"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 06:26:01 +00:00
parent dc7e6662b1
commit 372e3bc965
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 3692 additions and 3692 deletions

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "80175",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/80175"
},
{ {
"name": "oval:org.mitre.oval:def:5743", "name": "oval:org.mitre.oval:def:5743",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5743" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5743"
},
{
"name": "80175",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/80175"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "19980401-01-P", "name": "sgi-pfdispaly(810)",
"refsource" : "SGI", "refsource": "XF",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/19980401-01-P" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/810"
}, },
{ {
"name": "I-041", "name": "I-041",
@ -73,9 +73,9 @@
"url": "http://www.osvdb.org/134" "url": "http://www.osvdb.org/134"
}, },
{ {
"name" : "sgi-pfdispaly(810)", "name": "19980401-01-P",
"refsource" : "XF", "refsource": "SGI",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/810" "url": "ftp://patches.sgi.com/support/free/security/advisories/19980401-01-P"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "19980408 SGI O2 ipx security issue",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=89217373930054&w=2"
},
{ {
"name": "19980501-01-P", "name": "19980501-01-P",
"refsource": "SGI", "refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/19980501-01-P2869" "url": "ftp://patches.sgi.com/support/free/security/advisories/19980501-01-P2869"
}, },
{
"name": "19980408 SGI O2 ipx security issue",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=89217373930054&w=2"
},
{ {
"name": "I-055", "name": "I-055",
"refsource": "CIAC", "refsource": "CIAC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-0001", "ID": "CVE-2007-0001",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=223129",
"refsource" : "MISC",
"url" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=223129"
},
{
"name" : "RHSA-2007:0085",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0085.html"
},
{
"name" : "22737",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22737"
},
{ {
"name": "33031", "name": "33031",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -77,15 +62,30 @@
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9560" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9560"
}, },
{
"name": "24300",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24300"
},
{
"name": "RHSA-2007:0085",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0085.html"
},
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=223129",
"refsource": "MISC",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=223129"
},
{ {
"name": "1017705", "name": "1017705",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017705" "url": "http://www.securitytracker.com/id?1017705"
}, },
{ {
"name" : "24300", "name": "22737",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/24300" "url": "http://www.securityfocus.com/bid/22737"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2007-0097",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0097"
},
{ {
"name": "3091", "name": "3091",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -63,19 +68,14 @@
"url": "http://www.securityfocus.com/bid/21914" "url": "http://www.securityfocus.com/bid/21914"
}, },
{ {
"name" : "ADV-2007-0097", "name": "l2j-statistik-index-file-include(31309)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2007/0097" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31309"
}, },
{ {
"name": "35914", "name": "35914",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/35914" "url": "http://osvdb.org/35914"
},
{
"name" : "l2j-statistik-index-file-include(31309)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31309"
} }
] ]
} }

View File

@ -52,31 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070107 @lex Guestbook <= 4.0.2 Remote Command Execution Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/456218/100/0/threaded"
},
{ {
"name": "http://acid-root.new.fr/poc/20070107.txt", "name": "http://acid-root.new.fr/poc/20070107.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://acid-root.new.fr/poc/20070107.txt" "url": "http://acid-root.new.fr/poc/20070107.txt"
}, },
{
"name" : "3103",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/3103"
},
{
"name" : "21926",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21926"
},
{
"name" : "ADV-2007-0137",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0137"
},
{ {
"name": "31707", "name": "31707",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -96,6 +76,26 @@
"name": "@lexguestbook-index-sql-injection(31393)", "name": "@lexguestbook-index-sql-injection(31393)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31393" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31393"
},
{
"name": "21926",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21926"
},
{
"name": "20070107 @lex Guestbook <= 4.0.2 Remote Command Execution Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456218/100/0/threaded"
},
{
"name": "3103",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3103"
},
{
"name": "ADV-2007-0137",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0137"
} }
] ]
} }

