"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:30:21 +00:00
parent 1b774a3d61
commit 489a4a90ae
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3226 additions and 3226 deletions

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2007-0426",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0426"
},
{
"name": "23953",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23953"
},
{ {
"name": "http://modxcms.com/forums/index.php/topic,10470.0.html", "name": "http://modxcms.com/forums/index.php/topic,10470.0.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,16 +76,6 @@
"name": "22327", "name": "22327",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/22327" "url": "http://www.securityfocus.com/bid/22327"
},
{
"name" : "ADV-2007-0426",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0426"
},
{
"name" : "23953",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23953"
} }
] ]
} }

View File

@ -57,21 +57,11 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3894" "url": "https://www.exploit-db.com/exploits/3894"
}, },
{
"name" : "23913",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23913"
},
{ {
"name": "ADV-2007-1767", "name": "ADV-2007-1767",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1767" "url": "http://www.vupen.com/english/advisories/2007/1767"
}, },
{
"name" : "35974",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/35974"
},
{ {
"name": "25213", "name": "25213",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +71,16 @@
"name": "original-config-file-include(34234)", "name": "original-config-file-include(34234)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34234" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34234"
},
{
"name": "35974",
"refsource": "OSVDB",
"url": "http://osvdb.org/35974"
},
{
"name": "23913",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23913"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070606 Light Blog 4.1 XSS Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/470673/100/0/threaded"
},
{ {
"name": "http://www.secvsn.com/content/Advisories/sr-060607-lightblog.html", "name": "http://www.secvsn.com/content/Advisories/sr-060607-lightblog.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.secvsn.com/content/Advisories/sr-060607-lightblog.html" "url": "http://www.secvsn.com/content/Advisories/sr-060607-lightblog.html"
}, },
{
"name": "20070606 Light Blog 4.1 XSS Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/470673/100/0/threaded"
},
{ {
"name": "25561", "name": "25561",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25561" "url": "http://secunia.com/advisories/25561"
}, },
{
"name" : "2783",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/2783"
},
{ {
"name": "lightblog-addcomment-xss(34753)", "name": "lightblog-addcomment-xss(34753)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34753" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34753"
},
{
"name": "2783",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2783"
} }
] ]
} }

View File

@ -52,11 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "access2asp-supplierslist-xss(35025)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35025"
},
{ {
"name": "http://pridels-team.blogspot.com/2007/06/access2asp-xss-vuln.html", "name": "http://pridels-team.blogspot.com/2007/06/access2asp-xss-vuln.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://pridels-team.blogspot.com/2007/06/access2asp-xss-vuln.html" "url": "http://pridels-team.blogspot.com/2007/06/access2asp-xss-vuln.html"
}, },
{
"name": "25807",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25807"
},
{
"name": "37751",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/37751"
},
{ {
"name": "ADV-2007-2371", "name": "ADV-2007-2371",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -66,21 +81,6 @@
"name": "37750", "name": "37750",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/37750" "url": "http://www.osvdb.org/37750"
},
{
"name" : "37751",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/37751"
},
{
"name" : "25807",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25807"
},
{
"name" : "access2asp-supplierslist-xss(35025)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35025"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.sybsecurity.com/hack-proventia-1.pdf", "name": "25979",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://www.sybsecurity.com/hack-proventia-1.pdf" "url": "http://secunia.com/advisories/25979"
},
{
"name" : "36475",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/36475"
}, },
{ {
"name": "ADV-2007-2545", "name": "ADV-2007-2545",
@ -68,9 +63,14 @@
"url": "http://www.vupen.com/english/advisories/2007/2545" "url": "http://www.vupen.com/english/advisories/2007/2545"
}, },
{ {
"name" : "25979", "name": "36475",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/25979" "url": "http://osvdb.org/36475"
},
{
"name": "http://www.sybsecurity.com/hack-proventia-1.pdf",
"refsource": "MISC",
"url": "http://www.sybsecurity.com/hack-proventia-1.pdf"
} }
] ]
} }

