"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:13:30 +00:00
parent e4363e647b
commit 10ca9882eb
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 5011 additions and 5011 deletions

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "HPSBUX9906-099",
"refsource" : "HP",
"url" : "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9906-099"
"name": "493",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/493"
},
{
"name": "J-050",
@ -63,9 +63,9 @@
"url": "http://www.ciac.org/ciac/bulletins/j-050.shtml"
},
{
"name" : "493",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/493"
"name": "HPSBUX9906-099",
"refsource": "HP",
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9906-099"
}
]
}

View File

@ -53,13 +53,13 @@
"references": {
"reference_data": [
{
"name" : "19970915 Vulnerability in I/O Signal Handling",
"refsource" : "OPENBSD",
"name": "http://www.openbsd.com/advisories/signals.txt",
"refsource": "MISC",
"url": "http://www.openbsd.com/advisories/signals.txt"
},
{
"name" : "http://www.openbsd.com/advisories/signals.txt",
"refsource" : "MISC",
"name": "19970915 Vulnerability in I/O Signal Handling",
"refsource": "OPENBSD",
"url": "http://www.openbsd.com/advisories/signals.txt"
},
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "19980408 Re: AppleShare IP Mail Server",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/8951"
},
{
"name": "62",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/62"
},
{
"name": "19980408 Re: AppleShare IP Mail Server",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/8951"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20000308 [SAFER 000309.EXP.1.4] StarScheduler (StarOffice) vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-03/0063.html"
},
{
"name": "1039",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1039"
},
{
"name": "20000308 [SAFER 000309.EXP.1.4] StarScheduler (StarOffice) vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-03/0063.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "MS00-026",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-026"
},
{
"name": "1145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1145"
},
{
"name": "MS00-026",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-026"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "19990606 RedHat 6.0, /dev/pts permissions bug when using xterm",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=92877527701347&w=2"
"name": "RHSA1999014_01",
"refsource": "REDHAT",
"url": "http://www.redhat.com/corp/support/errata/RHSA1999014_01.html"
},
{
"name": "19990607 Re: RedHat 6.0, /dev/pts permissions bug when using xterm",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=92886009012161&w=2"
},
{
"name" : "RHSA1999014_01",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/corp/support/errata/RHSA1999014_01.html"
},
{
"name": "309",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/309"
},
{
"name": "19990606 RedHat 6.0, /dev/pts permissions bug when using xterm",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=92877527701347&w=2"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20050826 Simple PHP Blog File Upload and User Credentials Exposure Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=112511159821143&w=2"
"name": "simple-php-uploadimgcgi-file-upload(22012)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22012"
},
{
"name": "14667",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14667"
},
{
"name": "20050826 Simple PHP Blog File Upload and User Credentials Exposure Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112511159821143&w=2"
},
{
"name": "16598",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16598/"
},
{
"name" : "simple-php-uploadimgcgi-file-upload(22012)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22012"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20070223 Firefox: onUnload tailgating (MSIE7 entrapment bug variant)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/461007/100/0/threaded"
},
{
"name" : "20070223 MSIE7 browser entrapment vulnerability (probably Firefox, too)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/461023/100/0/threaded"
},
{
"name" : "20071029 FLEA-2007-0062-1 firefox",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482925/100/0/threaded"
"name": "FEDORA-2007-2601",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html"
},
{
"name": "20071026 rPSA-2007-0225-1 firefox",
@ -73,244 +63,44 @@
"url": "http://www.securityfocus.com/archive/1/482876/100/200/threaded"
},
{
"name" : "20071029 rPSA-2007-0225-2 firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482932/100/200/threaded"
},
{
"name" : "20070223 MSIE7 browser entrapment vulnerability (probably Firefox, too)",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052630.html"
"name": "2310",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2310"
},
{
"name": "http://lcamtuf.coredump.cx/ietrap/ff/",
"refsource": "MISC",
"url": "http://lcamtuf.coredump.cx/ietrap/ff/"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=371360",
"refsource" : "MISC",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=371360"
},
{
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-30.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2007/mfsa2007-30.html"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1858",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1858"
},
{
"name" : "http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html",
"refsource" : "CONFIRM",
"url" : "http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html"
},
{
"name" : "DSA-1396",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1396"
},
{
"name" : "DSA-1401",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1401"
},
{
"name" : "DSA-1392",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1392"
},
{
"name" : "FEDORA-2007-2601",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html"
},
{
"name" : "FEDORA-2007-2664",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html"
},
{
"name" : "FEDORA-2007-3431",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html"
},
{
"name" : "GLSA-200711-14",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200711-14.xml"
},
{
"name" : "HPSBUX02153",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name" : "SSRT061181",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name" : "MDKSA-2007:202",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202"
},
{
"name" : "RHSA-2007:0979",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0979.html"
},
{
"name" : "RHSA-2007:0980",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0980.html"
},
{
"name" : "RHSA-2007:0981",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0981.html"
},
{
"name" : "201516",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1"
},
{
"name" : "SUSE-SA:2007:057",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_57_mozilla.html"
},
{
"name" : "USN-535-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/535-1/"
},
{
"name" : "USN-536-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-536-1"
},
{
"name" : "22688",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22688"
},
{
"name" : "oval:org.mitre.oval:def:11665",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11665"
},
{
"name" : "ADV-2007-3544",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3544"
},
{
"name": "ADV-2007-3587",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3587"
},
{
"name" : "ADV-2008-0083",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name" : "33809",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/33809"
},
{
"name" : "1018837",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1018837"
},
{
"name" : "27276",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27276"
},
{
"name" : "27325",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27325"
},
{
"name" : "27327",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27327"
},
{
"name" : "27335",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27335"
},
{
"name" : "27356",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27356"
},
{
"name" : "27383",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27383"
},
{
"name" : "27425",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27425"
},
{
"name" : "27403",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27403"
},
{
"name" : "27480",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27480"
},
{
"name" : "27387",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27387"
},
{
"name" : "27298",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27298"
},
{
"name" : "27311",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27311"
},
{
"name" : "27315",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27315"
},
{
"name" : "27336",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27336"
},
{
"name" : "27665",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27665"
},
{
"name": "27414",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27414"
},
{
"name" : "27680",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27680"
"name": "20071029 FLEA-2007-0062-1 firefox",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482925/100/0/threaded"
},
{
"name": "https://issues.rpath.com/browse/RPL-1858",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1858"
},
{
"name": "20070223 MSIE7 browser entrapment vulnerability (probably Firefox, too)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/461023/100/0/threaded"
},
{
"name": "GLSA-200711-14",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200711-14.xml"
},
{
"name": "27360",
@ -318,24 +108,234 @@
"url": "http://secunia.com/advisories/27360"
},
{
"name" : "28398",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28398"
"name": "HPSBUX02153",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name" : "2310",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2310"
"name": "27298",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27298"
},
{
"name": "27315",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27315"
},
{
"name": "1018837",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018837"
},
{
"name": "oval:org.mitre.oval:def:11665",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11665"
},
{
"name": "27327",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27327"
},
{
"name": "ADV-2007-3544",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3544"
},
{
"name": "27276",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27276"
},
{
"name": "ie-mozilla-onunload-dos(32647)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32647"
},
{
"name": "USN-535-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/535-1/"
},
{
"name": "DSA-1401",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1401"
},
{
"name": "33809",
"refsource": "OSVDB",
"url": "http://osvdb.org/33809"
},
{
"name": "DSA-1392",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1392"
},
{
"name": "RHSA-2007:0980",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0980.html"
},
{
"name": "27383",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27383"
},
{
"name": "SUSE-SA:2007:057",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_57_mozilla.html"
},
{
"name": "27356",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27356"
},
{
"name": "RHSA-2007:0981",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0981.html"
},
{
"name": "ADV-2008-0083",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-30.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-30.html"
},
{
"name": "27387",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27387"
},
{
"name": "20070223 Firefox: onUnload tailgating (MSIE7 entrapment bug variant)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/461007/100/0/threaded"
},
{
"name": "FEDORA-2007-3431",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html"
},
{
"name": "27403",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27403"
},
{
"name": "ie-mozilla-onunload-url-spoofing(32649)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32649"
},
{
"name": "27336",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27336"
},
{
"name": "DSA-1396",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1396"
},
{
"name": "27425",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27425"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=371360",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=371360"
},
{
"name": "28398",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28398"
},
{
"name": "27311",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27311"
},
{
"name": "SSRT061181",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "27325",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27325"
},
{
"name": "MDKSA-2007:202",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202"
},
{
"name": "27665",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27665"
},
{
"name": "RHSA-2007:0979",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0979.html"
},
{
"name": "27335",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27335"
},
{
"name": "FEDORA-2007-2664",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html"
},
{
"name": "27480",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27480"
},
{
"name": "20070223 MSIE7 browser entrapment vulnerability (probably Firefox, too)",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052630.html"
},
{
"name": "27680",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27680"
},
{
"name": "22688",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22688"
},
{
"name": "http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html"
},
{
"name": "201516",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1"
},
{
"name": "20071029 rPSA-2007-0225-2 firefox thunderbird",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482932/100/200/threaded"
},
{
"name": "USN-536-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-536-1"
}
]
}