View File

@ -52,30 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "24966",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24966"
},
{ {
"name": "http://docs.info.apple.com/article.html?artnum=305391", "name": "http://docs.info.apple.com/article.html?artnum=305391",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305391" "url": "http://docs.info.apple.com/article.html?artnum=305391"
}, },
{
"name" : "APPLE-SA-2007-04-19",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
},
{
"name" : "TA07-109A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
},
{ {
"name": "23569", "name": "23569",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/23569" "url": "http://www.securityfocus.com/bid/23569"
}, },
{ {
"name" : "ADV-2007-1470", "name": "TA07-109A",
"refsource" : "VUPEN", "refsource": "CERT",
"url" : "http://www.vupen.com/english/advisories/2007/1470" "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
}, },
{ {
"name": "34857", "name": "34857",
@ -83,9 +78,14 @@
"url": "http://www.osvdb.org/34857" "url": "http://www.osvdb.org/34857"
}, },
{ {
"name" : "24966", "name": "APPLE-SA-2007-04-19",
"refsource" : "SECUNIA", "refsource": "APPLE",
"url" : "http://secunia.com/advisories/24966" "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
},
{
"name": "ADV-2007-1470",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1470"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "24392",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24392"
},
{ {
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/22754.py", "name": "http://downloads.securityfocus.com/vulnerabilities/exploits/22754.py",
"refsource": "MISC", "refsource": "MISC",
@ -66,11 +71,6 @@
"name": "33868", "name": "33868",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/33868" "url": "http://osvdb.org/33868"
},
{
"name" : "24392",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24392"
} }
] ]
} }

View File

@ -52,30 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070316 Particle Blogger All Version Post.PHP (PostID) Remote SQL Injection Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/463027/100/0/threaded"
},
{ {
"name": "http://forums.particlesoft.net/viewtopic.php?t=675", "name": "http://forums.particlesoft.net/viewtopic.php?t=675",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://forums.particlesoft.net/viewtopic.php?t=675" "url": "http://forums.particlesoft.net/viewtopic.php?t=675"
}, },
{ {
"name" : "3500", "name": "particle-post-sql-injection(33030)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/3500" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33030"
},
{
"name" : "23005",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23005"
},
{
"name" : "ADV-2007-1006",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1006"
}, },
{ {
"name": "34305", "name": "34305",
@ -93,9 +78,24 @@
"url": "http://securityreason.com/securityalert/2460" "url": "http://securityreason.com/securityalert/2460"
}, },
{ {
"name" : "particle-post-sql-injection(33030)", "name": "3500",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33030" "url": "https://www.exploit-db.com/exploits/3500"
},
{
"name": "23005",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23005"
},
{
"name": "20070316 Particle Blogger All Version Post.PHP (PostID) Remote SQL Injection Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/463027/100/0/threaded"
},
{
"name": "ADV-2007-1006",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1006"
} }
] ]
} }

View File

@ -52,65 +52,65 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://bugs.kde.org/show_bug.cgi?id=143637",
"refsource" : "CONFIRM",
"url" : "http://bugs.kde.org/show_bug.cgi?id=143637"
},
{ {
"name": "https://bugs.gentoo.org/show_bug.cgi?id=170303", "name": "https://bugs.gentoo.org/show_bug.cgi?id=170303",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=170303" "url": "https://bugs.gentoo.org/show_bug.cgi?id=170303"
}, },
{
"name" : "DSA-1373",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1373"
},
{
"name" : "GLSA-200705-01",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200705-01.xml"
},
{
"name" : "MDKSA-2007:095",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:095"
},
{ {
"name": "SUSE-SR:2007:007", "name": "SUSE-SR:2007:007",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_007_suse.html" "url": "http://www.novell.com/linux/security/advisories/2007_007_suse.html"
}, },
{
"name" : "USN-436-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-436-2"
},
{
"name" : "23745",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23745"
},
{ {
"name": "24995", "name": "24995",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24995" "url": "http://secunia.com/advisories/24995"
}, },
{
"name" : "25097",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25097"
},
{ {
"name": "26773", "name": "26773",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26773" "url": "http://secunia.com/advisories/26773"
}, },
{
"name": "25097",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25097"
},
{
"name": "http://bugs.kde.org/show_bug.cgi?id=143637",
"refsource": "CONFIRM",
"url": "http://bugs.kde.org/show_bug.cgi?id=143637"
},
{
"name": "DSA-1373",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1373"
},
{
"name": "MDKSA-2007:095",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:095"
},
{
"name": "GLSA-200705-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200705-01.xml"
},
{ {
"name": "ktorrent-torrentcpp-directory-traversal(33566)", "name": "ktorrent-torrentcpp-directory-traversal(33566)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33566" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33566"
},
{
"name": "23745",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23745"
},
{
"name": "USN-436-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-436-2"
} }
] ]
} }