View File

@ -53,24 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.php.net/ChangeLog-5.php#5.2.4", "name": "php-zendalterinientry-unspecified(36380)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.php.net/ChangeLog-5.php#5.2.4" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36380"
}, },
{ {
"name" : "http://www.php.net/releases/5_2_4.php", "name": "26822",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.php.net/releases/5_2_4.php" "url": "http://secunia.com/advisories/26822"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1702",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1702"
},
{
"name" : "https://issues.rpath.com/browse/RPL-1693",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-1693"
}, },
{ {
"name": "DSA-1444", "name": "DSA-1444",
@ -82,25 +72,30 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml" "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
}, },
{
"name": "http://www.php.net/ChangeLog-5.php#5.2.4",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php#5.2.4"
},
{ {
"name": "2007-0026", "name": "2007-0026",
"refsource": "TRUSTIX", "refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0026/" "url": "http://www.trustix.org/errata/2007/0026/"
}, },
{ {
"name" : "ADV-2007-3023", "name": "https://issues.rpath.com/browse/RPL-1693",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2007/3023" "url": "https://issues.rpath.com/browse/RPL-1693"
}, },
{ {
"name" : "26642", "name": "28249",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/26642" "url": "http://secunia.com/advisories/28249"
}, },
{ {
"name" : "26822", "name": "https://issues.rpath.com/browse/RPL-1702",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/26822" "url": "https://issues.rpath.com/browse/RPL-1702"
}, },
{ {
"name": "26838", "name": "26838",
@ -118,14 +113,19 @@
"url": "http://secunia.com/advisories/27102" "url": "http://secunia.com/advisories/27102"
}, },
{ {
"name" : "28249", "name": "ADV-2007-3023",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/28249" "url": "http://www.vupen.com/english/advisories/2007/3023"
}, },
{ {
"name" : "php-zendalterinientry-unspecified(36380)", "name": "http://www.php.net/releases/5_2_4.php",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36380" "url": "http://www.php.net/releases/5_2_4.php"
},
{
"name": "26642",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26642"
} }
] ]
} }

View File

@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20070829 Sony: The Return Of The Rootkit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/478149/100/0/threaded"
},
{ {
"name": "20070830 Re: Sony: The Return Of The Rootkit", "name": "20070830 Re: Sony: The Return Of The Rootkit",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478315/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/478315/100/0/threaded"
}, },
{ {
"name" : "20070831 Re: Sony: The Return Of The Rootkit", "name": "http://www.f-secure.com/weblog/archives/archive-082007.html#00001266",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/478357/100/0/threaded"
},
{
"name" : "20070901 Re: Sony: The Return Of The Rootkit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/478365/100/0/threaded"
},
{
"name" : "http://hiltont.blogspot.com/2007/08/sony-rootkit-version-2.html",
"refsource": "MISC", "refsource": "MISC",
"url" : "http://hiltont.blogspot.com/2007/08/sony-rootkit-version-2.html" "url": "http://www.f-secure.com/weblog/archives/archive-082007.html#00001266"
},
{
"name" : "http://observed.de/?entnum=101",
"refsource" : "MISC",
"url" : "http://observed.de/?entnum=101"
}, },
{ {
"name": "http://www.computerdefense.org/?p=380", "name": "http://www.computerdefense.org/?p=380",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.computerdefense.org/?p=380" "url": "http://www.computerdefense.org/?p=380"
}, },
{
"name": "20070829 Sony: The Return Of The Rootkit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478149/100/0/threaded"
},
{
"name": "http://hiltont.blogspot.com/2007/08/sony-rootkit-version-2.html",
"refsource": "MISC",
"url": "http://hiltont.blogspot.com/2007/08/sony-rootkit-version-2.html"
},
{ {
"name": "http://www.f-secure.com/weblog/archives/archive-082007.html#00001263", "name": "http://www.f-secure.com/weblog/archives/archive-082007.html#00001263",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.f-secure.com/weblog/archives/archive-082007.html#00001263" "url": "http://www.f-secure.com/weblog/archives/archive-082007.html#00001263"
}, },
{ {
"name" : "http://www.f-secure.com/weblog/archives/archive-082007.html#00001266", "name": "20070901 Re: Sony: The Return Of The Rootkit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478365/100/0/threaded"
},
{
"name": "20070831 Re: Sony: The Return Of The Rootkit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478357/100/0/threaded"
},
{
"name": "http://observed.de/?entnum=101",
"refsource": "MISC", "refsource": "MISC",
"url" : "http://www.f-secure.com/weblog/archives/archive-082007.html#00001266" "url": "http://observed.de/?entnum=101"
}, },
{ {
"name": "3118", "name": "3118",