View File

@ -53,59 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20070402 APOP vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/464477/30/0/threaded"
"name": "25496",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25496"
},
{
"name" : "20070403 Re: APOP vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/464569/100/0/threaded"
},
{
"name" : "20070615 rPSA-2007-0122-1 evolution-data-server",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/471455/100/0/threaded"
},
{
"name" : "20070619 FLEA-2007-0026-1: evolution-data-server",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/471720/100/0/threaded"
},
{
"name" : "20070531 FLEA-2007-0023-1: firefox",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/470172/100/200/threaded"
},
{
"name" : "20070620 FLEA-2007-0027-1: thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/471842/100/0/threaded"
},
{
"name" : "[balsa-list] 20070704 balsa-2.3.17 released",
"refsource" : "MLIST",
"url" : "http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html"
},
{
"name" : "[oss-security] 20090815 mailfilter 0.8.2 fixes CVE-2007-1558 (APOP)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2009/08/15/1"
},
{
"name" : "[oss-security] 20090818 Re: CVE-2007-1558 update (was: mailfilter 0.8.2 fixes CVE-2007-1558 (APOP))",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2009/08/18/1"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=305530",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"name" : "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt",
"refsource" : "CONFIRM",
"url" : "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
"name": "25529",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25529"
},
{
"name": "http://sourceforge.net/forum/forum.php?forum_id=683706",
@ -113,175 +68,340 @@
"url": "http://sourceforge.net/forum/forum.php?forum_id=683706"
},
{
"name" : "http://sylpheed.sraoss.jp/en/news.html",
"name": "http://docs.info.apple.com/article.html?artnum=305530",
"refsource": "CONFIRM",
"url" : "http://sylpheed.sraoss.jp/en/news.html"
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"name": "http://www.claws-mail.org/news.php",
"refsource": "CONFIRM",
"url": "http://www.claws-mail.org/news.php"
},
{
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1424",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1424"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1232",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1232"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1231",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1231"
},
{
"name" : "http://balsa.gnome.org/download.html",
"refsource" : "CONFIRM",
"url" : "http://balsa.gnome.org/download.html"
},
{
"name" : "APPLE-SA-2007-05-24",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name" : "DSA-1300",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1300"
},
{
"name" : "DSA-1305",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1305"
},
{
"name" : "GLSA-200706-06",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200706-06.xml"
},
{
"name" : "HPSBUX02153",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name" : "HPSBUX02156",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name" : "SSRT061181",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name" : "SSRT061236",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name" : "MDKSA-2007:105",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:105"
},
{
"name": "MDKSA-2007:107",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:107"
},
{
"name" : "MDKSA-2007:113",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:113"
},
{
"name" : "MDKSA-2007:119",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:119"
},
{
"name" : "MDKSA-2007:131",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:131"
},
{
"name" : "RHSA-2007:0353",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0353.html"
},
{
"name" : "RHSA-2007:0344",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0344.html"
},
{
"name" : "RHSA-2007:0386",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0386.html"
},
{
"name" : "RHSA-2007:0385",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0385.html"
},
{
"name" : "RHSA-2007:0401",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0401.html"
},
{
"name" : "RHSA-2007:0402",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0402.html"
},
{
"name" : "RHSA-2009:1140",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1140.html"
},
{
"name" : "20070602-01-P",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
},
{
"name" : "SSA:2007-152-02",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.571857"
},
{
"name" : "SUSE-SA:2007:036",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_36_mozilla.html"
},
{
"name" : "SUSE-SR:2007:014",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
},
{
"name" : "2007-0019",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2007/0019/"
},
{
"name": "2007-0024",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0024/"
},
{
"name": "20070403 Re: APOP vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464569/100/0/threaded"
},
{
"name": "25894",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25894"
},
{
"name": "20070615 rPSA-2007-0122-1 evolution-data-server",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471455/100/0/threaded"
},
{
"name": "ADV-2007-1939",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name": "26083",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26083"
},
{
"name": "ADV-2007-1468",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1468"
},
{
"name": "RHSA-2009:1140",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1140.html"
},
{
"name": "HPSBUX02156",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name": "20070531 FLEA-2007-0023-1: firefox",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/470172/100/200/threaded"
},
{
"name": "26415",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26415"
},
{
"name": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt",
"refsource": "CONFIRM",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
},
{
"name": "[oss-security] 20090818 Re: CVE-2007-1558 update (was: mailfilter 0.8.2 fixes CVE-2007-1558 (APOP))",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/08/18/1"
},
{
"name": "APPLE-SA-2007-05-24",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name": "SUSE-SR:2007:014",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
},
{
"name": "25402",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25402"
},
{
"name": "HPSBUX02153",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "20070402 APOP vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464477/30/0/threaded"
},
{
"name": "SUSE-SA:2007:036",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_36_mozilla.html"
},
{
"name": "GLSA-200706-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200706-06.xml"
},
{
"name": "http://sylpheed.sraoss.jp/en/news.html",
"refsource": "CONFIRM",
"url": "http://sylpheed.sraoss.jp/en/news.html"
},
{
"name": "25534",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25534"
},
{
"name": "ADV-2007-1994",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1994"
},
{
"name": "SSA:2007-152-02",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.571857"
},
{
"name": "23257",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23257"
},
{
"name": "USN-469-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-469-1"
},
{
"name": "MDKSA-2007:131",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:131"
},
{
"name": "DSA-1305",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1305"
},
{
"name": "https://issues.rpath.com/browse/RPL-1231",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1231"
},
{
"name": "ADV-2007-1467",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1467"
},
{
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html"
},
{
"name": "ADV-2007-2788",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2788"
},
{
"name": "SSRT061236",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name": "https://issues.rpath.com/browse/RPL-1424",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1424"
},
{
"name": "25664",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25664"
},
{
"name": "MDKSA-2007:119",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:119"
},
{
"name": "25546",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25546"
},
{
"name": "RHSA-2007:0353",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0353.html"
},
{
"name": "RHSA-2007:0385",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0385.html"
},
{
"name": "25858",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25858"
},
{
"name": "25798",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25798"
},
{
"name": "25353",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25353"
},
{
"name": "ADV-2008-0082",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0082"
},
{
"name": "[oss-security] 20090815 mailfilter 0.8.2 fixes CVE-2007-1558 (APOP)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/08/15/1"
},
{
"name": "RHSA-2007:0401",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0401.html"
},
{
