"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:30:12 +00:00
parent 5e5da33835
commit 0d83dde74f
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
45 changed files with 3170 additions and 3170 deletions

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "20060116 Digital Armaments Security Advisory 01.16.2006: CMU SNMP utilities snmptrad Format String Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/422086/100/0/threaded"
},
{
"name" : "http://www.digitalarmaments.com/2006040164883273.html",
"refsource" : "MISC",
"url" : "http://www.digitalarmaments.com/2006040164883273.html"
},
{
"name": "16267",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16267"
},
{
"name" : "ADV-2006-0234",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0234"
},
{
"name": "22493",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22493"
},
{
"name": "http://www.digitalarmaments.com/2006040164883273.html",
"refsource": "MISC",
"url": "http://www.digitalarmaments.com/2006040164883273.html"
},
{
"name": "18525",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18525"
},
{
"name": "ADV-2006-0234",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0234"
},
{
"name": "cmusnmp-snmpinput-format-string(24178)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24178"
},
{
"name": "20060116 Digital Armaments Security Advisory 01.16.2006: CMU SNMP utilities snmptrad Format String Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/422086/100/0/threaded"
}
]
}

View File

@ -57,30 +57,30 @@
"refsource": "MISC",
"url": "http://www.dslreports.com/forum/remark,15601404~days=9999~start=20"
},
{
"name": "19284",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19284"
},
{
"name": "http://forum.avast.com/index.php?topic=19862.0",
"refsource": "CONFIRM",
"url": "http://forum.avast.com/index.php?topic=19862.0"
},
{
"name" : "17158",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17158"
},
{
"name": "ADV-2006-1011",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1011"
},
{
"name" : "19284",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19284"
},
{
"name": "avast-default-insecure-permissions(25336)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25336"
},
{
"name": "17158",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17158"
}
]
}

View File

@ -53,14 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20060417 [eVuln] Wire Plastik wpBlog SQL Injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/431186/100/0/threaded"
"name": "24385",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24385"
},
{
"name" : "http://evuln.com/vulns/119/summary.html",
"refsource" : "MISC",
"url" : "http://evuln.com/vulns/119/summary.html"
"name": "wpblog-index-sql-injection(25628)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25628"
},
{
"name": "17381",
@ -72,20 +72,15 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1238"
},
{
"name" : "24385",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24385"
},
{
"name": "1015951",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015951"
},
{
"name" : "19538",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19538"
"name": "http://evuln.com/vulns/119/summary.html",
"refsource": "MISC",
"url": "http://evuln.com/vulns/119/summary.html"
},
{
"name": "734",
@ -93,9 +88,14 @@
"url": "http://securityreason.com/securityalert/734"
},
{
"name" : "wpblog-index-sql-injection(25628)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25628"
"name": "19538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19538"
},
{
"name": "20060417 [eVuln] Wire Plastik wpBlog SQL Injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/431186/100/0/threaded"
}
]
}

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "20060722 Microsoft Internet Explorer DOS Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-07/0379.html"
"name": "29129",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29129"
},
{
"name": "ie-wininet-dos(27900)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27900"
},
{
"name": "2039",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2039"
},
{
"name" : "19092",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19092"
},
{
"name": "ADV-2006-2917",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2917"
},
{
"name" : "29129",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/29129"
"name": "20060722 Microsoft Internet Explorer DOS Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0379.html"
},
{
"name": "19092",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19092"
},
{
"name": "1683",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1683"
},
{
"name" : "ie-wininet-dos(27900)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27900"
}
]
}