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://code.google.com/p/pyftpdlib/issues/detail?id=20",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/pyftpdlib/issues/detail?id=20"
},
{ {
"name": "http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY", "name": "http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY" "url": "http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY"
}, },
{ {
"name" : "http://code.google.com/p/pyftpdlib/source/detail?r=23", "name": "http://code.google.com/p/pyftpdlib/issues/detail?id=20",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://code.google.com/p/pyftpdlib/source/detail?r=23" "url": "http://code.google.com/p/pyftpdlib/issues/detail?id=20"
}, },
{ {
"name": "http://code.google.com/p/pyftpdlib/source/diff?spec=svn23&r=23&format=side&path=/trunk/pyftpdlib/FTPServer.py", "name": "http://code.google.com/p/pyftpdlib/source/diff?spec=svn23&r=23&format=side&path=/trunk/pyftpdlib/FTPServer.py",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://code.google.com/p/pyftpdlib/source/diff?spec=svn23&r=23&format=side&path=/trunk/pyftpdlib/FTPServer.py" "url": "http://code.google.com/p/pyftpdlib/source/diff?spec=svn23&r=23&format=side&path=/trunk/pyftpdlib/FTPServer.py"
},
{
"name": "http://code.google.com/p/pyftpdlib/source/detail?r=23",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/pyftpdlib/source/detail?r=23"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.org/1004-exploits/joomlazimbmanager-lfi.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/1004-exploits/joomlazimbmanager-lfi.txt"
},
{ {
"name": "12284", "name": "12284",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/12284" "url": "http://www.exploit-db.com/exploits/12284"
}, },
{
"name": "http://packetstormsecurity.org/1004-exploits/joomlazimbmanager-lfi.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1004-exploits/joomlazimbmanager-lfi.txt"
},
{ {
"name": "39546", "name": "39546",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-5107", "ID": "CVE-2010-5107",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20130206 Re: CVE id request: openssh?",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/02/07/3"
},
{ {
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234", "name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234" "url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234"
}, },
{ {
"name" : "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156", "name": "RHSA-2013:1591",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156" "url": "http://rhn.redhat.com/errata/RHSA-2013-1591.html"
},
{
"name": "HPSBMU03409",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2"
}, },
{ {
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config?r1=1.89#rev1.89", "name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config?r1=1.89#rev1.89",
@ -78,9 +78,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908707" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=908707"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "name": "58162",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" "url": "http://www.securityfocus.com/bid/58162"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
@ -88,29 +88,29 @@
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
}, },
{ {
"name" : "HPSBMU03409", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource" : "HP", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=bugtraq&m=144050155601375&w=2" "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
}, },
{ {
"name" : "RHSA-2013:1591", "name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1591.html" "url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156"
}, },
{ {
"name" : "58162", "name": "[oss-security] 20130206 Re: CVE id request: openssh?",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/58162" "url": "http://www.openwall.com/lists/oss-security/2013/02/07/3"
},
{
"name" : "oval:org.mitre.oval:def:19515",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19515"
}, },
{ {
"name": "oval:org.mitre.oval:def:19595", "name": "oval:org.mitre.oval:def:19595",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19595" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19595"
},
{
"name": "oval:org.mitre.oval:def:19515",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19515"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0236", "ID": "CVE-2014-0236",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://git.php.net/?p=php-src.git;a=commit;h=f3f22ff5c697aef854ffc1918bce708b37481b0f",