View File

@ -67,15 +67,15 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/38285" "url": "http://osvdb.org/38285"
}, },
{
"name" : "26889",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26889"
},
{ {
"name": "webbatch-client-xss(36704)", "name": "webbatch-client-xss(36704)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36704" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36704"
},
{
"name": "26889",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26889"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071016 WWWISIS <= 7.1 (IsisScript) Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482356/100/0/threaded"
},
{
"name" : "4529",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4529"
},
{
"name" : "26067",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26067"
},
{ {
"name": "27310", "name": "27310",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -76,6 +61,21 @@
"name": "wwwisis-wxis-xss(37214)", "name": "wwwisis-wxis-xss(37214)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37214" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37214"
},
{
"name": "26067",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26067"
},
{
"name": "20071016 WWWISIS <= 7.1 (IsisScript) Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482356/100/0/threaded"
},
{
"name": "4529",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4529"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482983/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/482983/100/0/threaded"
}, },
{
"name" : "45285",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/45285"
},
{ {
"name": "3338", "name": "3338",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3338" "url": "http://securityreason.com/securityalert/3338"
},
{
"name": "45285",
"refsource": "OSVDB",
"url": "http://osvdb.org/45285"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3236", "ID": "CVE-2015-3236",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://curl.haxx.se/docs/adv_20150617A.html",
"refsource" : "CONFIRM",
"url" : "http://curl.haxx.se/docs/adv_20150617A.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{ {
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10131", "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10131",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10131" "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10131"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "name": "http://curl.haxx.se/docs/adv_20150617A.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" "url": "http://curl.haxx.se/docs/adv_20150617A.html"
}, },
{ {
"name": "FEDORA-2015-10155", "name": "FEDORA-2015-10155",
@ -88,9 +68,24 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html"
}, },
{ {
"name" : "GLSA-201509-02", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201509-02" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
},
{
"name": "75385",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75385"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
}, },
{ {
"name": "91787", "name": "91787",
@ -98,9 +93,14 @@
"url": "http://www.securityfocus.com/bid/91787" "url": "http://www.securityfocus.com/bid/91787"
}, },
{ {
"name" : "75385", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/75385" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name": "GLSA-201509-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201509-02"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015", "name": "72114",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2015/01/29/6" "url": "http://www.securityfocus.com/bid/72114"
},
{
"name" : "https://www.drupal.org/node/2402839",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2402839"
}, },
{ {
"name": "https://www.drupal.org/node/2403451", "name": "https://www.drupal.org/node/2403451",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.drupal.org/node/2403451" "url": "https://www.drupal.org/node/2403451"
}, },
{
"name": "https://www.drupal.org/node/2402839",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2402839"
},
{
"name": "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/01/29/6"
},
{ {
"name": "71954", "name": "71954",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/71954" "url": "http://www.securityfocus.com/bid/71954"
},
{
"name" : "72114",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/72114"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-3731", "ID": "CVE-2015-3731",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,55 +52,55 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/kb/HT205030",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT205030"
},
{
"name" : "https://support.apple.com/kb/HT205033",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT205033"
},
{ {
"name": "https://support.apple.com/HT205221", "name": "https://support.apple.com/HT205221",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT205221" "url": "https://support.apple.com/HT205221"
}, },
{ {
"name" : "APPLE-SA-2015-08-13-1", "name": "1033274",
"refsource" : "APPLE", "refsource": "SECTRACK",
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html" "url": "http://www.securitytracker.com/id/1033274"
}, },
{ {
"name" : "APPLE-SA-2015-08-13-3", "name": "https://support.apple.com/kb/HT205030",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html" "url": "https://support.apple.com/kb/HT205030"
}, },
{ {
"name": "APPLE-SA-2015-09-16-3", "name": "APPLE-SA-2015-09-16-3",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
}, },
{
"name": "APPLE-SA-2015-08-13-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
},
{ {
"name": "openSUSE-SU-2016:0915", "name": "openSUSE-SU-2016:0915",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html"
}, },
{
"name" : "USN-2937-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2937-1"
},
{ {
"name": "76338", "name": "76338",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/76338" "url": "http://www.securityfocus.com/bid/76338"
}, },
{ {
"name" : "1033274", "name": "APPLE-SA-2015-08-13-1",
"refsource" : "SECTRACK", "refsource": "APPLE",
"url" : "http://www.securitytracker.com/id/1033274" "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