"name": "2007-0019",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0019/"
},
{
"name": "25476",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25476"
},
{
"name": "35699",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35699"
},
{
"name": "MDKSA-2007:113",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:113"
},
{
"name": "[balsa-list] 20070704 balsa-2.3.17 released",
"refsource": "MLIST",
"url": "http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html"
},
{
"name": "SSRT061181",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "MDKSA-2007:105",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:105"
},
{
"name": "RHSA-2007:0386",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html"
},
{
"name": "https://issues.rpath.com/browse/RPL-1232",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1232"
},
{
"name": "25750",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25750"
},
{
"name": "20070619 FLEA-2007-0026-1: evolution-data-server",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471720/100/0/threaded"
},
{
"name": "DSA-1300",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1300"
},
{
"name": "25559",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25559"
},
{
"name": "ADV-2007-1466",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1466"
},
{
"name": "1018008",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018008"
},
{
"name": "oval:org.mitre.oval:def:9782",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782"
},
{
"name": "20070602-01-P",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
},
{
"name": "RHSA-2007:0402",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0402.html"
},
{
"name": "ADV-2007-1480",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1480"
},
{
"name": "USN-520-1",
"refsource": "UBUNTU",
@ -293,139 +413,19 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA07-151A.html"
},
{
"name" : "23257",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23257"
"name": "RHSA-2007:0344",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0344.html"
},
{
"name" : "oval:org.mitre.oval:def:9782",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782"
"name": "20070620 FLEA-2007-0027-1: thunderbird",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471842/100/0/threaded"
},
{
"name" : "35699",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35699"
},
{
"name" : "ADV-2007-1466",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1466"
},
{
"name" : "ADV-2007-1467",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1467"
},
{
"name" : "ADV-2007-1468",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1468"
},
{
"name" : "ADV-2007-1480",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1480"
},
{
"name" : "ADV-2007-1939",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name" : "ADV-2007-1994",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1994"
},
{
"name" : "ADV-2007-2788",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2788"
},
{
"name" : "ADV-2008-0082",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0082"
},
{
"name" : "1018008",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018008"
},
{
"name" : "25353",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25353"
},
{
"name" : "25402",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25402"
},
{
"name" : "25476",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25476"
},
{
"name" : "25529",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25529"
},
{
"name" : "25546",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25546"
},
{
"name" : "25496",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25496"
},
{
"name" : "25559",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25559"
},
{
"name" : "25534",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25534"
},
{
"name" : "25664",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25664"
},
{
"name" : "25750",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25750"
},
{
"name" : "25798",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25798"
},
{
"name" : "25894",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25894"
},
{
"name" : "26083",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26083"
},
{
"name" : "26415",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26415"
},
{
"name" : "25858",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25858"
"name": "http://balsa.gnome.org/download.html",
"refsource": "CONFIRM",
"url": "http://balsa.gnome.org/download.html"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/462963/100/0/threaded"
},
{
"name": "24503",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24503"
},
{
"name": "http://www.vbulletin.com/forum/project.php?issueid=21615",
"refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "34070",
"refsource": "OSVDB",
"url": "http://osvdb.org/34070"
},
{
"name" : "24503",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24503"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26026"
},
{
"name" : "37879",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/37879"
},
{
"name": "pindorama-client-file-include(37179)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37179"
},
{
"name": "37879",
"refsource": "OSVDB",
"url": "http://osvdb.org/37879"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-5501",
"STATE": "PUBLIC"
},
@ -52,30 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[linux-kernel] 20071116 Linux 2.6.23.8",
"refsource" : "MLIST",
"url" : "http://lwn.net/Articles/258947/"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=96a2d41a3e495734b63bff4e5dd0112741b93b38",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=96a2d41a3e495734b63bff4e5dd0112741b93b38"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.8",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.8"
"name": "[linux-kernel] 20071116 Linux 2.6.23.8",
"refsource": "MLIST",
"url": "http://lwn.net/Articles/258947/"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.24-rc3",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.24-rc3"
"name": "27922",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27922"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1965",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1965"
"name": "27703",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27703"
},
{
"name": "FEDORA-2007-3751",
@ -83,14 +78,34 @@
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00170.html"
},
{
"name" : "FEDORA-2007-3837",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00032.html"
"name": "27919",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27919"
},
{
"name" : "FEDORA-2007-759",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00302.html"
"name": "28706",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28706"
},
{
"name": "SUSE-SA:2008:013",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"name": "linux-kernel-tcpsacktagwritequeue-dos(38548)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38548"
},
{
"name": "27664",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27664"
},
{
"name": "26474",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26474"
},
{
"name": "MDVSA-2008:044",
@ -103,59 +118,39 @@
"url": "http://www.novell.com/linux/security/advisories/2007_63_kernel.html"
},
{
"name" : "SUSE-SA:2008:013",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
"name": "29245",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29245"
},
{
"name" : "USN-574-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-574-1"
"name": "https://issues.rpath.com/browse/RPL-1965",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1965"
},
{
"name": "USN-558-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-558-1"
},
{
"name" : "26474",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26474"
},
{
"name": "ADV-2007-3902",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3902"
},
{
"name" : "27664",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27664"
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.24-rc3",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.24-rc3"
},
{
"name" : "27703",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27703"
"name": "USN-574-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-574-1"
},
{
"name" : "27888",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27888"
},
{
"name" : "27919",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27919"
},
{
"name" : "27922",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/27922"
},
{
"name" : "28706",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28706"
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.8",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.8"
},
{
"name": "28170",
@ -163,14 +158,19 @@
"url": "http://secunia.com/advisories/28170"
},
{
"name" : "29245",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29245"
"name": "FEDORA-2007-759",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00302.html"
},
{
"name" : "linux-kernel-tcpsacktagwritequeue-dos(38548)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38548"
"name": "FEDORA-2007-3837",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00032.html"
},
{
"name": "27888",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27888"
}
]
}

