"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:55:32 +00:00
parent 005043b2c6
commit 38bb7f550b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3039 additions and 3039 deletions

View File

@ -57,15 +57,15 @@
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-054" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-054"
}, },
{
"name" : "Q247333",
"refsource" : "MSKB",
"url" : "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q247333"
},
{ {
"name": "846", "name": "846",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/846" "url": "http://www.securityfocus.com/bid/846"
},
{
"name": "Q247333",
"refsource": "MSKB",
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q247333"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "19990728 Seattle Labs EMURL Vulnerability",
"refsource" : "NTBUGTRAQ",
"url" : "http://marc.info/?l=ntbugtraq&m=93316253431588&w=2"
},
{ {
"name": "544", "name": "544",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/544" "url": "http://www.securityfocus.com/bid/544"
},
{
"name": "19990728 Seattle Labs EMURL Vulnerability",
"refsource": "NTBUGTRAQ",
"url": "http://marc.info/?l=ntbugtraq&m=93316253431588&w=2"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=90221103125826&w=2" "url": "http://marc.info/?l=bugtraq&m=90221103125826&w=2"
}, },
{
"name": "6065",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/6065"
},
{ {
"name": "http://www.redhat.com/support/errata/rh51-errata-general.html#linuxconf", "name": "http://www.redhat.com/support/errata/rh51-errata-general.html#linuxconf",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "linuxconf-lang-bo(7239)", "name": "linuxconf-lang-bo(7239)",
"refsource": "XF", "refsource": "XF",
"url": "http://www.iss.net/security_center/static/7239.php" "url": "http://www.iss.net/security_center/static/7239.php"
},
{
"name" : "6065",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/6065"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html", "name": "23794",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" "url": "http://secunia.com/advisories/23794"
},
{
"name" : "TA07-017A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-017A.html"
}, },
{ {
"name": "22083", "name": "22083",
@ -73,19 +68,24 @@
"url": "http://osvdb.org/32903" "url": "http://osvdb.org/32903"
}, },
{ {
"name" : "1017522", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://securitytracker.com/id?1017522" "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html"
}, },
{ {
"name" : "23794", "name": "TA07-017A",
"refsource" : "SECUNIA", "refsource": "CERT",
"url" : "http://secunia.com/advisories/23794" "url": "http://www.us-cert.gov/cas/techalerts/TA07-017A.html"
}, },
{ {
"name": "oracle-cpu-jan2007(31541)", "name": "oracle-cpu-jan2007(31541)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31541" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31541"
},
{
"name": "1017522",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017522"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2007-0991", "ID": "CVE-2007-0991",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,9 +53,69 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20070301 tcpdump: off-by-one heap overflow in 802.11 printer", "name": "RHSA-2007:0387",
"refsource" : "FULLDISC", "refsource": "REDHAT",
"url" : "http://seclists.org/fulldisclosure/2007/Mar/0003.html" "url": "http://www.redhat.com/support/errata/RHSA-2007-0387.html"
},
{
"name": "ADV-2007-4238",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4238"
},
{
"name": "22772",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22772"
},
{
"name": "TA07-352A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
},
{
"name": "32427",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/32427"
},
{
"name": "DSA-1272",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1272"
},
{
"name": "27580",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27580"
},
{
"name": "FEDORA-2007-347",
"refsource": "FEDORA",
"url": "http://fedoranews.org/cms/node/2798"
},
{
"name": "USN-429-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-429-1"
},
{
"name": "28136",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28136"
},
{
"name": "ADV-2007-0793",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0793"
},
{
"name": "24354",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24354"
},
{
"name": "tcpdump-print80211c-bo(32749)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32749"
}, },
{ {
"name": "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c?r1=1.31.2.11&r2=1.31.2.12", "name": "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c?r1=1.31.2.11&r2=1.31.2.12",
@ -72,125 +132,45 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=168916" "url": "https://bugs.gentoo.org/show_bug.cgi?id=168916"
}, },
{
"name" : "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c",
"refsource" : "CONFIRM",
"url" : "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=307179",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=307179"
},
{
"name" : "APPLE-SA-2007-12-17",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
},
{