},
{
"name": "https://support.apple.com/kb/HT205033",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT205033"
},
{
"name": "USN-2937-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2937-1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-6346", "ID": "CVE-2015-6346",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID": "CVE-2015-6639", "ID": "CVE-2015-6639",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39757/" "url": "https://www.exploit-db.com/exploits/39757/"
}, },
{
"name" : "http://source.android.com/security/bulletin/2016-01-01.html",
"refsource" : "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-01-01.html"
},
{ {
"name": "1034592", "name": "1034592",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034592" "url": "http://www.securitytracker.com/id/1034592"
},
{
"name": "http://source.android.com/security/bulletin/2016-01-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-01-01.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-6701", "ID": "CVE-2015-6701",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-479",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-479"
},
{ {
"name": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html", "name": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html" "url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
}, },
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-479",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-479"
},
{ {
"name": "1033796", "name": "1033796",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-7211", "ID": "CVE-2015-7211",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,56 +52,56 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-141.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-141.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1221444",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1221444"
},
{
"name" : "FEDORA-2015-51b1105902",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"
},
{
"name" : "FEDORA-2015-7ab3d3afcf",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"
},
{ {
"name": "GLSA-201512-10", "name": "GLSA-201512-10",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201512-10" "url": "https://security.gentoo.org/glsa/201512-10"
}, },
{
"name" : "openSUSE-SU-2016:0307",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
},
{
"name" : "openSUSE-SU-2016:0308",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
},
{ {
"name": "openSUSE-SU-2015:2353", "name": "openSUSE-SU-2015:2353",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"
}, },
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221444",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221444"
},
{
"name": "openSUSE-SU-2016:0308",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
},
{
"name": "FEDORA-2015-7ab3d3afcf",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"
},
{ {
"name": "USN-2833-1", "name": "USN-2833-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2833-1" "url": "http://www.ubuntu.com/usn/USN-2833-1"
}, },
{
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-141.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-141.html"
},
{ {
"name": "79280", "name": "79280",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/79280" "url": "http://www.securityfocus.com/bid/79280"
}, },
{
"name": "openSUSE-SU-2016:0307",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
},
{
"name": "FEDORA-2015-51b1105902",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"
},
{ {
"name": "1034426", "name": "1034426",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "38221", "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability",
"refsource" : "EXPLOIT-DB", "refsource": "CONFIRM",
"url" : "https://www.exploit-db.com/exploits/38221/" "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability"
},
{
"name": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce",
"refsource": "MISC",
"url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce"
}, },
{ {
"name": "20150915 ManageEngine OpManager multiple vulnerabilities", "name": "20150915 ManageEngine OpManager multiple vulnerabilities",
@ -68,14 +73,9 @@
"url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html" "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html"
}, },
{ {
"name" : "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce", "name": "38221",
"refsource" : "MISC", "refsource": "EXPLOIT-DB",
"url" : "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce" "url": "https://www.exploit-db.com/exploits/38221/"
},
{
"name" : "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability",
"refsource" : "CONFIRM",
"url" : "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-7936", "ID": "CVE-2015-7936",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-8451", "ID": "CVE-2015-8451",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html", "name": "openSUSE-SU-2015:2239",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
}, },
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
@ -68,39 +63,44 @@
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
}, },
{ {
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
},
{
"name" : "GLSA-201601-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201601-03"
}, },
{ {
"name": "SUSE-SU-2015:2236", "name": "SUSE-SU-2015:2236",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html"
}, },
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{ {
"name": "SUSE-SU-2015:2247", "name": "SUSE-SU-2015:2247",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
}, },
{ {
"name" : "openSUSE-SU-2015:2239", "name": "1034318",
"refsource" : "SUSE", "refsource": "SECTRACK",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" "url": "http://www.securitytracker.com/id/1034318"
},
{
"name": "GLSA-201601-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-03"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
}, },
{ {
"name": "78710", "name": "78710",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/78710" "url": "http://www.securityfocus.com/bid/78710"
},
{
"name" : "1034318",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034318"
} }
] ]
} }