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "20071018 Nortel IP Phone forced re-authentication",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482481/100/0/threaded"
},
{
"name" : "http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_forced_re-authentication_v1.0.txt",
"refsource" : "MISC",
"url" : "http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_forced_re-authentication_v1.0.txt"
},
{
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654641",
"refsource": "CONFIRM",
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654641"
},
{
"name" : "26124",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26124"
},
{
"name" : "41772",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/41772"
},
{
"name": "27234",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27234"
},
{
"name": "nortel-ipphone-register-dos(37254)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37254"
},
{
"name": "41772",
"refsource": "OSVDB",
"url": "http://osvdb.org/41772"
},
{
"name": "3274",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3274"
},
{
"name" : "nortel-ipphone-register-dos(37254)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37254"
"name": "http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_forced_re-authentication_v1.0.txt",
"refsource": "MISC",
"url": "http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_forced_re-authentication_v1.0.txt"
},
{
"name": "20071018 Nortel IP Phone forced re-authentication",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482481/100/0/threaded"
},
{
"name": "26124",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26124"
}
]
}

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "103101",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103101-1"
},
{
"name": "201252",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201252-1"
},
{
"name" : "26224",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26224"
},
{
"name" : "ADV-2007-3633",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/3633"
},
{
"name" : "40815",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/40815"
},
{
"name" : "1018867",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1018867"
},
{
"name": "27428",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27428"
},
{
"name": "ADV-2007-3633",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3633"
},
{
"name": "solaris-sctp-init-dos(38126)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38126"
},
{
"name": "1018867",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018867"
},
{
"name": "26224",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26224"
},
{
"name": "40815",
"refsource": "OSVDB",
"url": "http://osvdb.org/40815"
},
{
"name": "103101",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103101-1"
}
]
}