"name" : "DSA-1272",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1272"
},
{
"name" : "FEDORA-2007-347",
"refsource" : "FEDORA",
"url" : "http://fedoranews.org/cms/node/2798"
},
{
"name" : "FEDORA-2007-348",
"refsource" : "FEDORA",
"url" : "http://fedoranews.org/cms/node/2799"
},
{
"name" : "MDKSA-2007:056",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:056"
},
{
"name" : "MDKSA-2007:155",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:155"
},
{ {
"name": "RHSA-2007:0368", "name": "RHSA-2007:0368",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0368.html" "url": "http://www.redhat.com/support/errata/RHSA-2007-0368.html"
}, },
{
"name" : "RHSA-2007:0387",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0387.html"
},
{
"name" : "TLSA-2007-46",
"refsource" : "TURBO",
"url" : "http://www.turbolinux.com/security/2007/TLSA-2007-46.txt"
},
{
"name" : "USN-429-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-429-1"
},
{
"name" : "TA07-352A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
},
{
"name" : "22772",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22772"
},
{ {
"name": "oval:org.mitre.oval:def:9520", "name": "oval:org.mitre.oval:def:9520",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9520" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9520"
}, },
{
"name" : "ADV-2007-0793",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0793"
},
{
"name" : "ADV-2007-4238",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/4238"
},
{
"name" : "32427",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/32427"
},
{
"name" : "1017717",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1017717"
},
{
"name" : "24318",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24318"
},
{
"name" : "24354",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24354"
},
{ {
"name": "24423", "name": "24423",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24423" "url": "http://secunia.com/advisories/24423"
}, },
{
"name": "20070301 tcpdump: off-by-one heap overflow in 802.11 printer",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Mar/0003.html"
},
{
"name": "MDKSA-2007:056",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:056"
},
{
"name": "APPLE-SA-2007-12-17",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
},
{ {
"name": "24451", "name": "24451",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24451" "url": "http://secunia.com/advisories/24451"
}, },
{ {
"name" : "24583", "name": "MDKSA-2007:155",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/24583" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:155"
}, },
{ {
"name": "24610", "name": "24610",
@ -198,19 +178,39 @@
"url": "http://secunia.com/advisories/24610" "url": "http://secunia.com/advisories/24610"
}, },
{ {
"name" : "27580", "name": "24583",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/27580" "url": "http://secunia.com/advisories/24583"
}, },
{ {
"name" : "28136", "name": "1017717",
"refsource" : "SECUNIA", "refsource": "SECTRACK",
"url" : "http://secunia.com/advisories/28136" "url": "http://www.securitytracker.com/id?1017717"
}, },
{ {
"name" : "tcpdump-print80211c-bo(32749)", "name": "http://docs.info.apple.com/article.html?artnum=307179",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32749" "url": "http://docs.info.apple.com/article.html?artnum=307179"
},
{
"name": "FEDORA-2007-348",
"refsource": "FEDORA",
"url": "http://fedoranews.org/cms/node/2799"
},
{
"name": "TLSA-2007-46",
"refsource": "TURBO",
"url": "http://www.turbolinux.com/security/2007/TLSA-2007-46.txt"
},
{
"name": "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c",
"refsource": "CONFIRM",
"url": "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c"
},
{
"name": "24318",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24318"
} }
] ]
} }

View File

@ -52,115 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070418 rPSA-2007-0073-1 php php-mysql php-pgsql",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/466166/100/0/threaded"
},
{
"name" : "http://www.php-security.org/MOPB/MOPB-04-2007.html",
"refsource" : "MISC",
"url" : "http://www.php-security.org/MOPB/MOPB-04-2007.html"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1268",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1268"
},
{
"name" : "DSA-1282",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1282"
},
{
"name" : "DSA-1283",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2007/dsa-1283"
},
{
"name" : "GLSA-200703-21",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200703-21.xml"
},
{
"name" : "GLSA-200705-19",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200705-19.xml"
},
{
"name" : "HPSBMA02215",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
},
{
"name" : "SSRT071423",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
},
{
"name" : "HPSBTU02232",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
},
{
"name" : "SSRT071429",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
},
{
"name" : "MDKSA-2007:087",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:087"
},
{