View File

@ -53,20 +53,15 @@
"references": {
"reference_data": [
{
"name" : "20061014 patchlodel-0.7.3 - Remote File Include Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=116104206220783&w=2"
"name": "ADV-2006-4082",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4082"
},
{
"name": "20551",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20551"
},
{
"name" : "ADV-2006-4082",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4082"
},
{
"name": "22429",
"refsource": "SECUNIA",
@ -76,6 +71,11 @@
"name": "patchlodel-calcul-file-include(29606)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29606"
},
{
"name": "20061014 patchlodel-0.7.3 - Remote File Include Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=116104206220783&w=2"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2006-5993",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-0240",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-0476",
"STATE": "PUBLIC"
},
@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "MS10-020",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-020"
},
{
"name" : "TA10-103A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-103A.html"
},
{
"name": "39336",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39336"
},
{
"name": "39372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39372"
},
{
"name": "MS10-020",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-020"
},
{
"name": "oval:org.mitre.oval:def:6918",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6918"
},
{
"name" : "39372",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39372"
"name": "TA10-103A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-103A.html"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "40375",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40375"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/1060/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/mac/1060/"
},
{
"name" : "http://www.opera.com/docs/changelogs/windows/1060/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/windows/1060/"
},
{
"name" : "http://www.opera.com/support/search/view/957/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/support/search/view/957/"
},
{
"name": "oval:org.mitre.oval:def:11856",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11856"
},
{
"name" : "40375",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40375"
"name": "http://www.opera.com/support/search/view/957/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/support/search/view/957/"
},
{
"name": "ADV-2010-1664",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1664"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1060/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1060/"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://barnowl.mit.edu/wiki/release-notes/1.6.2",
"refsource" : "CONFIRM",
"url" : "http://barnowl.mit.edu/wiki/release-notes/1.6.2"
},
{
"name": "http://github.com/barnowl/barnowl/blob/barnowl-1.6.2/ChangeLog",
"refsource": "CONFIRM",
"url": "http://github.com/barnowl/barnowl/blob/barnowl-1.6.2/ChangeLog"
},
{
"name": "http://barnowl.mit.edu/wiki/release-notes/1.6.2",
"refsource": "CONFIRM",
"url": "http://barnowl.mit.edu/wiki/release-notes/1.6.2"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2010-3334",
"STATE": "PUBLIC"
},
@ -52,11 +52,41 @@
},
"references": {
"reference_data": [
{
"name": "1024705",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024705"
},
{
"name": "oval:org.mitre.oval:def:11439",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11439"
},
{
"name": "42144",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42144"
},
{
"name": "20101109 Secunia Research: Microsoft Office Drawing Shape Container Parsing Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/514699/100/0/threaded"
},
{
"name": "38521",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38521"
},
{
"name": "ADV-2010-2923",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2923"
},
{
"name": "44656",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/44656"
},
{
"name": "http://secunia.com/secunia_research/2010-4/",
"refsource": "MISC",
@ -71,36 +101,6 @@
"name": "TA10-313A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-313A.html"
},
{
"name" : "44656",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/44656"
},
{
"name" : "oval:org.mitre.oval:def:11439",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11439"
},
{
"name" : "1024705",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024705"
},
{
"name" : "38521",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38521"
},
{
"name" : "42144",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42144"
},
{
"name" : "ADV-2010-2923",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2923"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3704",
"STATE": "PUBLIC"
},
@ -52,180 +52,120 @@
},
"references": {
"reference_data": [
{
"name": "FEDORA-2010-16662",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html"
},
{
"name": "[oss-security] 20101004 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/10/04/6"
},
{
"name" : "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch",
"refsource" : "CONFIRM",
"url" : "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch"
},
{
"name" : "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473",
"refsource" : "CONFIRM",
"url" : "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=638960",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=638960"
},
{
"name" : "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html",
"refsource" : "CONFIRM",
"url" : "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html"
},
{
"name" : "DSA-2119",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2119"
},
{
"name" : "DSA-2135",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2135"
},
{
"name": "FEDORA-2010-15857",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html"
},
{