View File

@ -52,11 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "35546",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35546"
},
{
"name": "[or-announce] 20090625 Tor 0.2.0.35 is released",
"refsource": "MLIST",
"url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html"
},
{
"name": "tor-connectionedge-spoofing(51377)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51377"
},
{
"name": "ADV-2009-1716",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1716"
},
{
"name": "35505",
"refsource": "BID",
@ -66,21 +81,6 @@
"name": "55341",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/55341"
},
{
"name" : "35546",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35546"
},
{
"name" : "ADV-2009-1716",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/1716"
},
{
"name" : "tor-connectionedge-spoofing(51377)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51377"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-3077",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html"
},
{
"name" : "GLSA-201505-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201505-02"
},
{
"name" : "RHSA-2015:1005",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1005.html"
"name": "1032285",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032285"
},
{
"name": "SUSE-SU-2015:0878",
@ -78,9 +68,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html"
},
{
"name" : "openSUSE-SU-2015:0914",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html"
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html"
},
{
"name": "GLSA-201505-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201505-02"
},
{
"name": "74614",
@ -88,9 +83,14 @@
"url": "http://www.securityfocus.com/bid/74614"
},
{
"name" : "1032285",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032285"
"name": "openSUSE-SU-2015:0914",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html"
},
{
"name": "RHSA-2015:1005",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/",
"refsource" : "MISC",
"url" : "http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/"
"name": "74420",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74420"
},
{
"name": "http://magento.com/blog/technical/critical-security-advisory-remote-code-execution-rce-vulnerability",
"refsource": "CONFIRM",
"url": "http://magento.com/blog/technical/critical-security-advisory-remote-code-execution-rce-vulnerability"
},
{
"name" : "74420",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/74420"
},
{
"name": "1032230",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032230"
},
{
"name": "http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/",
"refsource": "MISC",
"url": "http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-3966",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-03",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-03"
},
{
"name": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20150714_001_en.pdf",
"refsource": "CONFIRM",
"url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20150714_001_en.pdf"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-03",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-03"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37666/"
},
{
"name" : "20151231 Joomla! plugin Helpdesk Pro < 1.4.0",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Jul/102"
},
{
"name": "http://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html",
"refsource": "MISC",
@ -71,6 +66,11 @@
"name": "75971",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75971"
},
{
"name": "20151231 Joomla! plugin Helpdesk Pro < 1.4.0",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jul/102"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4278",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-7510",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1284642",
"name": "https://github.com/systemd/systemd/issues/2002",
"refsource": "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1284642"
"url": "https://github.com/systemd/systemd/issues/2002"
},
{
"name": "https://github.com/keszybz/systemd/commit/cb31827d62066a04b02111df3052949fda4b6888",
@ -63,9 +63,9 @@
"url": "https://github.com/keszybz/systemd/commit/cb31827d62066a04b02111df3052949fda4b6888"
},
{
"name" : "https://github.com/systemd/systemd/issues/2002",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1284642",
"refsource": "CONFIRM",
"url" : "https://github.com/systemd/systemd/issues/2002"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284642"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-7570",
"STATE": "PUBLIC"
},
@ -62,15 +62,15 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39436/"
},
{
"name" : "20160210 SEC Consult SA-20160210-0 :: Yeager CMS Multiple Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2016/Feb/44"
},
{
"name": "http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html"
},
{
"name": "20160210 SEC Consult SA-20160210-0 :: Yeager CMS Multiple Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Feb/44"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-8277",
"STATE": "PUBLIC"
},
@ -52,11 +52,41 @@
},
"references": {
"reference_data": [
{
"name": "https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec129.pdf",
"refsource": "MISC",
"url": "https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec129.pdf"
},
{
"name": "http://securitymumblings.blogspot.com/2016/02/cve-2015-8277.html",
"refsource": "MISC",
"url": "http://securitymumblings.blogspot.com/2016/02/cve-2015-8277.html"
},
{
"name": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1073133",
"refsource": "CONFIRM",
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1073133"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-05",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-05"
},
{
"name": "1035266",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035266"
},
{
"name": "http://support.citrix.com/article/CTX207824",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX207824"
},
{
"name": "VU#485744",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/485744"
},
{
"name": "https://www.securifera.com/advisories/cve-2015-8277",
"refsource": "MISC",
@ -67,40 +97,10 @@
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-102-02"
},
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-05",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-05"
},
{
"name" : "https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec129.pdf",
"refsource" : "MISC",
"url" : "https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec129.pdf"
},
{
"name" : "http://support.citrix.com/article/CTX207824",
"refsource" : "CONFIRM",
"url" : "http://support.citrix.com/article/CTX207824"
},
{
"name" : "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1073133",
"refsource" : "CONFIRM",
"url" : "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1073133"
},
{
"name" : "VU#485744",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/485744"
},
{
"name": "83334",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/83334"
},
{
"name" : "1035266",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035266"
}
]
}