"refsource" : "CONFIRM",
"url" : "http://git.php.net/?p=php-src.git;a=commit;h=f3f22ff5c697aef854ffc1918bce708b37481b0f"
},
{ {
"name": "http://php.net/ChangeLog-5.php", "name": "http://php.net/ChangeLog-5.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "https://bugs.php.net/bug.php?id=67329", "name": "https://bugs.php.net/bug.php?id=67329",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=67329" "url": "https://bugs.php.net/bug.php?id=67329"
},
{
"name": "http://git.php.net/?p=php-src.git;a=commit;h=f3f22ff5c697aef854ffc1918bce708b37481b0f",
"refsource": "CONFIRM",
"url": "http://git.php.net/?p=php-src.git;a=commit;h=f3f22ff5c697aef854ffc1918bce708b37481b0f"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-0305", "ID": "CVE-2014-0305",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2014-1385", "ID": "CVE-2014-1385",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,41 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT6367",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6367"
},
{
"name" : "https://support.apple.com/kb/HT6537",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT6537"
},
{
"name" : "http://support.apple.com/kb/HT6441",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6441"
},
{
"name" : "http://support.apple.com/kb/HT6442",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6442"
},
{
"name" : "APPLE-SA-2014-09-17-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"name" : "APPLE-SA-2014-09-17-2",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"name" : "GLSA-201601-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201601-02"
},
{ {
"name": "69223", "name": "69223",
"refsource": "BID", "refsource": "BID",
@ -97,20 +62,55 @@
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030731" "url": "http://www.securitytracker.com/id/1030731"
}, },
{
"name": "http://support.apple.com/kb/HT6441",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6441"
},
{
"name": "GLSA-201601-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201601-02"
},
{
"name": "https://support.apple.com/kb/HT6537",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6537"
},
{
"name": "http://support.apple.com/kb/HT6367",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6367"
},
{
"name": "http://support.apple.com/kb/HT6442",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6442"
},
{ {
"name": "61318", "name": "61318",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61318" "url": "http://secunia.com/advisories/61318"
}, },
{ {
"name" : "60705", "name": "APPLE-SA-2014-09-17-2",
"refsource" : "SECUNIA", "refsource": "APPLE",
"url" : "http://secunia.com/advisories/60705" "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"name": "APPLE-SA-2014-09-17-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
}, },
{ {
"name": "apple-safari-cve20141385-code-exec(95268)", "name": "apple-safari-cve20141385-code-exec(95268)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95268" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95268"
},
{
"name": "60705",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60705"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf",
"refsource" : "MISC",
"url" : "http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf"
},
{ {
"name": "101919", "name": "101919",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/101919" "url": "http://osvdb.org/101919"
}, },
{
"name": "http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf",
"refsource": "MISC",
"url": "http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf"
},
{ {
"name": "101921", "name": "101921",
"refsource": "OSVDB", "refsource": "OSVDB",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-1774", "ID": "CVE-2014-1774",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS14-035", "name": "1030370",
"refsource" : "MS", "refsource": "SECTRACK",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035" "url": "http://www.securitytracker.com/id/1030370"
}, },
{ {
"name": "67867", "name": "67867",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/67867" "url": "http://www.securityfocus.com/bid/67867"
}, },
{ {
"name" : "1030370", "name": "MS14-035",
"refsource" : "SECTRACK", "refsource": "MS",
"url" : "http://www.securitytracker.com/id/1030370" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
} }
] ]
} }