"name" : "FEDORA-2010-15911",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html"
},
{
"name" : "FEDORA-2010-15981",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html"
},
{
"name" : "FEDORA-2010-16662",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html"
},
{
"name" : "FEDORA-2010-16705",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html"
},
{
"name" : "FEDORA-2010-16744",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html"
},
{
"name" : "MDVSA-2010:228",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228"
},
{
"name" : "MDVSA-2010:229",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229"
},
{
"name" : "MDVSA-2010:230",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230"
},
{
"name" : "MDVSA-2010:231",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231"
},
{
"name" : "MDVSA-2012:144",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
},
{
"name" : "RHSA-2010:0749",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0749.html"
},
{
"name" : "RHSA-2010:0751",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0751.html"
},
{
"name" : "RHSA-2010:0752",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0752.html"
},
{
"name" : "RHSA-2010:0753",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0753.html"
},
{
"name": "RHSA-2010:0859",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html"
},
{
"name" : "RHSA-2012:1201",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
},
{
"name" : "SSA:2010-324-01",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720"
},
{
"name" : "SUSE-SR:2010:022",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"
},
{
"name" : "SUSE-SR:2010:024",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name" : "USN-1005-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1005-1"
},
{
"name" : "43841",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/43841"
},
{
"name" : "42141",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42141"
},
{
"name" : "42397",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42397"
},
{
"name": "42357",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42357"
},
{
"name" : "42691",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/42691"
"name": "MDVSA-2010:228",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228"
},
{
"name" : "43079",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43079"
},
{
"name" : "ADV-2010-2897",
"name": "ADV-2011-0230",
"refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/2897"
"url": "http://www.vupen.com/english/advisories/2011/0230"
},
{
"name": "RHSA-2010:0752",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html"
},
{
"name": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html",
"refsource": "CONFIRM",
"url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=638960",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960"
},
{
"name": "MDVSA-2010:230",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230"
},
{
"name": "SUSE-SR:2010:022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"
},
{
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473",
"refsource": "CONFIRM",
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473"
},
{
"name": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch",
"refsource": "CONFIRM",
"url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch"
},
{
"name": "RHSA-2012:1201",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
},
{
"name": "MDVSA-2010:231",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231"
},
{
"name": "FEDORA-2010-16705",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html"
},
{
"name": "SSA:2010-324-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720"
},
{
"name": "RHSA-2010:0751",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html"
},
{
"name": "42397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42397"
},
{
"name": "42141",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42141"
},
{
"name": "FEDORA-2010-15911",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html"
},
{
"name": "MDVSA-2012:144",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
},
{
"name": "ADV-2010-3097",
@ -233,9 +173,69 @@
"url": "http://www.vupen.com/english/advisories/2010/3097"
},
{
"name" : "ADV-2011-0230",
"name": "USN-1005-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1005-1"
},
{
"name": "RHSA-2010:0749",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html"
},
{
"name": "FEDORA-2010-15981",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html"
},
{
"name": "FEDORA-2010-16744",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html"
},
{
"name": "ADV-2010-2897",
"refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0230"
"url": "http://www.vupen.com/english/advisories/2010/2897"
},
{
"name": "42691",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42691"
},
{
"name": "DSA-2119",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2119"
},
{
"name": "SUSE-SR:2010:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
},
{
"name": "MDVSA-2010:229",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229"
},
{
"name": "43841",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43841"
},
{
"name": "DSA-2135",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2135"
},
{
"name": "RHSA-2010:0753",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html"
},
{
"name": "43079",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43079"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3849",
"STATE": "PUBLIC"
},
@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20101207 Linux kernel exploit",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html"
},
{
"name" : "[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2010/11/30/1"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fa0e846494792e722d817b9d3d625a4ef4896c96",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fa0e846494792e722d817b9d3d625a4ef4896c96"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