View File

@ -73,15 +73,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/110409" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/110409"
}, },
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21989124",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21989124"
},
{ {
"name": "99379", "name": "99379",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/99379" "url": "http://www.securityfocus.com/bid/99379"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21989124",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21989124"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0537", "ID": "CVE-2016-0537",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2016-1693", "ID": "CVE-2016-1693",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,59 +53,59 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html", "name": "90876",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" "url": "http://www.securityfocus.com/bid/90876"
},
{
"name" : "https://codereview.chromium.org/1919043002",
"refsource" : "CONFIRM",
"url" : "https://codereview.chromium.org/1919043002"
},
{
"name" : "https://crbug.com/598752",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/598752"
},
{
"name" : "DSA-3590",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3590"
},
{
"name" : "GLSA-201607-07",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201607-07"
},
{
"name" : "RHSA-2016:1190",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1190"
},
{
"name" : "openSUSE-SU-2016:1430",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
},
{
"name" : "openSUSE-SU-2016:1433",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
}, },
{ {
"name": "openSUSE-SU-2016:1496", "name": "openSUSE-SU-2016:1496",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
}, },
{
"name" : "90876",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/90876"
},
{ {
"name": "1035981", "name": "1035981",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035981" "url": "http://www.securitytracker.com/id/1035981"
},
{
"name": "DSA-3590",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3590"
},
{
"name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
},
{
"name": "openSUSE-SU-2016:1430",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
},
{
"name": "https://crbug.com/598752",
"refsource": "CONFIRM",
"url": "https://crbug.com/598752"
},
{
"name": "RHSA-2016:1190",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1190"
},
{
"name": "https://codereview.chromium.org/1919043002",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1919043002"
},
{
"name": "GLSA-201607-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-07"
},
{
"name": "openSUSE-SU-2016:1433",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2016-1795", "ID": "CVE-2016-1795",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html",
"refsource" : "CONFIRM",
"url" : "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html"
},
{
"name" : "https://crbug.com/654280",
"refsource" : "CONFIRM",
"url" : "https://crbug.com/654280"
},
{
"name" : "GLSA-201612-11",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201612-11"
},
{ {
"name": "RHSA-2016:2919", "name": "RHSA-2016:2919",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -76,6 +61,21 @@
"name": "94633", "name": "94633",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94633" "url": "http://www.securityfocus.com/bid/94633"
},
{
"name": "https://crbug.com/654280",
"refsource": "CONFIRM",
"url": "https://crbug.com/654280"
},
{
"name": "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html"
},
{
"name": "GLSA-201612-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-11"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5506", "ID": "CVE-2016-5506",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
}, },
{
"name" : "93648",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/93648"
},
{ {
"name": "1037051", "name": "1037051",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037051" "url": "http://www.securitytracker.com/id/1037051"
},
{
"name": "93648",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93648"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5573", "ID": "CVE-2016-5573",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,64 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "name": "DSA-3707",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" "url": "http://www.debian.org/security/2016/dsa-3707"