"name" : "MDKSA-2007:088",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088"
},
{
"name" : "RHSA-2007:0154",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0154.html"
},
{
"name" : "RHSA-2007:0155",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0155.html"
},
{
"name" : "RHSA-2007:0163",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0163.html"
},
{ {
"name": "2007-0009", "name": "2007-0009",
"refsource": "TRUSTIX", "refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0009/" "url": "http://www.trustix.org/errata/2007/0009/"
}, },
{
"name" : "22765",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22765"
},
{
"name" : "oval:org.mitre.oval:def:11575",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11575"
},
{ {
"name": "ADV-2007-1991", "name": "ADV-2007-1991",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1991" "url": "http://www.vupen.com/english/advisories/2007/1991"
}, },
{ {
"name" : "ADV-2007-2374", "name": "DSA-1283",
"refsource" : "VUPEN", "refsource": "DEBIAN",
"url" : "http://www.vupen.com/english/advisories/2007/2374" "url": "http://www.debian.org/security/2007/dsa-1283"
}, },
{ {
"name" : "32771", "name": "SSRT071423",
"refsource" : "OSVDB", "refsource": "HP",
"url" : "http://www.osvdb.org/32771" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
}, },
{ {
"name": "24606", "name": "24606",
@ -168,19 +78,19 @@
"url": "http://secunia.com/advisories/24606" "url": "http://secunia.com/advisories/24606"
}, },
{ {
"name" : "24910", "name": "RHSA-2007:0154",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/24910" "url": "http://rhn.redhat.com/errata/RHSA-2007-0154.html"
}, },
{ {
"name" : "24924", "name": "20070418 rPSA-2007-0073-1 php php-mysql php-pgsql",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/24924" "url": "http://www.securityfocus.com/archive/1/466166/100/0/threaded"
}, },
{ {
"name" : "24945", "name": "GLSA-200705-19",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/24945" "url": "http://security.gentoo.org/glsa/glsa-200705-19.xml"
}, },
{ {
"name": "24941", "name": "24941",
@ -188,9 +98,24 @@
"url": "http://secunia.com/advisories/24941" "url": "http://secunia.com/advisories/24941"
}, },
{ {
"name" : "25025", "name": "HPSBTU02232",
"refsource" : "SECUNIA", "refsource": "HP",
"url" : "http://secunia.com/advisories/25025" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
},
{
"name": "GLSA-200703-21",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200703-21.xml"
},
{
"name": "php-zval-code-execution(32796)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32796"
},
{
"name": "SSRT071429",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"
}, },
{ {
"name": "25062", "name": "25062",
@ -198,29 +123,104 @@
"url": "http://secunia.com/advisories/25062" "url": "http://secunia.com/advisories/25062"
}, },
{ {
"name" : "25445", "name": "ADV-2007-2374",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/25445" "url": "http://www.vupen.com/english/advisories/2007/2374"
}, },
{ {
"name": "25423", "name": "25423",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25423" "url": "http://secunia.com/advisories/25423"
}, },
{
"name": "http://www.php-security.org/MOPB/MOPB-04-2007.html",
"refsource": "MISC",
"url": "http://www.php-security.org/MOPB/MOPB-04-2007.html"
},
{ {
"name": "24419", "name": "24419",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24419" "url": "http://secunia.com/advisories/24419"
}, },
{
"name": "MDKSA-2007:087",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:087"
},
{
"name": "24945",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24945"
},
{
"name": "DSA-1282",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1282"
},
{
"name": "https://issues.rpath.com/browse/RPL-1268",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1268"
},
{
"name": "HPSBMA02215",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"
},
{
"name": "24924",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24924"
},
{
"name": "RHSA-2007:0155",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0155.html"
},
{
"name": "24910",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24910"
},
{ {
"name": "25850", "name": "25850",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25850" "url": "http://secunia.com/advisories/25850"
}, },
{ {
"name" : "php-zval-code-execution(32796)", "name": "25445",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32796" "url": "http://secunia.com/advisories/25445"
},
{
"name": "RHSA-2007:0163",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0163.html"
},
{
"name": "oval:org.mitre.oval:def:11575",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11575"
},
{
"name": "22765",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22765"
},
{
"name": "25025",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25025"
},
{
"name": "32771",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/32771"
},
{
"name": "MDKSA-2007:088",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "ADV-2007-1015",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1015"
},
{ {
"name": "37184", "name": "37184",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/37184" "url": "http://osvdb.org/37184"