"name": "43056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43056"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=644156",
@ -78,9 +63,29 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=644156"
},
{
"name" : "DSA-2126",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2126"
"name": "20101207 Linux kernel exploit",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html"
},
{
"name": "SUSE-SA:2011:007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/30/1"
},
{
"name": "ADV-2011-0298",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
},
{
"name": "MDVSA-2010:257",
@ -93,14 +98,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html"
},
{
"name" : "SUSE-SA:2011:007",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name" : "SUSE-SA:2011:008",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
"name": "ADV-2011-0375",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"name": "USN-1023-1",
@ -108,9 +108,9 @@
"url": "http://www.ubuntu.com/usn/USN-1023-1"
},
{
"name" : "43056",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43056"
"name": "SUSE-SA:2011:008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"name": "43291",
@ -123,14 +123,14 @@
"url": "http://www.vupen.com/english/advisories/2011/0213"
},
{
"name" : "ADV-2011-0298",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0298"
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fa0e846494792e722d817b9d3d625a4ef4896c96",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fa0e846494792e722d817b9d3d625a4ef4896c96"
},
{
"name" : "ADV-2011-0375",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0375"
"name": "DSA-2126",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2126"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-4009",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT4447",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4447"
},
{
"name" : "http://support.apple.com/kb/HT4581",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4581"
},
{
"name": "APPLE-SA-2010-12-07-1",
"refsource": "APPLE",
@ -77,10 +67,20 @@
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16218"
},
{
"name": "http://support.apple.com/kb/HT4447",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4447"
},
{
"name": "1024830",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024830"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2010-4134",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "15646",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/15646"
"name": "http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226",
"refsource": "CONFIRM",
"url": "http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226"
},
{
"name": "45115",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45115"
},
{
"name": "http://packetstormsecurity.org/files/view/96230/dynpg-lfisqldisclose.txt",
@ -67,20 +72,15 @@
"refsource": "MISC",
"url": "http://www.htbridge.ch/advisory/sql_injection_in_dynpg.html"
},
{
"name" : "http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226",
"refsource" : "CONFIRM",
"url" : "http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226"
},
{
"name" : "45115",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/45115"
},
{
"name": "69631",
"refsource": "OSVDB",
"url": "http://osvdb.org/69631"
},
{
"name": "15646",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15646"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-3371",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140514 CVE request: Pyplate multiple vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/05/14/3"
},
{
"name": "[oss-security] 20140523 Re: CVE request: Pyplate multiple vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/05/23/1"
},
{
"name": "[oss-security] 20140514 CVE request: Pyplate multiple vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/05/14/3"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "33804",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/33804"
},
{
"name" : "http://packetstormsecurity.com/files/127133/Ubisoft-Rayman-Legends-1.2.103716-Buffer-Overflow.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/127133/Ubisoft-Rayman-Legends-1.2.103716-Buffer-Overflow.html"
},
{
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5187.php",
"refsource": "MISC",
@ -71,6 +61,16 @@
"name": "68080",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68080"
},
{
"name": "33804",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/33804"
},
{
"name": "http://packetstormsecurity.com/files/127133/Ubisoft-Rayman-Legends-1.2.103716-Buffer-Overflow.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127133/Ubisoft-Rayman-Legends-1.2.103716-Buffer-Overflow.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-4398",
"STATE": "PUBLIC"
},
@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=32",
"refsource" : "MISC",
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=32"
},
{
"name" : "http://support.apple.com/kb/HT6443",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6443"
"name": "macosx-cve20144398-code-exec(96058)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96058"
},
{
"name": "69894",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69894"
},
{
"name": "https://code.google.com/p/google-security-research/issues/detail?id=32",
"refsource": "MISC",
"url": "https://code.google.com/p/google-security-research/issues/detail?id=32"
},
{
"name": "1030868",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030868"
},
{
"name" : "macosx-cve20144398-code-exec(96058)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/96058"
"name": "http://support.apple.com/kb/HT6443",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6443"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-4867",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-8374",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2014-8451",
"STATE": "PUBLIC"
},