View File

@ -52,21 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20140516 Two Cross-Site Scripting (XSS) Vulnerabilities in Seo Panel",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/532119/100/0/threaded"
},
{ {
"name": "https://www.htbridge.com/advisory/HTB23200", "name": "https://www.htbridge.com/advisory/HTB23200",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23200" "url": "https://www.htbridge.com/advisory/HTB23200"
}, },
{
"name" : "http://packetstormsecurity.com/files/126706/Seo-Panel-3.4.0-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/126706/Seo-Panel-3.4.0-Cross-Site-Scripting.html"
},
{ {
"name": "http://forum.seopanel.in/viewtopic.php?f=7&t=10978", "name": "http://forum.seopanel.in/viewtopic.php?f=7&t=10978",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -76,6 +66,16 @@
"name": "58706", "name": "58706",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58706" "url": "http://secunia.com/advisories/58706"
},
{
"name": "20140516 Two Cross-Site Scripting (XSS) Vulnerabilities in Seo Panel",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/532119/100/0/threaded"
},
{
"name": "http://packetstormsecurity.com/files/126706/Seo-Panel-3.4.0-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/126706/Seo-Panel-3.4.0-Cross-Site-Scripting.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.drupal.org/SA-CORE-2014-003",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/SA-CORE-2014-003"
},
{ {
"name": "DSA-2983", "name": "DSA-2983",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2983" "url": "http://www.debian.org/security/2014/dsa-2983"
},
{
"name": "https://www.drupal.org/SA-CORE-2014-003",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/SA-CORE-2014-003"
} }
] ]
} }

View File

@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "34361",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/34361"
},
{ {
"name": "http://packetstormsecurity.com/files/127905/Tenda-A5s-Router-Authentication-Bypass.html", "name": "http://packetstormsecurity.com/files/127905/Tenda-A5s-Router-Authentication-Bypass.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127905/Tenda-A5s-Router-Authentication-Bypass.html" "url": "http://packetstormsecurity.com/files/127905/Tenda-A5s-Router-Authentication-Bypass.html"
}, },
{ {
"name" : "69267", "name": "34361",
"refsource" : "BID", "refsource": "EXPLOIT-DB",
"url" : "http://www.securityfocus.com/bid/69267" "url": "http://www.exploit-db.com/exploits/34361"
},
{
"name": "tenda-a5srouter-cve20145246-security-bypass(95337)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95337"
}, },
{ {
"name": "110146", "name": "110146",
@ -73,9 +73,9 @@
"url": "http://osvdb.org/show/osvdb/110146" "url": "http://osvdb.org/show/osvdb/110146"
}, },
{ {
"name" : "tenda-a5srouter-cve20145246-security-bypass(95337)", "name": "69267",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95337" "url": "http://www.securityfocus.com/bid/69267"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5612", "ID": "CVE-2014-5612",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#707457",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/707457"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#707457", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/707457" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-5992", "ID": "CVE-2014-5992",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "name": "VU#735793",
"refsource" : "MISC", "refsource": "CERT-VN",
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "url": "http://www.kb.cert.org/vuls/id/735793"
}, },
{ {
"name": "VU#582497", "name": "VU#582497",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/582497" "url": "http://www.kb.cert.org/vuls/id/582497"
}, },
{ {
"name" : "VU#735793", "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource" : "CERT-VN", "refsource": "MISC",
"url" : "http://www.kb.cert.org/vuls/id/735793" "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2015-2118", "ID": "CVE-2015-2118",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,12 +53,12 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBPI03322", "name": "SSRT102033",
"refsource": "HP", "refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315" "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315"
}, },
{ {
"name" : "SSRT102033", "name": "HPSBPI03322",
"refsource": "HP", "refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315" "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315"
} }