},
{
"name": "ADV-2007-1015",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1015"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "24669",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24669"
},
{ {
"name": "http://overlayweaver.sourceforge.net/news/", "name": "http://overlayweaver.sourceforge.net/news/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://overlayweaver.sourceforge.net/news/" "url": "http://overlayweaver.sourceforge.net/news/"
}, },
{
"name" : "JVN#62399483",
"refsource" : "JVN",
"url" : "http://jvn.jp/jp/JVN%2362399483/index.html"
},
{
"name" : "23195",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23195"
},
{ {
"name": "ADV-2007-1167", "name": "ADV-2007-1167",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1167" "url": "http://www.vupen.com/english/advisories/2007/1167"
}, },
{
"name" : "24669",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24669"
},
{ {
"name": "overlay-weaver-owdhtshell-xss(33340)", "name": "overlay-weaver-owdhtshell-xss(33340)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33340" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33340"
},
{
"name": "23195",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23195"
},
{
"name": "JVN#62399483",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2362399483/index.html"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "27204",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27204"
},
{ {
"name": "20071012 CallManager and OpeSer toll fraud and authentication forward attack", "name": "20071012 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066581.html" "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066581.html"
}, },
{
"name" : "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066691.html"
},
{
"name" : "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066694.html"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446956",
"refsource" : "MISC",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446956"
},
{ {
"name": "26057", "name": "26057",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/26057" "url": "http://www.securityfocus.com/bid/26057"
}, },
{ {
"name" : "27204", "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446956",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/27204" "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446956"
},
{
"name": "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066694.html"
}, },
{ {
"name": "callmanager-openser-sip-call-hijacking(37197)", "name": "callmanager-openser-sip-call-hijacking(37197)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37197" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37197"
},
{
"name": "20071015 CallManager and OpeSer toll fraud and authentication forward attack",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066691.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3170", "ID": "CVE-2015-3170",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-3670", "ID": "CVE-2015-3670",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-3948", "ID": "CVE-2015-3948",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-7655", "ID": "CVE-2015-7655",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,44 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-559", "name": "1034111",
"refsource" : "MISC", "refsource": "SECTRACK",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-559" "url": "http://www.securitytracker.com/id/1034111"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
},
{
"name" : "GLSA-201511-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201511-02"
},
{
"name" : "RHSA-2015:2023",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
}, },
{ {
"name": "RHSA-2015:2024", "name": "RHSA-2015:2024",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html"
}, },
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
},
{ {
"name": "openSUSE-SU-2015:1984", "name": "openSUSE-SU-2015:1984",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"
}, },
{
"name": "GLSA-201511-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201511-02"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-559",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-559"
},
{ {
"name": "77533", "name": "77533",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/77533" "url": "http://www.securityfocus.com/bid/77533"
}, },
{ {
"name" : "1034111", "name": "RHSA-2015:2023",
"refsource" : "SECTRACK", "refsource": "REDHAT",
"url" : "http://www.securitytracker.com/id/1034111" "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/536597/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/536597/100/0/threaded"
}, },
{
"name" : "https://wpvulndb.com/vulnerabilities/8206",
"refsource" : "MISC",
"url" : "https://wpvulndb.com/vulnerabilities/8206"
},
{ {
"name": "https://wordpress.org/plugins/easy2map/#developers", "name": "https://wordpress.org/plugins/easy2map/#developers",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/easy2map/#developers" "url": "https://wordpress.org/plugins/easy2map/#developers"
},
{
"name": "https://wpvulndb.com/vulnerabilities/8206",
"refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/8206"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-sec] 20151116 CVE-2015-8107 - a2ps(gnu) v4.14 format string vulnerability",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2015/q4/284"
},
{ {
"name": "77595", "name": "77595",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/77595" "url": "http://www.securityfocus.com/bid/77595"
},
{
"name": "[oss-sec] 20151116 CVE-2015-8107 - a2ps(gnu) v4.14 format string vulnerability",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2015/q4/284"
} }
] ]
} }

View File

@ -52,11 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "FEDORA-2015-0efcb5fbc5",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173271.html"
},
{ {
"name": "20151222 [RT-SA-2015-013] Symfony PHP Framework: Session Fixation In \"Remember Me\" Login Functionality", "name": "20151222 [RT-SA-2015-013] Symfony PHP Framework: Session Fixation In \"Remember Me\" Login Functionality",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537183/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/537183/100/0/threaded"
}, },
{
"name": "FEDORA-2015-0b89738311",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173300.html"
},
{
"name": "DSA-3402",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3402"
},
{
"name": "77694",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77694"
},
{ {
"name": "20151222 [RT-SA-2015-013] Symfony PHP Framework: Session Fixation In \"Remember Me\" Login Functionality", "name": "20151222 [RT-SA-2015-013] Symfony PHP Framework: Session Fixation In \"Remember Me\" Login Functionality",
"refsource": "FULLDISC", "refsource": "FULLDISC",
@ -66,26 +86,6 @@
"name": "https://symfony.com/blog/cve-2015-8124-session-fixation-in-the-remember-me-login-feature", "name": "https://symfony.com/blog/cve-2015-8124-session-fixation-in-the-remember-me-login-feature",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://symfony.com/blog/cve-2015-8124-session-fixation-in-the-remember-me-login-feature" "url": "https://symfony.com/blog/cve-2015-8124-session-fixation-in-the-remember-me-login-feature"
},
{
"name" : "DSA-3402",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3402"
},
{
"name" : "FEDORA-2015-0b89738311",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173300.html"
},
{
"name" : "FEDORA-2015-0efcb5fbc5",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173271.html"
},
{
"name" : "77694",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/77694"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8181", "ID": "CVE-2015-8181",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-8413", "ID": "CVE-2015-8413",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,20 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39043/" "url": "https://www.exploit-db.com/exploits/39043/"
}, },
{
"name": "openSUSE-SU-2015:2239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{ {
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html", "name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html" "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
}, },
{ {
"name" : "GLSA-201601-03", "name": "78715",
"refsource" : "GENTOO", "refsource": "BID",
"url" : "https://security.gentoo.org/glsa/201601-03" "url": "http://www.securityfocus.com/bid/78715"
}, },
{ {
"name": "SUSE-SU-2015:2236", "name": "SUSE-SU-2015:2236",
@ -77,20 +82,15 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
}, },
{
"name" : "openSUSE-SU-2015:2239",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
},
{
"name" : "78715",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/78715"
},
{ {
"name": "1034318", "name": "1034318",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034318" "url": "http://www.securitytracker.com/id/1034318"
},
{
"name": "GLSA-201601-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-03"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-0619", "ID": "CVE-2016-0619",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1061", "ID": "CVE-2016-1061",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,11 +57,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-309" "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-309"
}, },
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{ {
"name": "90512", "name": "90512",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "1035828", "name": "1035828",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035828" "url": "http://www.securitytracker.com/id/1035828"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1105", "ID": "CVE-2016-1105",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "39829",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/39829/"
},
{ {
"name": "http://packetstormsecurity.com/files/137056/Adobe-Flash-FileReference-Type-Confusion.html", "name": "http://packetstormsecurity.com/files/137056/Adobe-Flash-FileReference-Type-Confusion.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/137056/Adobe-Flash-FileReference-Type-Confusion.html" "url": "http://packetstormsecurity.com/files/137056/Adobe-Flash-FileReference-Type-Confusion.html"