View File

@ -53,39 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20151121 Libxml2: Several out of bounds reads",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/11/21/1"
},
{
"name" : "[oss-security] 20151122 Re: Libxml2: Several out of bounds reads",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/11/22/3"
},
{
"name" : "https://blog.fuzzing-project.org/28-Libxml2-Several-out-of-bounds-reads.html",
"refsource" : "MISC",
"url" : "https://blog.fuzzing-project.org/28-Libxml2-Several-out-of-bounds-reads.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=751603",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=751603"
},
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=751631",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=751631"
"name": "openSUSE-SU-2016:0106",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1281930",
@ -93,64 +63,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281930"
},
{
"name" : "https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e",
"refsource" : "CONFIRM",
"url" : "https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e"
},
{
"name" : "https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c",
"refsource" : "CONFIRM",
"url" : "https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172"
},
{
"name" : "https://support.apple.com/HT206899",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206899"
},
{
"name" : "https://support.apple.com/HT206901",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206901"
},
{
"name" : "https://support.apple.com/HT206902",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206902"
},
{
"name" : "https://support.apple.com/HT206903",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206903"
},
{
"name" : "https://support.apple.com/HT206904",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206904"
},
{
"name" : "https://support.apple.com/HT206905",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206905"
},
{
"name" : "APPLE-SA-2016-07-18-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name" : "APPLE-SA-2016-07-18-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
},
{
"name" : "APPLE-SA-2016-07-18-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
"name": "DSA-3430",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3430"
},
{
"name": "APPLE-SA-2016-07-18-4",
@ -158,24 +73,19 @@
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
},
{
"name" : "APPLE-SA-2016-07-18-6",
"name": "APPLE-SA-2016-07-18-3",
"refsource": "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
},
{
"name" : "DSA-3430",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3430"
"name": "APPLE-SA-2016-07-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
},
{
"name" : "HPSBGN03537",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=145382616617563&w=2"
},
{
"name" : "RHSA-2015:2549",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2549.html"
"name": "https://support.apple.com/HT206901",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206901"
},
{
"name": "RHSA-2016:1089",
@ -183,34 +93,124 @@
"url": "http://rhn.redhat.com/errata/RHSA-2016-1089.html"
},
{
"name" : "openSUSE-SU-2015:2372",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html"
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=751603",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=751603"
},
{
"name" : "openSUSE-SU-2016:0106",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html"
"name": "https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c"
},
{
"name" : "USN-2834-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2834-1"
},
{
"name" : "77681",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/77681"
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name": "91826",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91826"
},
{
"name": "USN-2834-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2834-1"
},
{
"name": "APPLE-SA-2016-07-18-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name": "APPLE-SA-2016-07-18-6",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html"
},
{
"name": "1034243",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034243"
},
{
"name": "RHSA-2015:2549",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2549.html"
},
{
"name": "https://blog.fuzzing-project.org/28-Libxml2-Several-out-of-bounds-reads.html",
"refsource": "MISC",
"url": "https://blog.fuzzing-project.org/28-Libxml2-Several-out-of-bounds-reads.html"
},
{
"name": "HPSBGN03537",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=145382616617563&w=2"
},
{
"name": "https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e"
},
{
"name": "77681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77681"
},
{
"name": "[oss-security] 20151122 Re: Libxml2: Several out of bounds reads",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/11/22/3"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name": "[oss-security] 20151121 Libxml2: Several out of bounds reads",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/11/21/1"
},
{
"name": "openSUSE-SU-2015:2372",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html"
},
{
"name": "https://support.apple.com/HT206905",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206905"
},
{
"name": "https://support.apple.com/HT206903",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206903"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=751631",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=751631"
},
{
"name": "https://support.apple.com/HT206902",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206902"
},
{
"name": "https://support.apple.com/HT206904",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206904"
},
{
"name": "https://support.apple.com/HT206899",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206899"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-8421",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "39045",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39045/"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
"name": "openSUSE-SU-2015:2239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
@ -73,39 +63,49 @@
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource": "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name" : "GLSA-201601-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201601-03"
},
{
"name" : "SUSE-SU-2015:2236",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html"
},
{
"name" : "SUSE-SU-2015:2247",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
},
{
"name" : "openSUSE-SU-2015:2239",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
},
{
"name": "78715",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/78715"
},
{
"name": "SUSE-SU-2015:2236",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "SUSE-SU-2015:2247",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
},
{
"name": "1034318",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034318"
},
{
"name": "39045",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39045/"
},
{
"name": "GLSA-201601-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-03"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8532",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,25 +57,25 @@