View File

@ -54,28 +54,28 @@
"reference_data": [ "reference_data": [
{ {
"name": "20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "name": "20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)",
"refsource" : "BUGTRAQ", "refsource": "FULLDISC",
"url" : "http://www.securityfocus.com/archive/1/535679/100/0/threaded" "url": "http://seclists.org/fulldisclosure/2015/Jun/8"
}, },
{ {
"name": "20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)", "name": "20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)",
"refsource" : "FULLDISC", "refsource": "BUGTRAQ",
"url" : "http://seclists.org/fulldisclosure/2015/Jun/8" "url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded"
}, },
{ {
"name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html"
}, },
{
"name" : "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk",
"refsource" : "CONFIRM",
"url" : "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk"
},
{ {
"name": "75038", "name": "75038",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75038" "url": "http://www.securityfocus.com/bid/75038"
},
{
"name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk",
"refsource": "CONFIRM",
"url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-6047", "ID": "CVE-2015-6047",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-522" "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-522"
}, },
{
"name" : "MS15-106",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-106"
},
{ {
"name": "1033800", "name": "1033800",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033800" "url": "http://www.securitytracker.com/id/1033800"
},
{
"name": "MS15-106",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-106"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-6718", "ID": "CVE-2015-6718",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-503",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-503"
},
{ {
"name": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html", "name": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html" "url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
}, },
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-503",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-503"
},
{ {
"name": "1033796", "name": "1033796",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -53,44 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20170201 Multiple memory access issues in gstreamer", "name": "96001",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2017/02/01/7" "url": "http://www.securityfocus.com/bid/96001"
},
{
"name" : "[oss-security] 20170202 Re: Multiple memory access issues in gstreamer",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/02/02/9"
},
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=775450",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=775450"
},
{
"name" : "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3",
"refsource" : "CONFIRM",
"url" : "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3"
}, },
{ {
"name": "DSA-3820", "name": "DSA-3820",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3820" "url": "http://www.debian.org/security/2017/dsa-3820"
}, },
{
"name" : "GLSA-201705-10",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201705-10"
},
{ {
"name": "RHSA-2017:2060", "name": "RHSA-2017:2060",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2060" "url": "https://access.redhat.com/errata/RHSA-2017:2060"
}, },
{ {
"name" : "96001", "name": "https://bugzilla.gnome.org/show_bug.cgi?id=775450",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/96001" "url": "https://bugzilla.gnome.org/show_bug.cgi?id=775450"
},
{
"name": "[oss-security] 20170202 Re: Multiple memory access issues in gstreamer",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/02/02/9"
},
{
"name": "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3",
"refsource": "CONFIRM",
"url": "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3"
},
{
"name": "GLSA-201705-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201705-10"
},
{
"name": "[oss-security] 20170201 Multiple memory access issues in gstreamer",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/02/01/7"
} }
] ]
} }