}, },
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html"
},
{
"name" : "MS16-064",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-064"
},
{
"name" : "RHSA-2016:1079",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1079.html"
},
{ {
"name": "SUSE-SU-2016:1305", "name": "SUSE-SU-2016:1305",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html"
}, },
{
"name": "39829",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39829/"
},
{ {
"name": "1035827", "name": "1035827",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035827" "url": "http://www.securitytracker.com/id/1035827"
},
{
"name": "MS16-064",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-064"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-15.html"
},
{
"name": "RHSA-2016:1079",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1079.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2016-1644", "ID": "CVE-2016-1644",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1035259",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035259"
},
{
"name": "DSA-3513",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3513"
},
{
"name": "openSUSE-SU-2016:0818",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00067.html"
},
{ {
"name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_8.html", "name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_8.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -68,39 +83,24 @@
"url": "https://codereview.chromium.org/1755543002" "url": "https://codereview.chromium.org/1755543002"
}, },
{ {
"name" : "DSA-3513", "name": "84224",
"refsource" : "DEBIAN", "refsource": "BID",
"url" : "http://www.debian.org/security/2016/dsa-3513" "url": "http://www.securityfocus.com/bid/84224"
},
{
"name" : "openSUSE-SU-2016:0817",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00066.html"
},
{
"name" : "openSUSE-SU-2016:0818",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00067.html"
}, },
{ {
"name": "openSUSE-SU-2016:0828", "name": "openSUSE-SU-2016:0828",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00073.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00073.html"
}, },
{
"name": "openSUSE-SU-2016:0817",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00066.html"
},
{ {
"name": "USN-2920-1", "name": "USN-2920-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2920-1" "url": "http://www.ubuntu.com/usn/USN-2920-1"
},
{
"name" : "84224",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/84224"
},
{
"name" : "1035259",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1035259"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763"
},
{ {
"name": "1035325", "name": "1035325",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035325" "url": "http://www.securitytracker.com/id/1035325"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-5005", "ID": "CVE-2016-5005",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,9 +58,9 @@
"url": "http://www.securityfocus.com/archive/1/538878/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/538878/100/0/threaded"
}, },
{ {
"name" : "20160712 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "name": "1036475",
"refsource" : "FULLDISC", "refsource": "SECTRACK",
"url" : "http://seclists.org/fulldisclosure/2016/Jul/38" "url": "http://www.securitytracker.com/id/1036475"
}, },
{ {
"name": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html",
@ -73,9 +73,9 @@
"url": "http://www.securityfocus.com/bid/91707" "url": "http://www.securityfocus.com/bid/91707"
}, },
{ {
"name" : "1036475", "name": "20160712 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting",
"refsource" : "SECTRACK", "refsource": "FULLDISC",
"url" : "http://www.securitytracker.com/id/1036475" "url": "http://seclists.org/fulldisclosure/2016/Jul/38"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2016-5141", "ID": "CVE-2016-5141",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,20 +53,50 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop.html", "name": "92276",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop.html" "url": "http://www.securityfocus.com/bid/92276"
},
{
"name": "openSUSE-SU-2016:1983",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00006.html"
},
{
"name": "RHSA-2016:1580",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1580.html"
}, },
{ {
"name": "https://codereview.chromium.org/2171063002", "name": "https://codereview.chromium.org/2171063002",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://codereview.chromium.org/2171063002" "url": "https://codereview.chromium.org/2171063002"
}, },
{
"name": "1036547",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036547"
},
{ {
"name": "https://crbug.com/629542", "name": "https://crbug.com/629542",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://crbug.com/629542" "url": "https://crbug.com/629542"
}, },
{
"name": "GLSA-201610-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-09"
},
{
"name": "http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop.html"
},
{
"name": "openSUSE-SU-2016:1982",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00005.html"
},
{ {