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "35129",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/35129"
},
{
"name": "http://packetstormsecurity.com/files/129102/Whos-Who-Script-Cross-Site-Request-Forgery.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/129102/Whos-Who-Script-Cross-Site-Request-Forgery.html"
},
{
"name": "35129",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/35129"
},
{
"name": "whoswhoscript-multiple-csrf(98631)",
"refsource": "XF",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-14-402/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-14-402/"
},
{
"name": "http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html",
"refsource": "CONFIRM",
"url": "http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-14-402/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-14-402/"
}
]
}

View File

@ -52,11 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "62101",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62101"
},
{
"name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q4/867"
},
{
"name": "https://www.mantisbt.org/bugs/view.php?id=17874",
"refsource": "CONFIRM",
"url": "https://www.mantisbt.org/bugs/view.php?id=17874"
},
{
"name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT",
"refsource": "MLIST",
@ -72,20 +82,10 @@
"refsource": "CONFIRM",
"url": "https://github.com/mantisbt/mantisbt/commit/9fb8cf36f"
},
{
"name" : "https://www.mantisbt.org/bugs/view.php?id=17874",
"refsource" : "CONFIRM",
"url" : "https://www.mantisbt.org/bugs/view.php?id=17874"
},
{
"name": "DSA-3120",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3120"
},
{
"name" : "62101",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62101"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "61396",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61396"
},
{
"name": "20141224 Reflecting XSS Vulnerability in CMS Contenido 4.9.x-4.9.5",
"refsource": "BUGTRAQ",
@ -72,20 +77,15 @@
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/129713/CMS-Contenido-4.9.5-Cross-Site-Scripting.html"
},
{
"name" : "http://www.contenido.org/de/cms/CONTENIDO/News/index-c-2044-3.html",
"refsource" : "CONFIRM",
"url" : "http://www.contenido.org/de/cms/CONTENIDO/News/index-c-2044-3.html"
},
{
"name" : "61396",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/61396"
},
{
"name": "contenido-frontcontent-xss(99497)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99497"
},
{
"name": "http://www.contenido.org/de/cms/CONTENIDO/News/index-c-2044-3.html",
"refsource": "CONFIRM",
"url": "http://www.contenido.org/de/cms/CONTENIDO/News/index-c-2044-3.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@suse.com",
"ID": "CVE-2014-9770",
"STATE": "PUBLIC"
},
@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160408 CVE Request: systemd / journald created world readable journal files",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/04/08/14"
},
{
"name": "[oss-security] 20160408 Re: CVE Request: systemd / journald created world readable journal files",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/08/15"
},
{
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=972612",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=972612"
"name": "[oss-security] 20160408 CVE Request: systemd / journald created world readable journal files",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/08/14"
},
{
"name": "openSUSE-SU-2016:1414",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html"
},
{
"name": "openSUSE-SU-2016:1101",
@ -73,9 +73,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html"
},
{
"name" : "openSUSE-SU-2016:1414",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html"
"name": "https://bugzilla.suse.com/show_bug.cgi?id=972612",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=972612"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2014-9867",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-08-01.html"
},
{
"name" : "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=322c518689a7f820165ca4c5d6b750b02ac34665",
"refsource" : "CONFIRM",
"url" : "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=322c518689a7f820165ca4c5d6b750b02ac34665"
},
{
"name": "92219",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92219"
},
{
"name": "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=322c518689a7f820165ca4c5d6b750b02ac34665",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=322c518689a7f820165ca4c5d6b750b02ac34665"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-2484",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://source.android.com/security/bulletin/2016-06-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-06-01.html"
},
{
"name": "https://android.googlesource.com/platform/frameworks/av/+/7cea5cb64b83d690fe02bc210bbdf08f5a87636f",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/7cea5cb64b83d690fe02bc210bbdf08f5a87636f"
},
{
"name": "http://source.android.com/security/bulletin/2016-06-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-06-01.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-2834",
"STATE": "PUBLIC"
},
@ -53,89 +53,89 @@
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-61.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-61.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1206283",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1206283"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1221620",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1221620"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1241034",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1241034"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1241037",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1241037"
},
{
"name" : "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes",
"refsource" : "CONFIRM",
"url" : "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "1036057",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036057"
},
{
"name": "DSA-3688",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3688"
},
{
"name" : "RHSA-2016:2779",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2779.html"
},
{