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/jser/stat-js/blob/master/data/url-mapping.js",
"refsource" : "MISC",
"url" : "https://github.com/jser/stat-js/blob/master/data/url-mapping.js"
},
{ {
"name": "https://nodesecurity.io/advisories/188", "name": "https://nodesecurity.io/advisories/188",
"refsource": "MISC", "refsource": "MISC",
"url": "https://nodesecurity.io/advisories/188" "url": "https://nodesecurity.io/advisories/188"
},
{
"name": "https://github.com/jser/stat-js/blob/master/data/url-mapping.js",
"refsource": "MISC",
"url": "https://github.com/jser/stat-js/blob/master/data/url-mapping.js"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "USN-3600-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3600-1/"
},
{ {
"name": "https://bugs.php.net/bug.php?id=71323", "name": "https://bugs.php.net/bug.php?id=71323",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5", "name": "https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5" "url": "https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5"
},
{
"name" : "USN-3600-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3600-1/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4137", "ID": "CVE-2016-4137",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "40089", "name": "1036117",
"refsource" : "EXPLOIT-DB", "refsource": "SECTRACK",
"url" : "https://www.exploit-db.com/exploits/40089/" "url": "http://www.securitytracker.com/id/1036117"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
}, },
{ {
"name": "MS16-083", "name": "MS16-083",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
}, },
{
"name": "openSUSE-SU-2016:1625",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
},
{ {
"name": "RHSA-2016:1238", "name": "RHSA-2016:1238",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1238" "url": "https://access.redhat.com/errata/RHSA-2016:1238"
}, },
{ {
"name" : "SUSE-SU-2016:1613", "name": "40089",
"refsource" : "SUSE", "refsource": "EXPLOIT-DB",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" "url": "https://www.exploit-db.com/exploits/40089/"
}, },
{ {
"name": "openSUSE-SU-2016:1621", "name": "openSUSE-SU-2016:1621",
@ -83,14 +83,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1625", "name": "SUSE-SU-2016:1613",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
}, },
{ {
"name" : "1036117", "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1036117" "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-4242", "ID": "CVE-2016-4242",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,15 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html", "name": "SUSE-SU-2016:1826",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
}, },
{ {
"name": "GLSA-201607-03", "name": "GLSA-201607-03",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-03" "url": "https://security.gentoo.org/glsa/201607-03"
}, },
{
"name" : "RHSA-2016:1423",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
},
{
"name" : "SUSE-SU-2016:1826",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
},
{ {
"name": "openSUSE-SU-2016:1802", "name": "openSUSE-SU-2016:1802",
"refsource": "SUSE", "refsource": "SUSE",
@ -82,6 +72,16 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/91725" "url": "http://www.securityfocus.com/bid/91725"
}, },
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
},
{
"name": "RHSA-2016:1423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
},
{ {
"name": "1036280", "name": "1036280",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4441", "ID": "CVE-2016-4441",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,20 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20160519 CVE-2016-4441 Qemu: scsi: esp: OOB write while writing to 's-cmdbuf' in get_cmd",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/05/19/4"
},
{ {
"name": "[qemu-devel] 20160519 [PATCH 2/2] scsi: check dma length before reading scsi command(CVE-2016-4441)", "name": "[qemu-devel] 20160519 [PATCH 2/2] scsi: check dma length before reading scsi command(CVE-2016-4441)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html" "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html"
}, },
{ {
"name" : "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", "name": "USN-3047-1",
"refsource" : "MLIST", "refsource": "UBUNTU",
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" "url": "http://www.ubuntu.com/usn/USN-3047-1"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337505", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337505",
@ -77,16 +72,21 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201609-01" "url": "https://security.gentoo.org/glsa/201609-01"
}, },
{
"name" : "USN-3047-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-3047-1"
},
{ {
"name": "USN-3047-2", "name": "USN-3047-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3047-2" "url": "http://www.ubuntu.com/usn/USN-3047-2"
}, },
{
"name": "[oss-security] 20160519 CVE-2016-4441 Qemu: scsi: esp: OOB write while writing to 's-cmdbuf' in get_cmd",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/19/4"
},
{
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{ {
"name": "90762", "name": "90762",
"refsource": "BID", "refsource": "BID",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-8096", "ID": "CVE-2016-8096",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@microfocus.com", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-9176", "ID": "CVE-2016-9176",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.exploit-db.com/exploits/40648/",
"refsource" : "MISC",
"url" : "https://www.exploit-db.com/exploits/40648/"
},
{ {
"name": "94236", "name": "94236",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/94236" "url": "http://www.securityfocus.com/bid/94236"
},
{
"name": "https://www.exploit-db.com/exploits/40648/",
"refsource": "MISC",
"url": "https://www.exploit-db.com/exploits/40648/"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9326", "ID": "CVE-2016-9326",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2016-9655", "ID": "CVE-2016-9655",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html"
},
{ {
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update", "name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,6 +62,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.libsdl.org/show_bug.cgi?id=4496" "url": "https://bugzilla.libsdl.org/show_bug.cgi?id=4496"
}, },
{
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html"
},
{ {
"name": "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720", "name": "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720",
"refsource": "MISC", "refsource": "MISC",