"name": "DSA-3645", "name": "DSA-3645",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -76,36 +106,6 @@
"name": "FEDORA-2016-e9798eaaa3", "name": "FEDORA-2016-e9798eaaa3",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KMX62M7UNRLWO4FEQ6YIMPMTKXXJV6A/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KMX62M7UNRLWO4FEQ6YIMPMTKXXJV6A/"
},
{
"name" : "GLSA-201610-09",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201610-09"
},
{
"name" : "RHSA-2016:1580",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1580.html"
},
{
"name" : "openSUSE-SU-2016:1982",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00005.html"
},
{
"name" : "openSUSE-SU-2016:1983",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00006.html"
},
{
"name" : "92276",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/92276"
},
{
"name" : "1036547",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036547"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-5604", "ID": "CVE-2016-5604",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -55,16 +55,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/116136",
"refsource" : "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/116136"
},
{ {
"name": "http://www.ibm.com/support/docview.wss?uid=swg22003092", "name": "http://www.ibm.com/support/docview.wss?uid=swg22003092",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22003092" "url": "http://www.ibm.com/support/docview.wss?uid=swg22003092"
}, },
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/116136",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/116136"
},
{ {
"name": "98829", "name": "98829",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2016-5997", "ID": "CVE-2016-5997",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21990216",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21990216"
},
{ {
"name": "93144", "name": "93144",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/93144" "url": "http://www.securityfocus.com/bid/93144"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21990216",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21990216"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "105902",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105902"
},
{ {
"name": "https://launchpad.support.sap.com/#/notes/2676094", "name": "https://launchpad.support.sap.com/#/notes/2676094",
"refsource": "MISC", "refsource": "MISC",
@ -66,11 +71,6 @@
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832", "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832",
"refsource": "MISC", "refsource": "MISC",
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832" "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832"
},
{
"name" : "105902",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/105902"
} }
] ]
}, },

View File

@ -61,11 +61,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://erpscan.io/advisories/erpscan-18-001-information-disclosure-peoplesoft-listening-connector/",
"refsource" : "MISC",
"url" : "https://erpscan.io/advisories/erpscan-18-001-information-disclosure-peoplesoft-listening-connector/"
},
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -76,6 +71,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102589" "url": "http://www.securityfocus.com/bid/102589"
}, },
{
"name": "https://erpscan.io/advisories/erpscan-18-001-information-disclosure-peoplesoft-listening-connector/",
"refsource": "MISC",
"url": "https://erpscan.io/advisories/erpscan-18-001-information-disclosure-peoplesoft-listening-connector/"
},
{ {
"name": "1040204", "name": "1040204",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -57,11 +57,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{ {
"name": "GLSA-201805-08", "name": "GLSA-201805-08",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -72,6 +67,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103857" "url": "http://www.securityfocus.com/bid/103857"
}, },
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{ {
"name": "1040707", "name": "1040707",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com", "ASSIGNER": "security@google.com",
"ID": "CVE-2019-5773", "ID": "CVE-2019-5773",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,6 +53,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "106767",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106767"
},
{
"name": "RHSA-2019:0309",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
},
{
"name": "DSA-4395",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4395"
},
{ {
"name": "https://crbug.com/917668", "name": "https://crbug.com/917668",
"refsource": "MISC", "refsource": "MISC",
@ -62,21 +77,6 @@
"name": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html", "name": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html" "url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"name" : "DSA-4395",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2019/dsa-4395"
},
{
"name" : "RHSA-2019:0309",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2019:0309"
},
{
"name" : "106767",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/106767"
} }
] ]
} }