"name" : "openSUSE-SU-2016:1552",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html"
},
{
"name": "openSUSE-SU-2016:1557",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html"
},
{
"name" : "SUSE-SU-2016:1691",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html"
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241034",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241034"
},
{
"name" : "USN-2993-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2993-1"
"name": "RHSA-2016:2779",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2779.html"
},
{
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-61.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-61.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221620",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221620"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes",
"refsource": "CONFIRM",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes"
},
{
"name": "USN-3029-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3029-1"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206283",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206283"
},
{
"name": "91072",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91072"
},
{
"name" : "1036057",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036057"
"name": "openSUSE-SU-2016:1552",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html"
},
{
"name": "USN-2993-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2993-1"
},
{
"name": "SUSE-SU-2016:1691",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241037",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241037"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3114",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-3861",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "40354",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40354/"
"name": "https://android.googlesource.com/platform/frameworks/native/+/1f4b49e64adf4623eefda503bca61e253597b9bf",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/native/+/1f4b49e64adf4623eefda503bca61e253597b9bf"
},
{
"name": "http://source.android.com/security/bulletin/2016-09-01.html",
@ -67,30 +67,30 @@
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/3944c65637dfed14a5a895685edfa4bacaf9f76e"
},
{
"name" : "https://android.googlesource.com/platform/frameworks/base/+/866dc26ad4a98cc835d075b627326e7d7e52ffa1",
"refsource" : "CONFIRM",
"url" : "https://android.googlesource.com/platform/frameworks/base/+/866dc26ad4a98cc835d075b627326e7d7e52ffa1"
},
{
"name" : "https://android.googlesource.com/platform/frameworks/native/+/1f4b49e64adf4623eefda503bca61e253597b9bf",
"refsource" : "CONFIRM",
"url" : "https://android.googlesource.com/platform/frameworks/native/+/1f4b49e64adf4623eefda503bca61e253597b9bf"
},
{
"name": "https://android.googlesource.com/platform/system/core/+/ecf5fd58a8f50362ce9e8d4245a33d56f29f142b",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/system/core/+/ecf5fd58a8f50362ce9e8d4245a33d56f29f142b"
},
{
"name": "1036763",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036763"
},
{
"name": "92811",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92811"
},
{
"name" : "1036763",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036763"
"name": "https://android.googlesource.com/platform/frameworks/base/+/866dc26ad4a98cc835d075b627326e7d7e52ffa1",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/base/+/866dc26ad4a98cc835d075b627326e7d7e52ffa1"
},
{
"name": "40354",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40354/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2016-6161",
"STATE": "PUBLIC"
},
@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2016:2117",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html"
},
{
"name": "https://github.com/libgd/libgd/issues/209",
"refsource": "CONFIRM",
"url": "https://github.com/libgd/libgd/issues/209"
},
{
"name": "openSUSE-SU-2016:2363",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html"
},
{
"name": "[oss-security] 20160705 CVE Request: libgd: global out of bounds read when encoding gif from malformed input with gd2togif",
"refsource": "MLIST",
@ -62,26 +77,11 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/05/7"
},
{
"name" : "https://github.com/libgd/libgd/issues/209",
"refsource" : "CONFIRM",
"url" : "https://github.com/libgd/libgd/issues/209"
},
{
"name": "DSA-3619",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3619"
},
{
"name" : "openSUSE-SU-2016:2363",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html"
},
{
"name" : "openSUSE-SU-2016:2117",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html"
},
{
"name": "USN-3030-1",
"refsource": "UBUNTU",

View File

@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "[help-libidn] 20160720 Libidn 1.33 released",
"refsource" : "MLIST",
"url" : "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html"
},
{
"name" : "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/07/20/6"
},
{
"name": "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/21/4"
},
{
"name" : "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555",
"refsource" : "CONFIRM",
"url" : "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555"
},
{
"name" : "DSA-3658",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3658"
},
{
"name" : "openSUSE-SU-2016:1924",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html"
},
{
"name": "openSUSE-SU-2016:2135",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html"
},
{
"name" : "USN-3068-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3068-1"
"name": "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/20/6"
},
{
"name": "openSUSE-SU-2016:1924",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html"
},
{
"name": "92070",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92070"
},
{
"name": "DSA-3658",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3658"
},
{
"name": "[help-libidn] 20160720 Libidn 1.33 released",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html"
},
{
"name": "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555"
},
{
"name": "USN-3068-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3068-1"
}
]
}