}, },
{ {
"name": "https://security.netapp.com/advisory/ntap-20161019-0001/", "name": "https://security.netapp.com/advisory/ntap-20161019-0001/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20161019-0001/" "url": "https://security.netapp.com/advisory/ntap-20161019-0001/"
}, },
{
"name" : "DSA-3707",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3707"
},
{
"name" : "GLSA-201611-04",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201611-04"
},
{
"name" : "GLSA-201701-43",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-43"
},
{
"name" : "RHSA-2016:2658",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2658.html"
},
{ {
"name": "RHSA-2016:2659", "name": "RHSA-2016:2659",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html"
}, },
{
"name": "RHSA-2016:2136",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html"
},
{ {
"name": "RHSA-2016:2079", "name": "RHSA-2016:2079",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html"
}, },
{ {
"name" : "RHSA-2016:2088", "name": "93628",
"refsource" : "REDHAT", "refsource": "BID",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2088.html" "url": "http://www.securityfocus.com/bid/93628"
}, },
{ {
"name" : "RHSA-2016:2089", "name": "USN-3130-1",
"refsource" : "REDHAT", "refsource": "UBUNTU",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2089.html" "url": "http://www.ubuntu.com/usn/USN-3130-1"
}, },
{ {
"name" : "RHSA-2016:2090", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2090.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name" : "RHSA-2016:2136",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2136.html"
}, },
{ {
"name": "RHSA-2016:2137", "name": "RHSA-2016:2137",
@ -122,6 +102,21 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html"
}, },
{
"name": "GLSA-201701-43",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-43"
},
{
"name": "RHSA-2016:2090",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html"
},
{
"name": "GLSA-201611-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201611-04"
},
{ {
"name": "RHSA-2017:0061", "name": "RHSA-2017:0061",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -132,25 +127,30 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1216" "url": "https://access.redhat.com/errata/RHSA-2017:1216"
}, },
{
"name" : "USN-3130-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3130-1"
},
{ {
"name": "USN-3154-1", "name": "USN-3154-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3154-1" "url": "http://www.ubuntu.com/usn/USN-3154-1"
}, },
{ {
"name" : "93628", "name": "RHSA-2016:2089",
"refsource" : "BID", "refsource": "REDHAT",
"url" : "http://www.securityfocus.com/bid/93628" "url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html"
}, },
{ {
"name": "1037040", "name": "1037040",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037040" "url": "http://www.securitytracker.com/id/1037040"
},
{
"name": "RHSA-2016:2088",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html"
},
{
"name": "RHSA-2016:2658",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html"
} }
] ]
} }

View File

@ -392,15 +392,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0613",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0613"
},
{ {
"name": "106872", "name": "106872",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106872" "url": "http://www.securityfocus.com/bid/106872"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0613",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0613"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41262",
"refsource" : "MISC",
"url" : "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41262"
},
{ {
"name": "https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-psoutputdevsetupresources-xpdf-4-01/", "name": "https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-psoutputdevsetupresources-xpdf-4-01/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-psoutputdevsetupresources-xpdf-4-01/" "url": "https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-psoutputdevsetupresources-xpdf-4-01/"
},
{
"name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41262",
"refsource": "MISC",
"url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41262"
} }
] ]
} }