"refsource": "MLIST",
"url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html"
},
{
"name" : "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/12/21/8"
},
{
"name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/12/23/7"
},
{
"name" : "https://gerrit.wikimedia.org/r/#/c/156336/5/includes/User.php",
"refsource" : "CONFIRM",
"url" : "https://gerrit.wikimedia.org/r/#/c/156336/5/includes/User.php"
},
{
"name": "https://phabricator.wikimedia.org/T119309",
"refsource": "CONFIRM",
"url": "https://phabricator.wikimedia.org/T119309"
},
{
"name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/12/21/8"
},
{
"name": "https://gerrit.wikimedia.org/r/#/c/156336/5/includes/User.php",
"refsource": "CONFIRM",
"url": "https://gerrit.wikimedia.org/r/#/c/156336/5/includes/User.php"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1473",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_default_snmp.pdf",
"refsource" : "MISC",
"url" : "http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_default_snmp.pdf"
},
{
"name": "20160831 Cisco Small Business 220 Series Smart Plus Switches SNMP Unauthorized Access Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-sps3"
},
{
"name" : "92710",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92710"
},
{
"name": "1036711",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036711"
},
{
"name": "http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_default_snmp.pdf",
"refsource": "MISC",
"url": "http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_default_snmp.pdf"
},
{
"name": "92710",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92710"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1835",
"STATE": "PUBLIC"
},
@ -52,65 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT206567",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206567"
},
{
"name" : "https://support.apple.com/HT206568",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT206568"
},
{
"name" : "http://xmlsoft.org/news.html",
"refsource" : "CONFIRM",
"url" : "http://xmlsoft.org/news.html"
},
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=759020",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=759020"
},
{
"name" : "https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb",
"refsource" : "CONFIRM",
"url" : "https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170"
},
{
"name" : "https://www.tenable.com/security/tns-2016-18",
"name": "RHSA-2016:1292",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1292"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "CONFIRM",
"url" : "https://www.tenable.com/security/tns-2016-18"
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name" : "APPLE-SA-2016-05-16-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html"
},
{
"name" : "APPLE-SA-2016-05-16-4",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
"name": "https://support.apple.com/HT206567",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206567"
},
{
"name": "DSA-3593",
@ -118,29 +83,64 @@
"url": "https://www.debian.org/security/2016/dsa-3593"
},
{
"name" : "RHSA-2016:1292",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1292"
"name": "http://xmlsoft.org/news.html",
"refsource": "CONFIRM",
"url": "http://xmlsoft.org/news.html"
},
{
"name" : "RHSA-2016:2957",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
"name": "APPLE-SA-2016-05-16-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
},
{
"name" : "USN-2994-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2994-1"
"name": "https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb"
},
{
"name": "90696",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90696"
},
{
"name": "USN-2994-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2994-1"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "https://www.tenable.com/security/tns-2016-18",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-18"
},
{
"name": "RHSA-2016:2957",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "1035890",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035890"
},
{
"name": "APPLE-SA-2016-05-16-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=759020",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=759020"
},
{
"name": "https://support.apple.com/HT206568",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206568"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-5008",
"STATE": "PUBLIC"
},
@ -52,36 +52,41 @@
},
"references": {
"reference_data": [
{
"name" : "http://security.libvirt.org/2016/0001.html",
"refsource" : "CONFIRM",
"url" : "http://security.libvirt.org/2016/0001.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1180092",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180092"
},
{
"name" : "DSA-3613",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3613"
},
{
"name": "FEDORA-2016-65cc608ebe",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZZMOMRXNPALA34XDF5NK363KDLAYSTL/"
},
{
"name": "DSA-3613",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3613"
},
{
"name": "91562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91562"
},
{
"name": "http://security.libvirt.org/2016/0001.html",
"refsource": "CONFIRM",
"url": "http://security.libvirt.org/2016/0001.html"
},
{
"name": "openSUSE-SU-2016:1810",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00055.html"
},
{
"name": "FEDORA-2016-7b7e16a39e",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QTQF6LXKEEMJG4VOOCIAPJAD6ACBYP4W/"
},
{
"name" : "RHSA-2016:2577",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2577.html"
},
{
"name": "openSUSE-SU-2016:1975",
"refsource": "SUSE",
@ -93,19 +98,14 @@
"url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00054.html"
},
{
"name" : "openSUSE-SU-2016:1810",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-07/msg00055.html"
"name": "RHSA-2016:2577",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2577.html"
},
{
"name": "USN-3576-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3576-1/"
},
{
"name" : "91562",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91562"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5466",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1036400",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036400"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "91970",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91970"
},
{
"name" : "1036400",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036400"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5472",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "1036404",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036404"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name" : "91787",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91787"
},
{
"name": "91871",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91871"
},
{
"name" : "1036404",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036404"
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5555",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5586",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "93729",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93729"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "1037038",
"refsource": "SECTRACK",

