube.net/products/detail.php?product_id=279"
},
{
"name": "JVNDB-2016-000027",
"refsource": "JVNDB",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10752",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10752"
},
{
"name": "91755",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1036306",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036306"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10752",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10752"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1393",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-1589",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2016-4568",
"STATE": "PUBLIC"
},
@ -52,21 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160507 CVE Request: Linux: [media] videobuf2-v4l2: Verify planes array in buffer dequeueing",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/07/4"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3"
},
{
"name": "[oss-security] 20160507 CVE Request: Linux: [media] videobuf2-v4l2: Verify planes array in buffer dequeueing",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/07/4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1334316",
"refsource": "CONFIRM",
@ -76,6 +71,11 @@
"name": "https://github.com/torvalds/linux/commit/2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2016-5150",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://codereview.chromium.org/2255413004/",
"refsource" : "CONFIRM",
"url" : "https://codereview.chromium.org/2255413004/"
"name": "openSUSE-SU-2016:2250",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00003.html"
},
{
"name": "https://crbug.com/637963",
@ -67,41 +67,11 @@
"refsource": "CONFIRM",
"url": "https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html"
},
{
"name" : "DSA-3660",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3660"
},
{
"name" : "GLSA-201610-09",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201610-09"
},
{
"name" : "RHSA-2016:1854",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1854.html"
},
{
"name" : "openSUSE-SU-2016:2349",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-09/msg00073.html"
},
{
"name": "SUSE-SU-2016:2251",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00004.html"
},
{
"name" : "openSUSE-SU-2016:2250",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00003.html"
},
{
"name" : "openSUSE-SU-2016:2296",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00008.html"
},
{
"name": "92717",
"refsource": "BID",
@ -111,6 +81,36 @@
"name": "1036729",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036729"
},
{
"name": "https://codereview.chromium.org/2255413004/",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/2255413004/"
},
{
"name": "openSUSE-SU-2016:2349",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00073.html"
},
{
"name": "DSA-3660",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3660"
},
{
"name": "GLSA-201610-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-09"
},
{
"name": "openSUSE-SU-2016:2296",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00008.html"
},
{
"name": "RHSA-2016:1854",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1854.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5634",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "GLSA-201701-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-01"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "93709",
"refsource": "BID",