View File

@ -69,16 +69,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://launchpad.support.sap.com/#/notes/2610231",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2610231"
},
{
"name": "https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/",
"refsource": "CONFIRM",
"url": "https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/"
},
{
"name": "https://launchpad.support.sap.com/#/notes/2610231",
"refsource": "MISC",
"url": "https://launchpad.support.sap.com/#/notes/2610231"
},
{
"name": "104115",
"refsource": "BID",

View File

@ -58,15 +58,15 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name" : "102672",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102672"
},
{
"name": "1040214",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040214"
},
{
"name": "102672",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102672"
}
]
}

View File

@ -170,15 +170,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0599",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0599"
},
{
"name": "106925",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106925"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0599",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0599"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com",
"ASSIGNER": "security@google.com",
"ID": "CVE-2019-5758",
"STATE": "PUBLIC"
},
@ -54,19 +54,9 @@
"references": {
"reference_data": [
{
"name" : "https://crbug.com/913970",
"refsource" : "MISC",
"url" : "https://crbug.com/913970"
},
{
"name" : "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"refsource" : "CONFIRM",
"url" : "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"name" : "DSA-4395",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2019/dsa-4395"
"name": "106767",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106767"
},
{
"name": "RHSA-2019:0309",
@ -74,9 +64,19 @@
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
},
{
"name" : "106767",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/106767"
"name": "DSA-4395",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4395"
},
{
"name": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/913970",
"refsource": "MISC",
"url": "https://crbug.com/913970"
}
]
}